[
  {
    "name": "Mathias Payer",
    "display_name": "Mathias Payer",
    "affiliation": "EPFL",
    "artifact_count": 18,
    "total_papers": 30,
    "total_papers_by_conf": {
      "CHES": 1,
      "NDSS": 4,
      "WOOT": 1,
      "ATC": 1,
      "USENIXSEC": 21,
      "ACSAC": 2,
      "SOSP": 0,
      "PETS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      },
      "NDSS": {
        "2025": 4
      },
      "WOOT": {
        "2024": 1
      },
      "ATC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 5,
        "2020": 4,
        "2023": 6,
        "2022": 2,
        "2025": 3,
        "2021": 1
      },
      "ACSAC": {
        "2022": 2
      },
      "SOSP": {},
      "PETS": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 83.3,
    "functional_rate": 77.8,
    "category": "both",
    "conferences": [
      "ACSAC",
      "ATC",
      "CHES",
      "NDSS",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2020,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 15,
    "badges_functional": 14,
    "badges_reproducible": 15,
    "papers": [
      {
        "title": "Monarch: A Fuzzing Framework for Distributed File Systems",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Designing a Provenance Analysis for SGX Enclaves",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Exploiting Android's Hardened Memory Allocator",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "EL3XIR: Fuzzing COTS Secure Monitors",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Spill the TeA: An Empirical Study of Trusted Application Rollback Prevention on Android Smartphones",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GlobalConfusion: TrustZone Trusted Application 0-Days by Design",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ARMore: Pushing Love Back Into Binaries",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Midas: Systematic Kernel TOCTTOU Protection",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hercules Droidot and the murder on the JNI Express",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NASS: Fuzzing All Native Android System Services with Interface Awareness and Coverage",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TLBlur: Compiler-Assisted Automated Hardening against Controlled Channels on Off-the-Shelf Intel SGX Platforms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "type++: Prohibiting Type Confusion with Inline Type Information",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "qmsan efficiently detecting uninitialized memory errors during fuzzing",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "truman constructing device behavior models from os drivers to fuzz virtual devices",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "dpact decentralized privacypreserving asymmetric digital contact tracing",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "hyperpill fuzzing for hypervisorbugs by leveraging the hardware virtualization interface",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "aifore smart fuzzing based on automatic input format reverse engineering",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "actor actionguided kernel fuzzing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "gleefuzz fuzzing webgl through error message guided mutation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "profactory improving iot security via formalized protocol customization",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "lightblue automatic profileaware debloating of bluetooth stacks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "usbfuzz a framework for fuzzing usb drivers by device emulation",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "fuzzgen automatic fuzzer generation",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "blesa spoofing attacks against reconnections in bluetooth low energy",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 2,
    "paper_ids": [
      1,
      2,
      3,
      4,
      5,
      6,
      7,
      8,
      9,
      10,
      11,
      12,
      13,
      14,
      15,
      16,
      17,
      18
    ],
    "papers_without_artifact_ids": [
      19,
      20,
      21,
      22,
      23,
      24,
      25,
      26,
      27,
      28,
      29,
      30
    ]
  },
  {
    "name": "Haibo Chen 0001",
    "display_name": "Haibo Chen",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 16,
    "total_papers": 46,
    "total_papers_by_conf": {
      "OSDI": 15,
      "ATC": 8,
      "SOSP": 5,
      "USENIXSEC": 3,
      "EUROSYS": 4,
      "FAST": 9,
      "NSDI": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 4,
        "2022": 1,
        "2024": 3,
        "2023": 6,
        "2020": 1
      },
      "ATC": {
        "2022": 4,
        "2024": 2,
        "2023": 2
      },
      "SOSP": {
        "2023": 2,
        "2021": 2,
        "2024": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2022": 1,
        "2025": 1
      },
      "EUROSYS": {
        "2024": 3,
        "2021": 1
      },
      "FAST": {
        "2024": 1,
        "2016": 2,
        "2026": 3,
        "2022": 2,
        "2025": 1
      },
      "NSDI": {
        "2021": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 34.8,
    "repro_rate": 81.2,
    "functional_rate": 87.5,
    "category": "both",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 11,
    "badges_functional": 14,
    "badges_reproducible": 13,
    "papers": [
      {
        "title": "UGACHE: A Unified GPU Cache for Embedding-based Deep Learning",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CLoF: A Compositional Lock Framework for Multi-level NUMA Systems",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Characterization and Reclamation of Frozen Garbage in Managed FaaS Workloads",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "KRCORE: A Microsecond-scale RDMA Control Plane for Elastic Computing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Zero-Change Object Transmission for Distributed Big Data Analytics",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "BBQ: A Block-based Bounded Queue for Exchanging Data and Profiling",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Bridging the Gap between Relational OLTP and Graph-based OLAP",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "A Hardware-Software Co-design for Efficient Intra-Enclave Isolation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Serverless Functions Made Confidential and Efficient with Split Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Retrofitting High Availability Mechanism to Tame Hybrid Transaction/Analytical Processing",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Scalable Memory Protection in the PENGLAI Enclave",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Polyjuice: High-Performance Transactions via Learned Concurrency Control",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Encrypted Databases Made Secure Yet Maintainable",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "BWoS: Formally Verified Block-based Work Stealing for Parallel Processing",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Security and Performance in the Delegated User-level Virtualization",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fast RDMA-based Ordered Key-Value Store using Remote Learned Cache",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "solidattention lowlatency ssdbased serving on memoryconstrained pcs",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "range as a key is the key fast and compact cloud block store index with rask",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "sharpen the spec cut the code a case for generative file system with sysspec",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "liquidstate drive a case for dna block device for enormous data",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "odrp ondemand remote paging with programmable rdma",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "cpc flexible secure and efficient cvm maintenance with confidential procedure calls",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "harmonizing efficiency and practicability optimizing resource utilization in serverless computing with jiagu",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "serializationdeserializationfree state transfer in serverless workflows",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "jade a highthroughput concurrent copying garbage collector",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "optimizing file systems on heterogeneous memory by integrating dram cache with virtual memory management",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "using dynamically layered definite releases for verifying the reffs file system",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "microkernel goes general performance and compatibility in the hongmeng production microkernel",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "fast and scalable innetwork lock management using lock fission",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "powerinfer fast large language model serving with a consumergrade gpu",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "bifrost analysis and optimization of network io tax in confidential virtual machines",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "no provisioned concurrency fast rdmacodesigned remote fork for serverless computing",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "characterizing offpath smartnic for accelerating distributed systems",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "automated verification of idempotence for stateful serverless applications",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "treesls a wholesystem persistent microkernel with treestructured state checkpoint on nvm",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "epk scalable and efficient memory protection keys",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "htmfs strong consistency comes for free with hardware transactional memory in persistent memory file systems",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "mt2 memory bandwidth regulation on hybrid nvmdram platforms",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "microsecondscale preemption for concurrent gpuaccelerated dnn inferences",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "bridging the performance gap for copybased garbage collectors atop nonvolatile memory",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "unifying timestamp with transaction ordering for mvcc with decentralized scalar timestamp",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "bringing decentralized search to decentralized services",
        "conference": "OSDI",
        "year": 2021
      },
      {
        "title": "twinvisor hardwareisolated confidential virtual machines for arm",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "mostly exitless vm protection from untrusted hypervisor through disaggregated nested virtualization",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "efficient and available inmemory kvstore with hybrid erasure coding and replication",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "mitigating sync amplification for copyonwrite virtual disk",
        "conference": "FAST",
        "year": 2016
      }
    ],
    "author_id": 1,
    "paper_ids": [
      31,
      32,
      33,
      34,
      35,
      36,
      37,
      38,
      39,
      40,
      41,
      42,
      43,
      44,
      45,
      46
    ],
    "papers_without_artifact_ids": [
      47,
      48,
      49,
      50,
      51,
      52,
      53,
      54,
      55,
      56,
      57,
      58,
      59,
      60,
      61,
      62,
      63,
      64,
      65,
      66,
      67,
      68,
      69,
      70,
      71,
      72,
      73,
      74,
      75,
      76
    ]
  },
  {
    "name": "Cristiano Giuffrida",
    "display_name": "Cristiano Giuffrida",
    "affiliation": "VU Amsterdam",
    "artifact_count": 14,
    "total_papers": 22,
    "total_papers_by_conf": {
      "USENIXSEC": 13,
      "ACSAC": 6,
      "SOSP": 0,
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 1,
      "NDSS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2020": 1,
        "2023": 2,
        "2022": 2,
        "2025": 2,
        "2021": 2
      },
      "ACSAC": {
        "2018": 2,
        "2022": 1,
        "2019": 1,
        "2023": 1,
        "2020": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {},
      "FAST": {
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 63.6,
    "repro_rate": 78.6,
    "functional_rate": 85.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2020,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2018-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 9,
    "badges_functional": 12,
    "badges_reproducible": 11,
    "papers": [
      {
        "title": "Type-After-Type: Practical and Complete Type-Safe Memory Reuse",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TIFF: Using Input Type Inference To Improve Fuzzing",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Triereme: Speeding up hybrid fuzzing through efficient query scheduling",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Practical Data-Only Attack Generation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FloatZone: Accelerating Memory Error Detection using the Floating Point Unit",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Uncontained: Uncovering Container Confusion in the Linux Kernel",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RangeSanitizer: Detecting Memory Errors with Efficient Range Checks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "predictive contextsensitive fuzzing",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "ghostrace exploiting and mitigating speculative race conditions",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "dupefs leaking data over the network with filesystem deduplication side channels",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "collabfuzz a framework for collaborative fuzzing",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "rage against the machine clear a systematic analysis of machine clears and their implications for transient execution attacks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "smash synchronized manysided rowhammer attacks from javascript",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "parmesan sanitizerguided greybox fuzzing",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "vps excavating highlevel c constructs from lowlevel binaries to protect dynamic dispatching",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 3,
    "paper_ids": [
      77,
      78,
      79,
      80,
      81,
      82,
      83,
      84,
      85,
      86,
      87,
      88,
      89,
      90
    ],
    "papers_without_artifact_ids": [
      91,
      92,
      93,
      94,
      95,
      96,
      97,
      98
    ]
  },
  {
    "name": "Thorsten Holz",
    "display_name": "Thorsten Holz",
    "affiliation": "Max Planck Society",
    "artifact_count": 14,
    "total_papers": 31,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 18,
      "NDSS": 2,
      "ACSAC": 7,
      "EUROSYS": 2,
      "ATC": 0,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 3,
        "2020": 3,
        "2023": 4,
        "2022": 3,
        "2025": 3,
        "2021": 2
      },
      "NDSS": {
        "2025": 2
      },
      "ACSAC": {
        "2018": 1,
        "2019": 2,
        "2017": 2,
        "2020": 2
      },
      "EUROSYS": {
        "2021": 1,
        "2022": 1
      },
      "ATC": {},
      "WOOT": {}
    },
    "artifact_rate": 45.2,
    "repro_rate": 57.1,
    "functional_rate": 78.6,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2020,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2018-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 12,
    "badges_functional": 11,
    "badges_reproducible": 8,
    "papers": [
      {
        "title": "Towards Automated Generation of Exploitation Primitives for Web Browsers",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Systematic Assessment of Fuzzers using Mutation Analysis",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Loki: Hardening Code Obfuscation Against Automated Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Confusing Value with Enumeration: Studying the Use of CVEs in Academia",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Understanding Regional Filter Lists: Efficacy and Impact",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a comprehensive memory safety analysis of bootloaders",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "aidfuzzer adaptive interruptdriven firmware fuzzing via runtime state recognition",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "atropos effective fuzzing of web applications for serverside vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a binarylevel thread sanitizer or why sanitizing on the binary level is hard",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "privacy rarely considered exploring considerations in the adoption of thirdparty services by websites",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "nyxnet network fuzzing with incremental snapshots",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "collabfuzz a framework for collaborative fuzzing",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "nyx greybox hypervisor fuzzing using fast snapshots and affine types",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "dompteur taming audio adversarial examples",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "imperio robust overtheair adversarial examples for automatic speech recognition systems",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "call me maybe eavesdropping encrypted lte calls with revolte",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "aurora statistical crash analysis for automated root cause explanation",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "ethbmc a bounded model checker for smart contracts",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "vps excavating highlevel c constructs from lowlevel binaries to protect dynamic dispatching",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "ecfi asynchronous control flow integrity for programmable logic controllers",
        "conference": "ACSAC",
        "year": 2017
      },
      {
        "title": "breaking and fixing destructive code read defenses",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 4,
    "paper_ids": [
      99,
      81,
      100,
      101,
      102,
      103,
      104,
      105,
      106,
      107,
      108,
      109,
      110,
      111
    ],
    "papers_without_artifact_ids": [
      112,
      113,
      114,
      115,
      116,
      117,
      94,
      118,
      119,
      120,
      121,
      122,
      123,
      98,
      124,
      125
    ]
  },
  {
    "name": "Prateek Mittal",
    "display_name": "Prateek Mittal",
    "affiliation": "Princeton University",
    "artifact_count": 14,
    "total_papers": 19,
    "total_papers_by_conf": {
      "USENIXSEC": 10,
      "PETS": 8,
      "ATC": 0,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2022": 4,
        "2021": 3
      },
      "PETS": {
        "2022": 3,
        "2023": 1,
        "2025": 1,
        "2021": 2,
        "2026": 1
      },
      "ATC": {},
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 73.7,
    "repro_rate": 42.9,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 14,
    "badges_functional": 7,
    "badges_reproducible": 6,
    "papers": [
      {
        "title": "PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards A Proactive ML Approach for Detecting Backdoor Poison Samples",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "How Effective is Multiple-Vantage-Point Domain Control Validation?",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Creating a Secure Underlay for the Internet",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Machine Learning with Differentially Private Labels: Mechanisms and Frameworks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Leveraging strategic connection migration-powered traffic splitting for privacy",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Athena: Probabilistic Verification of Machine Unlearning",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "What WeChat Knows: Pervasive First-Party Tracking in a Billion-User Super-App Ecosystem",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Website Fingerprinting in the Age of QUIC",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "quicstep evaluating connection migration based quic censorship circumvention",
        "conference": "PETS",
        "year": 2026
      },
      {
        "title": "rapid realtime alert investigation with contextaware prioritization for efficient threat discovery",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "experiences deploying multivantagepoint domain validation at lets encrypt",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "systematic evaluation of privacy risks of machine learning models",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "patchguard a provably robust defense against adversarial patches via small receptive fields and masking",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6,
    "paper_ids": [
      126,
      127,
      128,
      129,
      130,
      131,
      132,
      133,
      134,
      135,
      136,
      137,
      138,
      139
    ],
    "papers_without_artifact_ids": [
      140,
      141,
      142,
      143,
      144
    ]
  },
  {
    "name": "Fan Yang 0024",
    "display_name": "Fan Yang",
    "affiliation": "Microsoft Research",
    "artifact_count": 13,
    "total_papers": 19,
    "total_papers_by_conf": {
      "SOSP": 3,
      "OSDI": 12,
      "EUROSYS": 2,
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2,
        "2024": 1
      },
      "OSDI": {
        "2022": 2,
        "2024": 3,
        "2023": 4,
        "2020": 3
      },
      "EUROSYS": {
        "2023": 1,
        "2024": 1
      },
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 68.4,
    "repro_rate": 84.6,
    "functional_rate": 92.3,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2022,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 13,
    "badges_functional": 12,
    "badges_reproducible": 11,
    "papers": [
      {
        "title": "SPFresh: Incremental In-Place Update for Billion-Scale Vector Search",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PIT: Optimization of Dynamic Sparse Deep Learning Models via Permutation Invariant Transformation",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Uncovering Nested Data Parallelism and Data Reuse in DNN Computation with FractalTensor",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Aceso: Efficient Parallel DNN Training through Iterative Bottleneck Alleviation",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PilotFish: Harvesting Free Cycles of Cloud Gaming with Deep Learning Training",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ROLLER: Fast and Efficient Tensor Compilation for Deep Learning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SparTA: Deep-Learning Model Sparsity via Tensor-with-Sparsity-Attribute",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Parrot: Efficient Serving of LLM-based Applications with Semantic Variable",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Welder: Scheduling Deep Learning Memory Access via Tile-graph",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "VBASE: Unifying Online Vector Similarity Search and Relational Queries via Relaxed Monotonicity",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Optimizing Dynamic Neural Networks with Brainstorm",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rammer: Enabling Holistic Deep Learning Compiler Optimizations with rTasks",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Retiarii: A Deep Learning Exploratory-Training Framework",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "nnscaler constraintguided parallelization plan generation for deep learning training",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "ladder enabling efficient lowprecision deep learning computing through hardwareaware tensor transformation",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "silod a codesign of caching and scheduling for deep learning clusters",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "on modular learning of distributed systems for predicting endtoend latency",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "cocktailer analyzing and optimizing dynamic control flow in deep learning",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "hived sharing a gpu cluster for deep learning with guarantees",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 7,
    "paper_ids": [
      145,
      146,
      147,
      148,
      149,
      150,
      151,
      152,
      153,
      154,
      155,
      156,
      157
    ],
    "papers_without_artifact_ids": [
      158,
      159,
      160,
      161,
      162,
      163
    ]
  },
  {
    "name": "Ning Zhang 0017",
    "display_name": "Ning Zhang",
    "affiliation": "Washington University in St. Louis",
    "artifact_count": 13,
    "total_papers": 16,
    "total_papers_by_conf": {
      "USENIXSEC": 10,
      "NDSS": 2,
      "ACSAC": 3,
      "WOOT": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2023": 3,
        "2025": 2,
        "2021": 1
      },
      "NDSS": {
        "2025": 2
      },
      "ACSAC": {
        "2022": 1,
        "2020": 2
      },
      "WOOT": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 81.2,
    "repro_rate": 38.5,
    "functional_rate": 76.9,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2020,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 10,
    "badges_functional": 10,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RusTEE: Developing Memory-Safe ARM TrustZone Applications",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Where's the \"up\"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ARI: Attestation of Real-time Mission Execution Integrity",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SMACK: Semantically Meaningful Adversarial Audio Attack",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure Information Embedding in Forensic 3D Fingerprinting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Software Availability Protection in Cyber-Physical Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based Compartmentalization",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "isolategpt an execution isolation architecture for llmbased agentic systems",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "dataflow availability achieving timing assurance in autonomous systems",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "messy states of wiring vulnerabilities in emerging personal payment systems",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5,
    "paper_ids": [
      164,
      165,
      166,
      167,
      168,
      169,
      170,
      171,
      172,
      173,
      174,
      175,
      176
    ],
    "papers_without_artifact_ids": [
      177,
      178,
      179
    ]
  },
  {
    "name": "Yang Zhang 0016",
    "display_name": "Yang Zhang",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 13,
    "total_papers": 34,
    "total_papers_by_conf": {
      "USENIXSEC": 26,
      "NDSS": 2,
      "ACSAC": 3,
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2020": 1,
        "2023": 5,
        "2022": 3,
        "2025": 11,
        "2021": 2
      },
      "NDSS": {
        "2025": 2
      },
      "ACSAC": {
        "2021": 1,
        "2019": 1,
        "2023": 1
      },
      "PETS": {
        "2025": 2,
        "2024": 1
      }
    },
    "artifact_rate": 38.2,
    "repro_rate": 23.1,
    "functional_rate": 23.1,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 12,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Differentially Private Resource Allocation",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Meme to Threat: On the Hateful Meme Understanding and Induced Hateful Content Generation in Open-Source Vision Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Enhanced Label-Only Membership Inference Attacks with Fewer Queries",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Membership Inference Attacks Against Vision-Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Bridging the Gap in Vision Language Models in Identifying Unsafe Concepts Across Modalities",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream Applications",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Understanding Unsafe Video Generation",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding data importance in machine learning attacks does valuable data pose greater harm",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "a comprehensive study of privacy risks in curriculum learning",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "whitebox membership inference attacks against diffusion models",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "link stealing attacks against inductive graph neural networks",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "prompt stealing attacks against texttoimage generation models",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "quantifying privacy risks of prompts in visual prompt learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "securitynet assessing machine learning vulnerabilities on public models",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "instruction backdoor attacks against customized llms",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "twoinone a model hijacking attack against text generation models",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "privtrace differentially private trajectory synthesis by adaptive markov models",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "faceauditor data auditing in facial recognition systems",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "a plot is worth a thousand words model information stealing attacks via scientific plots",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "unganable defending against ganbased face manipulation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "mldoctor holistic risk assessment of inference attacks against machine learning models",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "teacher model fingerprinting attacks against transfer learning",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "inference attacks against graph neural networks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "badnl backdoor attacks against nlp models with semanticpreserving improvements",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "privsyn differentially private data synthesis",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "stealing links from graph neural networks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "updatesleak data set inference and reconstruction attacks in online learning",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "how to prove your model belongs to you a blindwatermark based framework to protect intellectual property of dnn",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 8,
    "paper_ids": [
      180,
      181,
      182,
      183,
      184,
      185,
      186,
      187,
      188,
      189,
      190,
      191,
      192
    ],
    "papers_without_artifact_ids": [
      193,
      194,
      195,
      196,
      197,
      198,
      199,
      200,
      201,
      202,
      203,
      204,
      205,
      206,
      207,
      208,
      209,
      210,
      211,
      212,
      213
    ]
  },
  {
    "name": "Martin Johns",
    "display_name": "Martin Johns",
    "affiliation": "TU Braunschweig",
    "artifact_count": 13,
    "total_papers": 17,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "PETS": 6,
      "WOOT": 2,
      "EUROSYS": 1,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 1,
        "2025": 2,
        "2021": 1
      },
      "PETS": {
        "2022": 1,
        "2025": 2,
        "2024": 2,
        "2021": 1
      },
      "WOOT": {
        "2025": 2
      },
      "EUROSYS": {
        "2021": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 76.5,
    "repro_rate": 0.0,
    "functional_rate": 38.5,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2020,
      2021,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 12,
    "badges_functional": 5,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SSRF vs. Developers: A Study of SSRF-Defenses in PHP Applications",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Confusing Value with Enumeration: Studying the Use of CVEs in Academia",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HyTrack: Resurrectable and Persistent Tracking Across Android Apps and the Web",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Extract: A PHP Foot-Gun Case Study",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Comma Separated Vulnerabilities: Detecting Formula Injection in the Wild",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Keeping Privacy Labels Honest",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Making Web Applications GDPR Compliant: A Comparative Evaluation of GDPR-Enforcement Frameworks",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Impact of Default Mobile SDK Usage on Privacy and Data Protection",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Black-Box Privacy Analysis of Messaging Service Providers' Chat Message Processing",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LogPicker: Strengthening Certificate Transparency Against Covert Adversaries",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fptracer finegrained browser fingerprinting detection via tainttracking and entropybased thresholds",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "accept all exploits exploring the security impact of cookie banners",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "talking about my generation targeted dombased xss exploit generation using dynamic data flow analysis",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "u cant debug this detecting javascript antidebugging techniques in the wild",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 9,
    "paper_ids": [
      214,
      215,
      216,
      217,
      108,
      218,
      219,
      220,
      221,
      222,
      223,
      224,
      225
    ],
    "papers_without_artifact_ids": [
      226,
      227,
      228,
      229
    ]
  },
  {
    "name": "Min Yang 0002",
    "display_name": "Min Yang",
    "affiliation": "Fudan University",
    "artifact_count": 13,
    "total_papers": 34,
    "total_papers_by_conf": {
      "USENIXSEC": 26,
      "ATC": 0,
      "ACSAC": 2,
      "NDSS": 6
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 4,
        "2023": 4,
        "2022": 5,
        "2025": 11,
        "2021": 2
      },
      "ATC": {},
      "ACSAC": {
        "2021": 1,
        "2020": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 5
      }
    },
    "artifact_rate": 38.2,
    "repro_rate": 15.4,
    "functional_rate": 23.1,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 12,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply Chains",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Pig in a Poke: Automatically Detecting and Exploiting Link Following Vulnerabilities in Windows File Operations",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Demystifying the (In)Security of QR Code-based Login in Real-world Deployments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "misdirection of trust demystifying the abuse of dedicated url shortening service",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "the skeleton keys a large scale analysis of credential leakage in miniapps",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "revealing the black box of device search engine scanning assets strategies and ethical consideration",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "an empirical study on fingerprint api misuse with lifecycle analysis in realworld android apps",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "hades attack understanding and evaluating manipulation risks of email blocklists",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "leaking the privacy of groups and more understanding privacy risks of crossapp content sharing in mobile ecosystem",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "rethinking whitebox watermarks on deep learning models under neural structural obfuscation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "notice the imposter a study on user tag spoofing attack in mobile apps",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "exorcising wraith protecting lidarbased object detector in automated driving system from appearing attacks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "backporting security patches of web applications a prototype design and implementation on injection vulnerability patches",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "rendering contention channel made practical in web browsers",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "identity confusion in webviewbased mobile appinapp ecosystems",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "ferry stateaware symbolic execution for exploring statedependent program paths",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "hidden trigger backdoor attack on nlp models via linguistic style manipulation",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "understanding the threats of trojaned quantized neural network in model supply chains",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "detecting kernel refcount bugs with twodimensional consistency checking",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "weak links in authentication chains a largescale analysis of email sender spoofing attacks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "understanding promotionasaservice on github",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "bscout direct whole patch presence test for java executables",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "textshield robust text classification based on multimodal embedding and neural machine translation",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "justinians gaavernor robust distributed learning with gradient aggregation agent",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 10,
    "paper_ids": [
      230,
      231,
      232,
      233,
      234,
      235,
      236,
      237,
      238,
      239,
      240,
      241,
      242
    ],
    "papers_without_artifact_ids": [
      243,
      244,
      245,
      246,
      247,
      248,
      249,
      250,
      251,
      252,
      253,
      254,
      255,
      256,
      257,
      258,
      259,
      260,
      261,
      262,
      263
    ]
  },
  {
    "name": "Herbert Bos",
    "display_name": "Herbert Bos",
    "affiliation": "VU Amsterdam",
    "artifact_count": 12,
    "total_papers": 19,
    "total_papers_by_conf": {
      "USENIXSEC": 10,
      "ACSAC": 7,
      "SOSP": 0,
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 1,
      "NDSS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 2,
        "2022": 2,
        "2025": 1,
        "2021": 2
      },
      "ACSAC": {
        "2018": 3,
        "2022": 1,
        "2019": 1,
        "2023": 1,
        "2020": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {},
      "FAST": {
        "2022": 1
      },
      "NDSS": {},
      "OSDI": {}
    },
    "artifact_rate": 63.2,
    "repro_rate": 75.0,
    "functional_rate": 83.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2020,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2018-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 10,
    "badges_reproducible": 9,
    "papers": [
      {
        "title": "Type-After-Type: Practical and Complete Type-Safe Memory Reuse",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TIFF: Using Input Type Inference To Improve Fuzzing",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Triereme: Speeding up hybrid fuzzing through efficient query scheduling",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Practical Data-Only Attack Generation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FloatZone: Accelerating Memory Error Detection using the Floating Point Unit",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Uncontained: Uncovering Container Confusion in the Linux Kernel",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dupefs leaking data over the network with filesystem deduplication side channels",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "collabfuzz a framework for collaborative fuzzing",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "rage against the machine clear a systematic analysis of machine clears and their implications for transient execution attacks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "smash synchronized manysided rowhammer attacks from javascript",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "parmesan sanitizerguided greybox fuzzing",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "vps excavating highlevel c constructs from lowlevel binaries to protect dynamic dispatching",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "now you see me realtime dynamic function call detection",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 11,
    "paper_ids": [
      77,
      78,
      79,
      80,
      81,
      82,
      84,
      85,
      86,
      87,
      88,
      90
    ],
    "papers_without_artifact_ids": [
      93,
      94,
      95,
      96,
      97,
      98,
      264
    ]
  },
  {
    "name": "Stefan Mangard",
    "display_name": "Stefan Mangard",
    "affiliation": "Graz University of Technology",
    "artifact_count": 12,
    "total_papers": 22,
    "total_papers_by_conf": {
      "USENIXSEC": 11,
      "NDSS": 3,
      "ACSAC": 2,
      "CHES": 6
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2020": 1,
        "2023": 2,
        "2022": 1,
        "2025": 3,
        "2021": 1
      },
      "NDSS": {
        "2025": 3
      },
      "ACSAC": {
        "2018": 1,
        "2023": 1
      },
      "CHES": {
        "2024": 4,
        "2022": 2
      }
    },
    "artifact_rate": 54.5,
    "repro_rate": 50.0,
    "functional_rate": 58.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "CHES",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 10,
    "badges_functional": 7,
    "badges_reproducible": 6,
    "papers": [
      {
        "title": "DOPE: DOmain Protection Enforcement with PKS",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Compress: Generate Small and Fast Masked Pipelined Circuits",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Jenny: Securing Syscalls for PKU-based Memory Isolation Systems",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "KernelSnitch: Side Channel-Attacks on Kernel Data Structures",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "powerrelated sidechannel attacks using the android sensor framework",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "tmebox scalable inprocess isolation through intel tmemk memory encryption",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "the doom of device drivers your android device most likely has nday kernel vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "quantile quantifying information leakage",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "voodoo memory tagging authenticated encryption and error correction through magic",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "hashtag hashbased integrity protection for tagged architectures",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "synfi presilicon fault analysis of an opensource secure element",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "riding the waves towards generic singlecycle masking in hardware",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "coco codesign and coverification of masked software implementations on cpus",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "pointing in the right direction securing memory accesses in a faulty world",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 12,
    "paper_ids": [
      265,
      266,
      267,
      268,
      269,
      270,
      271,
      272,
      273,
      274,
      275,
      276
    ],
    "papers_without_artifact_ids": [
      277,
      278,
      279,
      280,
      281,
      282,
      283,
      284,
      285,
      286
    ]
  },
  {
    "name": "Lidong Zhou",
    "display_name": "Lidong Zhou",
    "affiliation": "Microsoft Research",
    "artifact_count": 11,
    "total_papers": 20,
    "total_papers_by_conf": {
      "SOSP": 3,
      "OSDI": 10,
      "EUROSYS": 1,
      "ATC": 1,
      "NSDI": 5
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 2
      },
      "OSDI": {
        "2022": 2,
        "2024": 1,
        "2023": 3,
        "2020": 4
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {
        "2024": 1
      },
      "NSDI": {
        "2009": 1,
        "2017": 1,
        "2023": 1,
        "2012": 1,
        "2016": 1
      }
    },
    "artifact_rate": 55.0,
    "repro_rate": 90.9,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2022,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 11,
    "badges_functional": 11,
    "badges_reproducible": 10,
    "papers": [
      {
        "title": "PIT: Optimization of Dynamic Sparse Deep Learning Models via Permutation Invariant Transformation",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Forerunner: Constraint-based Speculative Transaction Execution for Ethereum",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Geometric Partitioning: Explore the Boundary of Optimal Erasure Code Repair",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ROLLER: Fast and Efficient Tensor Compilation for Deep Learning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SparTA: Deep-Learning Model Sparsity via Tensor-with-Sparsity-Attribute",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Welder: Scheduling Deep Learning Memory Access via Tile-graph",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "VBASE: Unifying Online Vector Similarity Search and Relational Queries via Relaxed Monotonicity",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Optimizing Dynamic Neural Networks with Brainstorm",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Byzantine Ordered Consensus without Byzantine Oligarchy",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rammer: Enabling Holistic Deep Learning Compiler Optimizations with rTasks",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Retiarii: A Deep Learning Exploratory-Training Framework",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "superbench improving cloud ai infrastructure reliability with proactive validation",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "nnscaler constraintguided parallelization plan generation for deep learning training",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "silod a codesign of caching and scheduling for deep learning clusters",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "on modular learning of distributed systems for predicting endtoend latency",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "hived sharing a gpu cluster for deep learning with guarantees",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "tux",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "streamscope continuous reliable distributed processing of big data streams",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "optimizing data shuffling in dataparallel computation by understanding userdefined functions",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "modist transparent model checking of unmodified distributed systems",
        "conference": "NSDI",
        "year": 2009
      }
    ],
    "author_id": 13,
    "paper_ids": [
      146,
      287,
      288,
      150,
      151,
      153,
      154,
      155,
      289,
      156,
      157
    ],
    "papers_without_artifact_ids": [
      290,
      158,
      160,
      161,
      163,
      291,
      292,
      293,
      294
    ]
  },
  {
    "name": "Kui Ren 0001",
    "display_name": "Kui Ren",
    "affiliation": "Zhejiang University",
    "artifact_count": 11,
    "total_papers": 29,
    "total_papers_by_conf": {
      "USENIXSEC": 15,
      "NDSS": 8,
      "EUROSYS": 2,
      "ACSAC": 1,
      "CHES": 2,
      "NSDI": 1,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 6,
        "2023": 1,
        "2022": 1,
        "2025": 7
      },
      "NDSS": {
        "2024": 2,
        "2025": 6
      },
      "EUROSYS": {
        "2025": 1,
        "2022": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "CHES": {
        "2022": 1,
        "2023": 1
      },
      "NSDI": {
        "2023": 1
      },
      "PETS": {}
    },
    "artifact_rate": 37.9,
    "repro_rate": 54.5,
    "functional_rate": 45.5,
    "category": "both",
    "conferences": [
      "ACSAC",
      "EUROSYS",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 10,
    "badges_functional": 5,
    "badges_reproducible": 6,
    "papers": [
      {
        "title": "OPEC: operation-based security isolation for bare-metal embedded systems",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "False Claims against Model Ownership Resolution",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Activation Approximations Can Incur Safety Vulnerabilities in Aligned LLMs: Comprehensive Analysis and Defense",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Membership Inference Attacks Against Vision-Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: On Gradient Leakage in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Delay-allowed Differentially Private Data Stream Release",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MineShark: Cryptomining Traffic Detection at Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "phantom virtualizing switch register resources for accurate sketchbased network measurement",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "a new ppml paradigm for quantized models",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "secure transformer inference made noninteractive",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "explanation as a watermark towards harmless and multibit model ownership verification via watermarking feature attribution",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "bumblebee secure twoparty inference framework for large transformers",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "on the atomicity and efficiency of blockchain payment channels",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "efficient 2pc for constant round secure equality testing and comparison",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "activedaemon unconscious dnn dormancy and waking up via userspecific invisible token",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "symphony path validation at scale",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "devil in the room triggering audio backdoors in the physical world",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "micguard a comprehensive detection system against outofband injection attacks for different level microphonebased devices",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "faceobfuscator defending deep learningbased privacy attacks with gradient descentresistant features in face recognition",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "vibspeech exploring practical wideband eavesdropping via bandlimited signal of vibrationbased side channel",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "efficient persistent fault analysis with small number of chosen plaintexts",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "boomerang metadataprivate messaging under hardware trust",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "demystifying pointer authentication on apple m1",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "free fault leakages for deep exploitation algebraic persistent fault analysis on lightweight block ciphers",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "sgxlock towards efficiently establishing mutual distrust between host application and enclave for sgx",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 14,
    "paper_ids": [
      295,
      296,
      297,
      298,
      299,
      300,
      301,
      187,
      302,
      303,
      304
    ],
    "papers_without_artifact_ids": [
      305,
      306,
      307,
      308,
      309,
      310,
      311,
      312,
      313,
      314,
      315,
      316,
      317,
      318,
      319,
      320,
      321,
      322
    ]
  },
  {
    "name": "Michael Schwarz 0001",
    "display_name": "Michael Schwarz",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 11,
    "total_papers": 15,
    "total_papers_by_conf": {
      "USENIXSEC": 13,
      "NDSS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 2,
        "2023": 2,
        "2022": 5,
        "2025": 2,
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 73.3,
    "repro_rate": 72.7,
    "functional_rate": 63.6,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 8,
    "badges_functional": 7,
    "badges_reproducible": 8,
    "papers": [
      {
        "title": "No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CacheWarp: Software-based Fault Injection using Selective State Reset",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Confusing Value with Enumeration: Studying the Use of CVEs in Academia",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Osiris: Automated Discovery of Microarchitectural Side Channels",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rapid prototyping for microarchitectural attacks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "amd prefetch attacks through power and time",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "æpic leak architecturally leaking uninitialized data from the microarchitecture",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "medusa microarchitectural data leakage via automated attack synthesis",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 15,
    "paper_ids": [
      323,
      324,
      271,
      272,
      325,
      326,
      327,
      108,
      328,
      329,
      330
    ],
    "papers_without_artifact_ids": [
      331,
      332,
      333,
      334
    ]
  },
  {
    "name": "Daniel Gruss",
    "display_name": "Daniel Gruss",
    "affiliation": "Graz University of Technology",
    "artifact_count": 11,
    "total_papers": 19,
    "total_papers_by_conf": {
      "USENIXSEC": 13,
      "NDSS": 5,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 2,
        "2022": 6,
        "2025": 3
      },
      "NDSS": {
        "2024": 1,
        "2025": 4
      },
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 57.9,
    "repro_rate": 63.6,
    "functional_rate": 81.8,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 9,
    "badges_functional": 9,
    "badges_reproducible": 7,
    "papers": [
      {
        "title": "DOPE: DOmain Protection Enforcement with PKS",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Side-Channel Attacks on Optane Persistent Memory",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Half-Double: Hammering From the Next Row Over",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "KernelSnitch: Side Channel-Attacks on Kernel Data Structures",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "counterseveillance performancecounter attacks on amd sevsnp",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "secret spilling drive leaking user behavior through ssd contention",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "a systematic evaluation of novel and existing cache side channels",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "teecorrelate an informationpreserving defense against performancecounter attacks on tees",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "idleleak exploiting idle state side effects for information leakage",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "rapid prototyping for microarchitectural attacks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "amd prefetch attacks through power and time",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "æpic leak architecturally leaking uninitialized data from the microarchitecture",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 16,
    "paper_ids": [
      265,
      335,
      271,
      336,
      272,
      337,
      326,
      327,
      338,
      275,
      276
    ],
    "papers_without_artifact_ids": [
      339,
      340,
      341,
      342,
      343,
      331,
      332,
      333
    ]
  },
  {
    "name": "Youngjin Kwon",
    "display_name": "Youngjin Kwon",
    "affiliation": "KAIST",
    "artifact_count": 10,
    "total_papers": 15,
    "total_papers_by_conf": {
      "OSDI": 3,
      "ATC": 4,
      "SOSP": 2,
      "USENIXSEC": 1,
      "EUROSYS": 3,
      "FAST": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2020": 2
      },
      "ATC": {
        "2022": 2,
        "2023": 1,
        "2024": 1
      },
      "SOSP": {
        "2021": 1,
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2023": 2
      },
      "FAST": {
        "2021": 1
      },
      "NSDI": {
        "2023": 1,
        "2016": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 80.0,
    "functional_rate": 90.0,
    "category": "both",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2022,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 10,
    "badges_functional": 9,
    "badges_reproducible": 8,
    "papers": [
      {
        "title": "LineFS: Efficient SmartNIC Offload of a Distributed File System with Pipeline Parallelism",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "OZZ: Identifying Kernel Out-of-Order Concurrency Bugs with In-Vivo Memory Access Reordering",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DiLOS: Do Not Trade Compatibility for Performance in Memory Disaggregation",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Serving Heterogeneous Machine Learning Models on Multi-GPU Servers with Spatio-Temporal Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Memory Harvesting in Multi-GPU Systems with Hierarchical Unified Virtual Memory",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "EnvPipe: Performance-preserving DNN Training Framework for Saving Energy",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Identifying On-/Off-CPU Bottlenecks Together with Blocked Samples",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Assise: Performance and Availability via Client-local NVM in a Distributed File System",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AGAMOTTO: How Persistent is your Persistent Memory Application?",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "adios to busywaiting for microsecondscale memory disaggregation",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "diagnosing kernel concurrency failures with aitia",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "rearchitecting the tcp stack for iooffloaded content delivery",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "rethinking file mapping for persistent memory",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "earp principled storage sharing and protection for mobile apps",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 18,
    "paper_ids": [
      344,
      345,
      346,
      347,
      348,
      349,
      350,
      351,
      352,
      353
    ],
    "papers_without_artifact_ids": [
      354,
      355,
      356,
      357,
      358
    ]
  },
  {
    "name": "Yinqian Zhang",
    "display_name": "Yinqian Zhang",
    "affiliation": "SUSTech",
    "artifact_count": 10,
    "total_papers": 22,
    "total_papers_by_conf": {
      "USENIXSEC": 14,
      "EUROSYS": 2,
      "ACSAC": 4,
      "ATC": 0,
      "PETS": 0,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 4,
        "2022": 1,
        "2025": 3,
        "2021": 3
      },
      "EUROSYS": {
        "2025": 2
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1,
        "2018": 2
      },
      "ATC": {},
      "PETS": {},
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 45.5,
    "repro_rate": 40.0,
    "functional_rate": 80.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2021,
      2022,
      2023,
      2025
    ],
    "year_range": "2018-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 8,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Ladon: High-Performance Multi-BFT Consensus via Dynamic Global Ordering",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Achilles: Efficient TEE-Assisted BFT Consensus via Rollback Resilient Recovery",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Analyzing Cache Side Channels Using Deep Neural Networks",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Controlled Data Races in Enclaves: Attacks and Detection",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "EKC: A Portable and Extensible Kernel Compartment for De-Privileging Commodity OS",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automated Soundness and Completeness Vetting of Polygon zkEVM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Shadows in Cipher Spaces: Exploiting Tweak Repetition in Hardware Memory Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i know what you asked prompt leakage via kvcache sharing in multitenant llm serving",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "waven webassembly memory virtualization for enclaves",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "breaking the privacy barrier on the feasibility of reorganization attacks on ethereum private transactions",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "pijack physicalworld adversarial attack on monocular depth estimation with perspective hijacking",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "hive a hardwareassisted isolated execution environment for ebpf on aarch64",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "panda security analysis of algorand smart contracts",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "cipherh automated detection of ciphertext sidechannel vulnerabilities in cryptographic implementations",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "reusable enclaves for confidential serverless computing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "tlb poisoning attacks on amd secure encrypted virtualization",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "cipherleaks breaking constanttime cryptography on amd sev via the ciphertext side channel",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "towards formal verification of state continuity for enclave programs",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "txspector uncovering attacks in ethereum from transactions",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 20,
    "paper_ids": [
      359,
      360,
      361,
      362,
      363,
      364,
      365,
      366,
      367,
      368
    ],
    "papers_without_artifact_ids": [
      369,
      370,
      371,
      372,
      373,
      374,
      375,
      376,
      377,
      378,
      379,
      380
    ]
  },
  {
    "name": "Zhiqiang Lin 0001",
    "display_name": "Zhiqiang Lin",
    "affiliation": "Ohio State University",
    "artifact_count": 10,
    "total_papers": 28,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 5,
      "WOOT": 1,
      "USENIXSEC": 18,
      "ACSAC": 4,
      "SC": 0,
      "ATC": 0,
      "SYSTEX": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 4
      },
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 5,
        "2023": 6,
        "2022": 1,
        "2025": 2,
        "2021": 3
      },
      "ACSAC": {
        "2024": 1,
        "2018": 1,
        "2019": 1,
        "2020": 1
      },
      "SC": {},
      "ATC": {},
      "SYSTEX": {}
    },
    "artifact_rate": 35.7,
    "repro_rate": 20.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "PETS",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2018,
      2021,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2018-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 5,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Where's the \"up\"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Controlled Data Races in Enclaves: Attacks and Detection",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AUTOVR: Automated UI Exploration for Detecting Sensitive Data Flow Exposures in Virtual Reality Apps",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "repurposing neural networks for efficient cryptographic computation",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "deanonymizing device identities via sidechannel attacks in exclusiveuse iots mitigation",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "understanding miniapp malware identification dissection and characterization",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "beyond classification inferring function names in stripped binaries via domain adapted llms",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "elfuzz efficient input generation via llmdriven synthesis over fuzzer space",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "breaking the privacy barrier on the feasibility of reorganization attacks on ethereum private transactions",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "egg hunt in tesla infotainment a first look at reverse engineering of qt binaries",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "reusable enclaves for confidential serverless computing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "your exploit is mine instantly synthesizing counterattack smart contract",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "towards formal verification of state continuity for enclave programs",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "automatic policy generation for interservice access control of microservices",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "ρfem efficient backwardedge protection using reversed forwardedge mappings",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "txspector uncovering attacks in ethereum from transactions",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "plugnpwned comprehensive vulnerability analysis of obdii dongles as a new overtheair attack surface in automotive iot",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "breaking secure pairing of bluetooth low energy using downgrade attacks",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "savior securing autonomous vehicles with robust physical invariants",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "firmscope automatic uncovering of privilegeescalation vulnerabilities in preinstalled apps in android firmware",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "analyzing control flow integrity with llvmcfi",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 21,
    "paper_ids": [
      361,
      167,
      381,
      382,
      363,
      383,
      384,
      368,
      385,
      386
    ],
    "papers_without_artifact_ids": [
      387,
      388,
      389,
      390,
      391,
      371,
      392,
      376,
      393,
      379,
      394,
      395,
      380,
      396,
      397,
      398,
      399,
      400
    ]
  },
  {
    "name": "Michael Backes 0001",
    "display_name": "Michael Backes",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 10,
    "total_papers": 32,
    "total_papers_by_conf": {
      "USENIXSEC": 27,
      "ACSAC": 3,
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2020": 2,
        "2023": 5,
        "2022": 3,
        "2025": 7,
        "2021": 6
      },
      "ACSAC": {
        "2021": 1,
        "2019": 1,
        "2020": 1
      },
      "PETS": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 31.2,
    "repro_rate": 30.0,
    "functional_rate": 20.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2020,
      2025
    ],
    "year_range": "2019-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 2,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "JStap: a static pre-filter for malicious JavaScript detection",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Up2Dep: Android Tool Support to Fix Insecure Code Dependencies",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Meme to Threat: On the Hateful Meme Understanding and Induced Hateful Content Generation in Open-Source Vision Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Bridging the Gap in Vision Language Models in Identifying Unsafe Concepts Across Modalities",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream Applications",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding data importance in machine learning attacks does valuable data pose greater harm",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "link stealing attacks against inductive graph neural networks",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "prompt stealing attacks against texttoimage generation models",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "quantifying privacy risks of prompts in visual prompt learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "securitynet assessing machine learning vulnerabilities on public models",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "instruction backdoor attacks against customized llms",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "bilingual problems studying the security risks incurred by native extensions in scripting languages",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "twoinone a model hijacking attack against text generation models",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "privtrace differentially private trajectory synthesis by adaptive markov models",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "faceauditor data auditing in facial recognition systems",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "unganable defending against ganbased face manipulation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "industrial practitioners mental models of adversarial machine learning",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "mldoctor holistic risk assessment of inference attacks against machine learning models",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "inference attacks against graph neural networks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "badnl backdoor attacks against nlp models with semanticpreserving improvements",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "a11y and privacy dont have to be mutually exclusive constraining accessibility service misuse on android",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "privsyn differentially private data synthesis",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "stealing links from graph neural networks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "share first ask later or never studying violations of gdprs explicit consent in android apps",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "why eve and mallory still love android revisiting tls insecurity in android applications",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "explanation beats context the effect of timing rationales on users runtime permission decisions",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "updatesleak data set inference and reconstruction attacks in online learning",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 22,
    "paper_ids": [
      401,
      402,
      403,
      181,
      182,
      184,
      185,
      188,
      190,
      191
    ],
    "papers_without_artifact_ids": [
      193,
      196,
      197,
      198,
      199,
      200,
      404,
      201,
      202,
      203,
      205,
      405,
      206,
      208,
      209,
      406,
      210,
      211,
      407,
      408,
      409,
      212
    ]
  },
  {
    "name": "Matthias Hollick",
    "display_name": "Matthias Hollick",
    "affiliation": "TU Darmstadt",
    "artifact_count": 10,
    "total_papers": 18,
    "total_papers_by_conf": {
      "PETS": 6,
      "NDSS": 1,
      "WOOT": 1,
      "USENIXSEC": 10,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 2,
        "2024": 1,
        "2021": 1,
        "2026": 1
      },
      "NDSS": {
        "2025": 1
      },
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2020": 4,
        "2022": 1,
        "2021": 3
      },
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 55.6,
    "repro_rate": 40.0,
    "functional_rate": 70.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "PETS",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2020,
      2021,
      2022,
      2023,
      2024,
      2025,
      2026
    ],
    "year_range": "2020-2026",
    "recent_count": 4,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 7,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Detection of Anomalies in Electric Vehicle Charging Sessions",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: On the Effectiveness of Control-Flow Integrity in Practice",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "WatchWitch: Interoperability, Privacy, and Autonomy for the Apple Watch",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Okay Google, Where's My Tracker? Security, Privacy, and Performance Evaluation of Google's Find My Device Network",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ad Personalization and Transparency in Mobile Ecosystems: A Comparative Analysis of Google's and Apple's EU App Stores",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Starshields for iOS: Navigating the Security Cosmos in Satellite Communication",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "please unstalk me understanding stalking with bluetooth trackers and democratizing antistalking protection",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "oh no my ran breaking into an oran 5g indoor base station",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "how website owners face privacy issues thematic analysis of responses from a covert notification study reveals diverse circumstances and challenges",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "effective notification campaigns on the web a matter of trust framing and support",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "privatedrop practical privacypreserving authentication for apple airdrop",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "toothpicker apple picking in the ios bluetooth stack",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "nfcgate opening the door for nfc security research with a smartphonebased toolkit",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "firmware insider bluetooth randomness is mostly random",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 23,
    "paper_ids": [
      410,
      411,
      412,
      413,
      414,
      415,
      416,
      417,
      418,
      419
    ],
    "papers_without_artifact_ids": [
      420,
      421,
      422,
      423,
      424,
      425,
      426,
      427
    ]
  },
  {
    "name": "Bo-Yin Yang",
    "display_name": "Bo-Yin Yang",
    "affiliation": "Academia Sinica",
    "artifact_count": 10,
    "total_papers": 12,
    "total_papers_by_conf": {
      "NDSS": 1,
      "CHES": 11,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "CHES": {
        "2022": 4,
        "2021": 3,
        "2025": 3,
        "2023": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 83.3,
    "repro_rate": 10.0,
    "functional_rate": 10.0,
    "category": "security",
    "conferences": [
      "CHES",
      "NDSS"
    ],
    "years": [
      2021,
      2022,
      2023,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 10,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NTT Multiplication for NTT-unfriendly Rings New Speed Records for Saber and NTRU on Cortex-M4 and AVX2",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Rainbow on Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Oil and Vinegar: Modern Parameters and Implementations",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PQConnect: Automated Post-Quantum End-to-End Tunnels",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a new trick for polynomial multiplication a verified crt polymul utilizing a monomial factor",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "sieving with streaming memory access",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 24,
    "paper_ids": [
      428,
      429,
      430,
      431,
      432,
      433,
      434,
      435,
      436,
      437
    ],
    "papers_without_artifact_ids": [
      438,
      439
    ]
  },
  {
    "name": "David A. Basin",
    "display_name": "David A. Basin",
    "affiliation": "ETH Zurich",
    "artifact_count": 10,
    "total_papers": 18,
    "total_papers_by_conf": {
      "USENIXSEC": 12,
      "PETS": 4,
      "ACSAC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2020": 1,
        "2023": 2,
        "2022": 1,
        "2025": 3,
        "2021": 1
      },
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2024": 2
      },
      "ACSAC": {
        "2023": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 55.6,
    "repro_rate": 40.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 9,
    "badges_functional": 5,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "PURE: Payments with UWB RElay-protection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automated Large-Scale Analysis of Cookie Notice Compliance",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automating Cookie Consent and GDPR Violation Detection",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Formal Analysis of Apple's iMessage PQ3 Protocol",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Oblivious Digital Tokens",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "User-Controlled Privacy: Taint, Track, and Control",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Model-driven Privacy",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "camp compositional amplification attacks against dns",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "soap a social authentication protocol",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "sealclub computeraided paper document authentication",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "rhine robust and highperformance internet naming with e2e authenticity",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "inducing authentication failures to bypass credit card pins",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "fabrid flexible attestationbased routing for interdomain networks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "checking websites gdpr consent compliance for marketing emails",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "card brand mixup attack bypassing the pin in nonvisa cards by using them for visa transactions",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 25,
    "paper_ids": [
      440,
      441,
      442,
      443,
      444,
      445,
      446,
      447,
      448,
      449
    ],
    "papers_without_artifact_ids": [
      450,
      451,
      452,
      453,
      454,
      455,
      456,
      457
    ]
  },
  {
    "name": "Yinzhi Cao",
    "display_name": "Yinzhi Cao",
    "affiliation": "Johns Hopkins University",
    "artifact_count": 10,
    "total_papers": 13,
    "total_papers_by_conf": {
      "USENIXSEC": 13,
      "SOSP": 0,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 3,
        "2022": 4,
        "2025": 5
      },
      "SOSP": {},
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 76.9,
    "repro_rate": 40.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 8,
    "badges_functional": 5,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "McFIL: Model Counting Functionality-Inherent Leakage",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mining Node.js Vulnerabilities via Object Dependence Graph and Query",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CertPHash: Towards Certified Perceptual Hashing via Robust Training",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Lifecycle Unlearning Commitment Management: Measuring Sample-level Unlearning Completeness",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The DOMino Effect: Detecting and Exploiting DOM Clobbering Gadgets via Concolic Execution with Symbolic DOM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "backporting security patches of web applications a prototype design and implementation on injection vulnerability patches",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "rendering contention channel made practical in web browsers",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "identity confusion in webviewbased mobile appinapp ecosystems",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 26,
    "paper_ids": [
      230,
      458,
      459,
      460,
      461,
      462,
      463,
      464,
      239,
      240
    ],
    "papers_without_artifact_ids": [
      252,
      253,
      254
    ]
  },
  {
    "name": "Ion Stoica",
    "display_name": "Ion Stoica",
    "affiliation": "Univ. of California - Berkeley",
    "artifact_count": 9,
    "total_papers": 58,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 9,
      "USENIXSEC": 1,
      "EUROSYS": 6,
      "ATC": 1,
      "FAST": 1,
      "NSDI": 39
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2022": 1,
        "2024": 1,
        "2023": 4,
        "2020": 3
      },
      "USENIXSEC": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2024": 1,
        "2021": 2,
        "2022": 2
      },
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2019": 1
      },
      "NSDI": {
        "2021": 4,
        "2013": 1,
        "2014": 1,
        "2017": 2,
        "2024": 2,
        "2019": 2,
        "2025": 1,
        "2023": 3,
        "2006": 1,
        "2012": 3,
        "2016": 5,
        "2022": 2,
        "2005": 1,
        "2004": 2,
        "2018": 1,
        "2011": 2,
        "2007": 3,
        "2015": 3
      }
    },
    "artifact_rate": 15.5,
    "repro_rate": 77.8,
    "functional_rate": 88.9,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2022,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 8,
    "badges_functional": 8,
    "badges_reproducible": 7,
    "papers": [
      {
        "title": "Efficient Memory Management for Large Language Model Serving with PagedAttention",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Jiffy: elastic far-memory for stateful serverless analytics",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "D3: a dynamic deadline-driven approach for building autonomous vehicles",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fairness in Serving Large Language Models",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ExoFlow: A Universal Workflow System for Exactly-Once DAGs",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DORY: An Encrypted Search System with Distributed Trust",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Ansor: Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "RackSched: A Microsecond-Scale Scheduler for Rack-Scale Computers",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "skyserve serving ai models across regions and clouds with spot instances",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "superserve finegrained inference serving for unpredictable workloads",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "starburst a costaware scheduler for hybrid cloud",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "zkml an optimizing system for ml inference in zeroknowledge proofs",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "cant be late optimizing spot instance savings under deadlines",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "cloudcast highthroughput costaware overlay multicast in the cloud",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "shepherd serving dnns in the wild",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "skyplane optimizing transfer cost and throughput using cloudaware overlays",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "skypilot an intercloud broker for sky computing",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "cilantro performanceaware resource allocation for general objectives via online feedback",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "alpaserve statistical multiplexing with model parallelism for deep learning serving",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "take out the trache maximizing transactional cache hit rate",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "nethint whitebox networking for multitenant data centers",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "ekya continuous learning of video analytics models on edge compute servers",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "alpa automating inter and intraoperator parallelism for distributed deep learning",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "readwrite quorum systems made practical",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "rubberband cloudbased hyperparameter tuning",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "twenty years after hierarchical corestateless fair queueing",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "caerus nimble task scheduling for serverless analytics",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "tegra efficient adhoc analytics on evolving graphs",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "ownership a distributed futures system for finegrained tasks",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "distcache provable load balancing for largescale storage systems with distributed caching",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "confluo distributed monitoring and diagnosis stack for highspeed networks",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "shuffling fast and slow scalable analytics on serverless infrastructure",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "netchain scalefree subrtt coordination",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "opaque an oblivious and encrypted distributed analytics platform",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "clipper a lowlatency online prediction serving system",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "fairride nearoptimal fair cache sharing",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "hug multiresource fairness for correlated and elastic demands",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "cfa a practical prediction system for video qoe optimization",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "blowfish dynamic storageperformance tradeoff in data stores",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "ernest efficient performance prediction for largescale advanced analytics",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "celliq realtime cellular network analytics at scale",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "c3 internetscale control plane for video quality optimization",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "succinct enabling queries on compressed data",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "grass trimming stragglers in approximation analytics",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "effective straggler mitigation attack of the clones",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "resilient distributed datasets a faulttolerant abstraction for inmemory cluster computing",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "reoptimizing data parallel computing",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "pacman coordinated memory caching for parallel jobs",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "mesos a platform for finegrained resource sharing in the data center",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "dominant resource fairness fair allocation of multiple resource types",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "xtrace a pervasive network tracing framework",
        "conference": "NSDI",
        "year": 2007
      },
      {
        "title": "saar a shared control plane for overlay multicast",
        "conference": "NSDI",
        "year": 2007
      },
      {
        "title": "friday global comprehension for distributed replay",
        "conference": "NSDI",
        "year": 2007
      },
      {
        "title": "ocala an architecture for supporting legacy applications over overlays",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "beacon vector routing scalable pointtopoint routing in wireless sensornets",
        "conference": "NSDI",
        "year": 2005
      },
      {
        "title": "listen and whisper security mechanisms for bgp awarded best student paper",
        "conference": "NSDI",
        "year": 2004
      },
      {
        "title": "overqos an overlay based architecture for enhancing internet qos",
        "conference": "NSDI",
        "year": 2004
      }
    ],
    "author_id": 29,
    "paper_ids": [
      465,
      466,
      467,
      468,
      469,
      470,
      471,
      472,
      473
    ],
    "papers_without_artifact_ids": [
      474,
      475,
      476,
      477,
      478,
      479,
      480,
      481,
      482,
      483,
      484,
      485,
      486,
      487,
      488,
      489,
      490,
      491,
      492,
      493,
      494,
      495,
      496,
      497,
      498,
      499,
      500,
      501,
      502,
      503,
      504,
      505,
      506,
      507,
      508,
      509,
      510,
      511,
      512,
      513,
      514,
      515,
      516,
      517,
      518,
      519,
      520,
      521,
      522
    ]
  },
  {
    "name": "Sanidhya Kashyap",
    "display_name": "Sanidhya Kashyap",
    "affiliation": "EPFL",
    "artifact_count": 9,
    "total_papers": 13,
    "total_papers_by_conf": {
      "SOSP": 4,
      "OSDI": 4,
      "EUROSYS": 1,
      "ATC": 1,
      "FAST": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 2,
        "2024": 1
      },
      "OSDI": {
        "2021": 1,
        "2022": 2,
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2023": 1,
        "2025": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 69.2,
    "repro_rate": 88.9,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2022,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 9,
    "badges_functional": 9,
    "badges_reproducible": 8,
    "papers": [
      {
        "title": "Enabling High-Performance and Secure Userspace NVM File Systems with the Trio Architecture",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PACTree: A High Performance Persistent Range Index Using PAC Guidelines",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fast, Flexible, and Practical Kernel Extensions",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Transparent Multicore Scaling of Single-Threaded Network Functions",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Monarch: A Fuzzing Framework for Distributed File Systems",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "NrOS: Effective Replication and Sharing in an Operating System",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Application-Informed Kernel Synchronization Primitives",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ODINFS: Scaling PM Performance with Opportunistic Delegation",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Ship your Critical Section, Not Your Data: Enabling Transparent Delegation with TCLOCKS",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "polystore exploiting combined capabilities of heterogeneous storage",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "tenet memory safe and fault tolerant persistent transactional memory",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "birds of a feather flock together scaling rdma rpcs with flock",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "preventing useafterfree attacks with fast forward allocation",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 17,
    "paper_ids": [
      523,
      524,
      525,
      526,
      1,
      527,
      528,
      529,
      530
    ],
    "papers_without_artifact_ids": [
      531,
      532,
      533,
      534
    ]
  },
  {
    "name": "Konrad Rieck",
    "display_name": "Konrad Rieck",
    "affiliation": "TU Berlin",
    "artifact_count": 9,
    "total_papers": 12,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 5,
      "ACSAC": 4,
      "EUROSYS": 1,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1,
        "2023": 2
      },
      "EUROSYS": {
        "2021": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 44.4,
    "functional_rate": 44.4,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PAVUDI: Patch-based Vulnerability Discovery using Machine Learning",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "On the Detection of Image-Scaling Attacks in Machine Learning",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "I still know it's you! On Challenges in Anonymizing Source Code",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LogPicker: Strengthening Certificate Transparency Against Covert Adversaries",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "evil from within machine learning backdoors through dormant hardware trojans",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "dos and donts of machine learning in computer security",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "tagvet vetting malware tags using explainable machine learning",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 32,
    "paper_ids": [
      535,
      536,
      537,
      215,
      216,
      103,
      538,
      539,
      225
    ],
    "papers_without_artifact_ids": [
      540,
      541,
      542
    ]
  },
  {
    "name": "Qi Li 0002",
    "display_name": "Qi Li",
    "affiliation": "Tsinghua University",
    "artifact_count": 9,
    "total_papers": 36,
    "total_papers_by_conf": {
      "USENIXSEC": 21,
      "NDSS": 10,
      "CHES": 1,
      "ACSAC": 3,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 10,
        "2023": 7,
        "2022": 2,
        "2025": 2
      },
      "NDSS": {
        "2024": 8,
        "2025": 2
      },
      "CHES": {
        "2024": 1
      },
      "ACSAC": {
        "2021": 2,
        "2018": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 11.1,
    "functional_rate": 55.6,
    "category": "security",
    "conferences": [
      "CHES",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 9,
    "badges_functional": 5,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "An Efficient Design of Intelligent Network Data Plane",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DISPATCH: Unraveling Security Patches from Entangled Code Changes",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "offpath tcp hijacking in wifi networks a packetsize side channel attack",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "redan an empirical study on remote dos attacks against nat networks",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "exploiting sequence number leakage tcp hijacking in natenabled wifi networks",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "pencil private and extensible collaborative learning without the noncolluding assumption",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "compensating removed frequency components thwarting voice spectrum reduction attacks",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "drr a decentralized scalable and auditable architecture for rpki repository",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "you can use but cannot recognize preserving visual privacy in deep neural networks",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "printlistener uncovering the vulnerability of fingerprint authentication via the finger friction sound",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "lowquality training data only a robust framework for detecting encrypted malicious network traffic",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "brainonswitch towards advanced intelligent network data plane via nndriven traffic analysis at linespeed",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "demystifying the security implications in iot device rental services",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "hijacking attacks against neural network by analyzing training data",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "improving mlbased binary function similarity detection by assessing and deprioritizing control flow graph features",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "transferability of whitebox perturbations queryefficient adversarial attacks against commercial dnn services",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "more simplicity for trainers more opportunity for attackers blackbox attacks on speaker recognition systems by inferring feature extractor",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "learning with semantics towards a semanticsaware routing anomaly detection system",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "defending against data reconstruction attacks in federated learning an information theory approach",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "what if is not enough fixing null pointer dereference with contextual check",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "the maginot line attacking the boundary of dns caching protection",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "kenku towards efficient and stealthy blackbox adversarial attacks against asr systems",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "rosetta enabling robust tls encrypted traffic classification in diverse network environments with tcpaware traffic augmentation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "cross container attacks the bewildered ebpf on clouds",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "subverting website fingerprinting defenses with robust traffic representation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "offpath network traffic manipulation via revitalized icmp redirect attacks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "on detecting growingup behaviors of malicious accounts in privacycentric mobile social networks",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "try before you buy privacypreserving data evaluation on cloudbased machine learning data marketplace",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "a multitab website fingerprinting attack",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 33,
    "paper_ids": [
      543,
      544,
      170,
      545,
      546,
      547,
      548,
      549,
      550
    ],
    "papers_without_artifact_ids": [
      551,
      552,
      553,
      554,
      555,
      556,
      557,
      558,
      559,
      560,
      561,
      562,
      563,
      564,
      565,
      566,
      567,
      568,
      569,
      570,
      571,
      572,
      573,
      574,
      575,
      576,
      577
    ]
  },
  {
    "name": "Matthias J. Kannwischer",
    "display_name": "Matthias J. Kannwischer",
    "affiliation": "Academia Sinica, Taiwan",
    "artifact_count": 9,
    "total_papers": 9,
    "total_papers_by_conf": {
      "CHES": 9
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 2,
        "2022": 2,
        "2021": 3,
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 9,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fast and Clean: Auditable high-performance assembly via constraint solving",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NTT Multiplication for NTT-unfriendly Rings New Speed Records for Saber and NTRU on Cortex-M4 and AVX2",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Compact Dilithium Implementations on Cortex-M3 and Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Rainbow on Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "KyberSlash: Exploiting secret-dependent division timings in Kyber implementations",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Oil and Vinegar: Modern Parameters and Implementations",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 34,
    "paper_ids": [
      578,
      579,
      428,
      431,
      432,
      580,
      433,
      581,
      436
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jörg Schwenk",
    "display_name": "Jörg Schwenk",
    "affiliation": "Ruhr-University Bochum",
    "artifact_count": 9,
    "total_papers": 13,
    "total_papers_by_conf": {
      "USENIXSEC": 12,
      "WOOT": 0,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 4,
        "2022": 2,
        "2025": 1,
        "2021": 2
      },
      "WOOT": {},
      "PETS": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 69.2,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 9,
    "badges_functional": 9,
    "badges_reproducible": 9,
    "papers": [
      {
        "title": "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Every Signature is Broken: On the Insecurity of Microsoft Office's OOXML Signatures",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Internet-Based State Learning of TLS State Machines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "raccoon attack finding and exploiting mostsignificantbitoracles in tlsdhe",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "alpaca application layer protocol confusion analyzing and mitigating cracks in tls authentication",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "t0rtt noninteractive immediate forwardsecret singlepass circuit construction",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "office document security and privacy",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 7907,
    "paper_ids": [
      582,
      583,
      584,
      585,
      586,
      587,
      588,
      589,
      590
    ],
    "papers_without_artifact_ids": [
      591,
      592,
      593,
      594
    ]
  },
  {
    "name": "XiaoFeng Wang 0001",
    "display_name": "XiaoFeng Wang",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 9,
    "total_papers": 22,
    "total_papers_by_conf": {
      "USENIXSEC": 20,
      "NDSS": 2,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 5,
        "2020": 2,
        "2023": 6,
        "2022": 1,
        "2025": 3,
        "2021": 3
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 40.9,
    "repro_rate": 77.8,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 9,
    "badges_functional": 6,
    "badges_reproducible": 7,
    "papers": [
      {
        "title": "Malla: Demystifying Real-world Large Language Model Integrated Malicious Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Verified Confidential Computing as a Service Framework for Privacy Preservation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Topic-FlipRAG: Topic-Orientated Adversarial Opinion Manipulation Attacks to Retrieval-Augmented Generation Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sharpness-Aware Initialization: Improving Differentially Private Machine Learning from First Principles",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PICACHV: Formally Verified Data Use Policy Enforcement for Secure Data Analytics",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Road to Trust: Building Enclaves within Confidential VMs",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gradient shaping enhancing backdoor attack against reverse engineering",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "tossing in the dark practical bitflipping on graybox deep neural networks for runtime trojan injection",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "navigating the privacy compliance maze understanding risks with privacyconfigurable mobile sdks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "dpadapter improving differentially private deep learning through noise tolerance pretraining",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "union under duress understanding hazards of duplicate resource mismediation in android software supply chain",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "are you spying on me largescale analysis on iot data exposure through companion apps",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "sherlock on specs building lte conformance tests through automated reasoning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "seeing the forest for the trees understanding security hazards in the 3gpp ecosystem through intelligent analysis on change requests",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "demon in the variant statistical analysis of dnns for robust backdoor contamination detection",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "understanding malicious crosslibrary data harvesting on android",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "evil under the sun understanding and discovering attacks on ethereum decentralized applications",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "devils whisper a general approach for physical adversarial attacks against commercial blackbox speech recognition devices",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "shattered chain of trust understanding security risks in crosscloud iot access delegation",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 36,
    "paper_ids": [
      595,
      596,
      171,
      597,
      598,
      599,
      600,
      601,
      602
    ],
    "papers_without_artifact_ids": [
      603,
      604,
      605,
      606,
      607,
      608,
      609,
      610,
      611,
      612,
      613,
      614,
      615
    ]
  },
  {
    "name": "Yuan Zhang 0009",
    "display_name": "Yuan Zhang",
    "affiliation": "Fudan University",
    "artifact_count": 9,
    "total_papers": 14,
    "total_papers_by_conf": {
      "USENIXSEC": 13,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 2,
        "2023": 1,
        "2022": 2,
        "2025": 7,
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 64.3,
    "repro_rate": 11.1,
    "functional_rate": 22.2,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 8,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply Chains",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Pig in a Poke: Automatically Detecting and Exploiting Link Following Vulnerabilities in Windows File Operations",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "misdirection of trust demystifying the abuse of dedicated url shortening service",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "backporting security patches of web applications a prototype design and implementation on injection vulnerability patches",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "identity confusion in webviewbased mobile appinapp ecosystems",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "detecting kernel refcount bugs with twodimensional consistency checking",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "bscout direct whole patch presence test for java executables",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 37,
    "paper_ids": [
      230,
      231,
      233,
      235,
      236,
      237,
      238,
      239,
      240
    ],
    "papers_without_artifact_ids": [
      243,
      252,
      254,
      258,
      261
    ]
  },
  {
    "name": "Tianyin Xu",
    "display_name": "Tianyin Xu",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 8,
    "total_papers": 20,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 5,
      "EUROSYS": 4,
      "ATC": 2,
      "SC": 0,
      "FAST": 2,
      "NSDI": 5,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2022": 2,
        "2024": 1,
        "2023": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2023": 1,
        "2024": 1,
        "2022": 1
      },
      "ATC": {
        "2022": 1,
        "2024": 1
      },
      "SC": {},
      "FAST": {
        "2020": 1,
        "2018": 1
      },
      "NSDI": {
        "2021": 1,
        "2025": 2,
        "2023": 1,
        "2016": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 75.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 8,
    "badges_functional": 8,
    "badges_reproducible": 6,
    "papers": [
      {
        "title": "Acto: Automatic End-to-End Testing for Operation Correctness of Cloud System Management",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "vSoC: Efficient Virtual System-on-Chip on Heterogeneous Hardware",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Multi-Grained Specifications for Distributed System Model Checking and Verification",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fail through the Cracks: Cross-System Interaction Failures in Modern Cloud Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fast (Trapless) Kernel Probes Everywhere",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Automatic Reliability Testing For Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Anvil: Verifying Liveness of Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Relational Debugging - Pinpointing Root Causes of Performance Problems",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mitigating scalability walls of rdmabased container networks",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "dissecting and streamlining the interactive loop of mobile cloud gaming",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "automatic root cause analysis via large language models for cloud incidents",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "pushbutton reliability testing for cloudbacked applications with rainmaker",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "depfast orchestrating code of quorum systems",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "verified programs can party optimizing kernel extensions via postverification merging",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "trinity highperformance mobile emulation through graphics projection",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "fast and light bandwidth testing for internet users",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "lockfree collaboration support for cloud storage services with operation inference and transformation",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "testing configuration changes in context to prevent production failures",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "towards webbased delta synchronization for cloud storage services",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "exploring crossapplication cellular traffic optimization with baidu trafficguard",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 27,
    "paper_ids": [
      616,
      617,
      618,
      619,
      620,
      621,
      622,
      623
    ],
    "papers_without_artifact_ids": [
      624,
      625,
      626,
      627,
      628,
      629,
      630,
      631,
      632,
      633,
      634,
      635
    ]
  },
  {
    "name": "Kang Chen",
    "display_name": "Kang Chen",
    "affiliation": "Tsinghua University",
    "artifact_count": 8,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 6,
      "EUROSYS": 3,
      "ATC": 1,
      "SC": 0,
      "FAST": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2,
        "2021": 2,
        "2024": 2
      },
      "EUROSYS": {
        "2025": 1,
        "2023": 1,
        "2024": 1
      },
      "ATC": {
        "2023": 1
      },
      "SC": {},
      "FAST": {
        "2021": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 72.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2021,
      2023,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 8,
    "badges_functional": 8,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Falcon: Fast OLTP Engine for Persistent Cache and Non-Volatile Memory",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Partial Failure Resilient Memory Management System for (CXL-based) Distributed Shared Memory",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Random Walks on Huge Graphs at Cache Efficiency",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Geometric Partitioning: Explore the Boundary of Optimal Erasure Code Repair",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TrEnv: Transparently Share Serverless Execution Environments Across Different Functions and Nodes",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Skyloft: A General High-Efficient Scheduling Framework in User Space",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AlloyStack: A Library Operating System for Serverless Workflow Applications",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Explore Data Placement Algorithm for Balanced Recovery Load Distribution",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "noctua towards automated and practical finegrained consistency analysis",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "tea a generalpurpose temporal graph random walk engine",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "roart rangequery optimized persistent art",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 28,
    "paper_ids": [
      636,
      637,
      638,
      288,
      639,
      640,
      641,
      642
    ],
    "papers_without_artifact_ids": [
      643,
      644,
      645
    ]
  },
  {
    "name": "Diyu Zhou",
    "display_name": "Diyu Zhou",
    "affiliation": "Peking University",
    "artifact_count": 8,
    "total_papers": 11,
    "total_papers_by_conf": {
      "OSDI": 3,
      "NDSS": 1,
      "ATC": 2,
      "SOSP": 2,
      "EUROSYS": 1,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 2,
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      },
      "ATC": {
        "2022": 1,
        "2024": 1
      },
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "FAST": {
        "2026": 1,
        "2023": 1
      }
    },
    "artifact_rate": 72.7,
    "repro_rate": 75.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ATC",
      "EUROSYS",
      "NDSS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 8,
    "badges_functional": 8,
    "badges_reproducible": 6,
    "papers": [
      {
        "title": "Enabling High-Performance and Secure Userspace NVM File Systems with the Trio Architecture",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Practical Verification of System-Software Components Written in Standard C",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Transparent Multicore Scaling of Single-Threaded Network Functions",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Taming Hot Bloat Under Virtualization with HUGESCOPE",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Application-Informed Kernel Synchronization Primitives",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ODINFS: Scaling PM Performance with Opportunistic Delegation",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Ship your Critical Section, Not Your Data: Enabling Transparent Delegation with TCLOCKS",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "xerxes extensive exploration of scalable hardware systems with cxlbased simulation framework",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "tenet memory safe and fault tolerant persistent transactional memory",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "rrc responsive replicated containers",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 40,
    "paper_ids": [
      523,
      646,
      526,
      647,
      648,
      528,
      529,
      530
    ],
    "papers_without_artifact_ids": [
      649,
      532,
      650
    ]
  },
  {
    "name": "Taesoo Kim",
    "display_name": "Taesoo Kim",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 8,
    "total_papers": 19,
    "total_papers_by_conf": {
      "OSDI": 2,
      "ATC": 2,
      "SOSP": 1,
      "USENIXSEC": 7,
      "EUROSYS": 1,
      "ACSAC": 2,
      "NSDI": 1,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2022": 1
      },
      "ATC": {
        "2022": 2
      },
      "SOSP": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 3,
        "2022": 1,
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ACSAC": {
        "2021": 1,
        "2022": 1
      },
      "NSDI": {
        "2017": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 42.1,
    "repro_rate": 75.0,
    "functional_rate": 75.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "ATC",
      "EUROSYS",
      "OSDI",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2022,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 6,
    "badges_reproducible": 6,
    "papers": [
      {
        "title": "Rudra: Finding Memory Safety Bugs in Rust at the Ecosystem Scale",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rakis: Secure Fast I/O Primitives Across Trust Boundaries on Intel SGX",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Modulo: Finding Convergence Failure Bugs in Distributed Systems with Divergence Resync Models",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "POPKORN: Popping Windows Kernel Drivers At Scale",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automatic Techniques to Systematically Discover New Heap Exploitation Primitives",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "autofz: Automated Fuzzer Composition at Runtime",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Application-Informed Kernel Synchronization Primitives",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "statically discover crossentry useafterfree vulnerabilities in the linux kernel",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "malintent coverage guided intent fuzzing framework for android",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "sense enhancing microarchitectural awareness for tees via subscriptionbased notification",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "i experienced more than 10 defi scams on defi users perception of security breaches and countermeasures",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "acon",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "aexnotify thwarting precise singlestepping attacks through interrupt awareness for intel sgx enclaves",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "pridwen universally hardening sgx programs via loadtime synthesis",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "a look back on a function identification problem",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "finding consensus bugs in ethereum via multitransaction differential fuzzing",
        "conference": "OSDI",
        "year": 2021
      },
      {
        "title": "preventing useafterfree attacks with fast forward allocation",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "enhancing security and privacy of tors ecosystem by using trusted execution environments",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 41,
    "paper_ids": [
      651,
      652,
      653,
      654,
      655,
      656,
      657,
      528
    ],
    "papers_without_artifact_ids": [
      658,
      659,
      660,
      661,
      662,
      663,
      664,
      665,
      666,
      534,
      667
    ]
  },
  {
    "name": "Raluca Ada Popa",
    "display_name": "Raluca Ada Popa",
    "affiliation": "Univ. of California - Berkeley",
    "artifact_count": 8,
    "total_papers": 19,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 4,
      "USENIXSEC": 9,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 5,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2021": 1,
        "2024": 2,
        "2020": 1
      },
      "USENIXSEC": {
        "2020": 4,
        "2022": 1,
        "2021": 4
      },
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2014": 1,
        "2017": 1,
        "2016": 1,
        "2020": 1,
        "2018": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 42.1,
    "repro_rate": 75.0,
    "functional_rate": 75.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2022,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 6,
    "badges_reproducible": 6,
    "papers": [
      {
        "title": "Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Piranha: A GPU Platform for Secure Computation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MAGE: Nearly Zero-Cost Virtual Memory for Secure Computation",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Flock: A Framework for Deploying On-Demand Distributed Trust",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Secret Key Recovery in a Global-Scale End-to-End Encryption System",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DORY: An Encrypted Search System with Distributed Trust",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "muse secure inference resilient to malicious clients",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "senate a maliciouslysecure mpc platform for collaborative analytics",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "ghostor toward a secure datasharing system from decentralized trust",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "delphi a cryptographic inference service for neural networks",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "visor privacypreserving video analytics as a cloud service",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "an offchip attack on hardware enclaves via the memory bus",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "civet an efficient java partitioning framework for hardware enclaves",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "safebricks shielding network functions in the cloud",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "opaque an oblivious and encrypted distributed analytics platform",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "embark securely outsourcing middleboxes to the cloud",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "building web applications on top of encrypted data using mylar",
        "conference": "NSDI",
        "year": 2014
      }
    ],
    "author_id": 30,
    "paper_ids": [
      668,
      669,
      670,
      468,
      671,
      672,
      673,
      471
    ],
    "papers_without_artifact_ids": [
      674,
      675,
      676,
      677,
      678,
      679,
      680,
      681,
      499,
      682,
      683
    ]
  },
  {
    "name": "Yajin Zhou",
    "display_name": "Yajin Zhou",
    "affiliation": "Zhejiang University",
    "artifact_count": 8,
    "total_papers": 12,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 7,
      "EUROSYS": 2,
      "ATC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 3,
        "2025": 2
      },
      "EUROSYS": {
        "2025": 1,
        "2022": 1
      },
      "ATC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 62.5,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ATC",
      "EUROSYS",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 8,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "Forerunner: Constraint-based Speculative Transaction Execution for Ethereum",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ParallelEVM: Operation-Level Concurrent Transaction Execution for EVM-Compatible Blockchains",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "OPEC: operation-based security isolation for bare-metal embedded systems",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SlimArchive: A Lightweight Architecture for Ethereum Archive Nodes",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dissecting payloadbased transaction phishing on ethereum",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "said stateaware defense against injection attacks on invehicle network",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "towards automatically reverse engineering vehicle diagnostic protocols",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "sgxlock towards efficiently establishing mutual distrust between host application and enclave for sgx",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 43,
    "paper_ids": [
      287,
      684,
      295,
      685,
      686,
      687,
      688,
      689
    ],
    "papers_without_artifact_ids": [
      690,
      691,
      692,
      322
    ]
  },
  {
    "name": "Ang Chen 0001",
    "display_name": "Ang Chen",
    "affiliation": "University of Michigan",
    "artifact_count": 8,
    "total_papers": 22,
    "total_papers_by_conf": {
      "SOSP": 2,
      "USENIXSEC": 6,
      "EUROSYS": 2,
      "ACSAC": 2,
      "FAST": 1,
      "NSDI": 9,
      "NDSS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1,
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 2,
        "2023": 1,
        "2022": 1,
        "2021": 1
      },
      "EUROSYS": {
        "2024": 2
      },
      "ACSAC": {
        "2018": 2
      },
      "FAST": {
        "2021": 1
      },
      "NSDI": {
        "2017": 1,
        "2019": 1,
        "2025": 1,
        "2023": 1,
        "2020": 2,
        "2022": 3
      },
      "NDSS": {},
      "OSDI": {}
    },
    "artifact_rate": 36.4,
    "repro_rate": 0.0,
    "functional_rate": 62.5,
    "category": "both",
    "conferences": [
      "ACSAC",
      "EUROSYS",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2021,
      2022,
      2023,
      2024
    ],
    "year_range": "2018-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 5,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated SmartNIC Offloading Insights for Network Functions",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Unearthing Semantic Checks for Cloud Infrastructure-as-Code Programs",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Enoki: High Velocity Linux Kernel Scheduler Development",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DeDoS: Defusing DoS with Dispersion Oriented Software",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "An Historical Analysis of the SEAndroid Policy Evolution",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SpotProxy: Rediscovering the Cloud for Censorship Circumvention",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Remote Direct Memory Introspection",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Bedrock: Programmable Network Support for Secure RDMA Systems",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unlocking ecmp programmability for precise traffic control",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "occam a programming system for reliable network management",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "synthesizing runtime programmable switch updates",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "closedloop network performance monitoring and diagnosis with spidermon",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "rdc energyefficient data center network congestion relief with topological reconfigurability at the edge",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "runtime programmable switches",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "high velocity kernel file systems with bento",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "ripple a programmable decentralized linkflooding defense against adaptive adversaries",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "contra a programmable system for performanceaware routing",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "check before you change preventing correlated failures in service updates",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "netwarden mitigating network covert channels while preserving performance",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "programmable innetwork security for contextaware byod policies",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "zeno diagnosing performance problems with temporal provenance",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "automated bug removal for softwaredefined networks",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 44,
    "paper_ids": [
      693,
      694,
      695,
      696,
      697,
      698,
      699,
      700
    ],
    "papers_without_artifact_ids": [
      701,
      702,
      703,
      704,
      705,
      706,
      707,
      708,
      709,
      710,
      711,
      712,
      713,
      714
    ]
  },
  {
    "name": "Bryan Parno",
    "display_name": "Bryan Parno",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 8,
    "total_papers": 15,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3,
      "USENIXSEC": 5,
      "EUROSYS": 0,
      "ATC": 0,
      "ACSAC": 2,
      "FAST": 1,
      "NSDI": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1,
        "2023": 1,
        "2020": 1
      },
      "USENIXSEC": {
        "2022": 1,
        "2025": 4
      },
      "EUROSYS": {},
      "ATC": {},
      "ACSAC": {
        "2020": 2
      },
      "FAST": {
        "2013": 1
      },
      "NSDI": {
        "2021": 2,
        "2013": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 53.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 8,
    "badges_functional": 8,
    "badges_reproducible": 8,
    "papers": [
      {
        "title": "Verus: A Practical Foundation for Systems Verification",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Provably-Safe Multilingual Software Sandboxing using WebAssembly",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Practical, End-to-End Formally Verified X.509 Certificate Validators with Verdict",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OwlC: Compiling Security Protocols to Verified, Secure, High-Performance Libraries",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TRex: Practical Type Reconstruction for Binary Code",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Vest: Verified, Secure, High-Performance Parsing and Serialization for Rust",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sharding the State Machine: Automated Modular Reasoning for Complex Concurrent Systems",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Storage Systems are Distributed Systems (So Verify Them That Way!)",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "inductive invariants that spark joy using invariant taxonomies to streamline distributed protocol proofs",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "dont yank my chain auditable nf service chaining",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "finding invariants of distributed systems its a small enough world after all",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "talek private group messaging with hidden access patterns",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "caps smoothly transitioning to a more resilient web pki",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "shroud ensuring private access to largescale data in the data center",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "embassies radically refactoring the web",
        "conference": "NSDI",
        "year": 2013
      }
    ],
    "author_id": 31,
    "paper_ids": [
      715,
      716,
      717,
      718,
      719,
      720,
      721,
      722
    ],
    "papers_without_artifact_ids": [
      723,
      724,
      725,
      726,
      727,
      728,
      729
    ]
  },
  {
    "name": "Tianwei Zhang 0004",
    "display_name": "Tianwei Zhang",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 8,
    "total_papers": 19,
    "total_papers_by_conf": {
      "SC": 1,
      "NDSS": 3,
      "ATC": 1,
      "USENIXSEC": 8,
      "ACSAC": 3,
      "NSDI": 1,
      "PETS": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "NDSS": {
        "2024": 2,
        "2025": 1
      },
      "ATC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 3,
        "2023": 2,
        "2025": 3
      },
      "ACSAC": {
        "2021": 1,
        "2018": 1,
        "2019": 1
      },
      "NSDI": {
        "2024": 1
      },
      "PETS": {
        "2025": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 42.1,
    "repro_rate": 37.5,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "ATC",
      "NDSS",
      "SC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2019,
      2021,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2018-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 8,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Characterization and prediction of deep learning workloads in large-scale GPU datacenters",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Primo: Practical Learning-Augmented Systems with Interpretable Models",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Analyzing Cache Side Channels Using Deep Neural Networks",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Model inversion attacks against collaborative inference",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "THEMIS: Regulating Textual Inversion for Personalized Concept Censorship",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mission impossible imagebased geolocation with large vision language models",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "the ghost navigator revisiting the hidden vulnerability of localization in autonomous driving",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "diffloc wifi hidden camera localization based on electromagnetic diffraction",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "masterkey automated jailbreaking of large language model chatbots",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "detecting voice cloning attacks via timbre watermarking",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "characterization of large language model development in the datacenter",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "unbalanced circuitpsi from oblivious keyvalue retrieval",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "scalable zeroknowledge proofs for nonlinear functions in machine learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "hydro surrogatebased hyperparameter tuning service in datacenters",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "nautilus automated restful api vulnerability detection",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "efficient private and robust federated learning",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 45,
    "paper_ids": [
      730,
      731,
      362,
      732,
      733,
      545,
      734,
      735
    ],
    "papers_without_artifact_ids": [
      736,
      737,
      738,
      739,
      740,
      741,
      742,
      743,
      744,
      745,
      746
    ]
  },
  {
    "name": "Torsten Hoefler",
    "display_name": "Torsten Hoefler",
    "affiliation": "ETH Zurich",
    "artifact_count": 8,
    "total_papers": 13,
    "total_papers_by_conf": {
      "SC": 6,
      "EUROSYS": 2,
      "ATC": 2,
      "USENIXSEC": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 6
      },
      "EUROSYS": {
        "2025": 2
      },
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "NSDI": {
        "2024": 2
      }
    },
    "artifact_rate": 61.5,
    "repro_rate": 62.5,
    "functional_rate": 87.5,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "SC"
    ],
    "years": [
      2021,
      2023,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 7,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "Flare: flexible in-network allreduce",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Productivity, portability, performance: data-centric Python",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Chimera: efficiently training large-scale neural networks with bidirectional pipelines",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Clairvoyant prefetching for distributed machine learning I/O",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "On the parallel I/O optimality of linear algebra kernels: near-optimal matrix factorizations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SeBS-Flow: Benchmarking Serverless Cloud Function Workflows",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "OSMOSIS: Enabling Multi-Tenancy in Datacenter SmartNICs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SAGE: Software-based Attestation for GPU Execution",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sebs 20 keeping up with the clouds",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "a highperformance design implementation deployment and evaluation of the slim fly network",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "swing shortcutting rings for higher bandwidth allreduce",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "distributed quantum computing with qmpi",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "redmark bypassing rdma security mechanisms",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 46,
    "paper_ids": [
      747,
      748,
      749,
      750,
      751,
      752,
      753,
      754
    ],
    "papers_without_artifact_ids": [
      755,
      756,
      757,
      758,
      759
    ]
  },
  {
    "name": "Surya Nepal",
    "display_name": "Surya Nepal",
    "affiliation": "Data61 CSIRO",
    "artifact_count": 8,
    "total_papers": 10,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1,
      "ACSAC": 7,
      "ATC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2024": 1,
        "2022": 2,
        "2019": 2,
        "2023": 1,
        "2020": 1
      },
      "ATC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 80.0,
    "repro_rate": 50.0,
    "functional_rate": 37.5,
    "category": "both",
    "conferences": [
      "ACSAC",
      "ATC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2022,
      2023,
      2024
    ],
    "year_range": "2019-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Transformer-Based Language Models for Software Vulnerability Detection",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Reconstruction Attack on Differential Private Trajectory Protection Mechanisms",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "STRIP: a defence against trojan attacks on deep neural networks",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Can Trajectory Generation Combine Privacy and Utility?",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "certified copy understanding security risks of wifi hotspot based android data clone services",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "an empirical study of sms onetime password authentication in android apps",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 48,
    "paper_ids": [
      760,
      761,
      762,
      763,
      764,
      765,
      766,
      767
    ],
    "papers_without_artifact_ids": [
      768,
      769
    ]
  },
  {
    "name": "Xiapu Luo",
    "display_name": "Xiapu Luo",
    "affiliation": "The Hong Kong Polytechnic Univ.",
    "artifact_count": 8,
    "total_papers": 30,
    "total_papers_by_conf": {
      "USENIXSEC": 23,
      "ATC": 1,
      "SOSP": 0,
      "ACSAC": 0,
      "FAST": 1,
      "NDSS": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 2,
        "2023": 9,
        "2022": 5,
        "2025": 4,
        "2021": 2
      },
      "ATC": {
        "2022": 1
      },
      "SOSP": {},
      "ACSAC": {},
      "FAST": {
        "2025": 1
      },
      "NDSS": {
        "2024": 2,
        "2025": 3
      }
    },
    "artifact_rate": 26.7,
    "repro_rate": 25.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 8,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SOTER: Guarding Black-box Inference for General Neural Networks at the Edge",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PolyCruise: A Cross-Language Dynamic Information Flow Analysis",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "On the Security Risks of AutoML",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automated Soundness and Completeness Vetting of Polygon zkEVM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "maat analyzing and optimizing overcharge on blockchain storage",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "scrutinizer towards secure forensics on compromised trustzone",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "be careful of what you embed demystifying ole vulnerabilities",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "automated mass malware factory the convergence of piggybacking and adversarial example in android malicious software generation",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "beyond the surface uncovering the unprotected components of android against overlay attack",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "abusing the ethereum smart contract verification services for fun and profit",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "all your tokens are belong to us demystifying address verification vulnerabilities in solidity smart contracts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "blackbox adversarial example attack towards fcg based android malware detection under incomplete feature information",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "distdet a costeffective distributed cyber threat detection system",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "panda security analysis of algorand smart contracts",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "shelter extending arm cca with isolation in user space",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "on the security risks of knowledge graph reasoning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "automataguided controlflowsensitive fuzz driver generation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "ddrace finding concurrency uaf vulnerabilities in linux drivers with directed fuzzing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "an inputagnostic hierarchical deep learning framework for traffic fingerprinting",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "foap finegrained openworld android app fingerprinting",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "towards automatically reverse engineering vehicle diagnostic protocols",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "said stateaware defense against injection attacks on invehicle network",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "too good to be safe tricking lane detection in autonomous driving with crafted perturbations",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "eosafe security analysis of eosio smart contracts",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "programmable innetwork security for contextaware byod policies",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "interpretable deep learning under fire",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 49,
    "paper_ids": [
      770,
      771,
      772,
      773,
      688,
      366,
      236,
      774
    ],
    "papers_without_artifact_ids": [
      775,
      776,
      777,
      778,
      779,
      780,
      781,
      782,
      783,
      374,
      784,
      785,
      786,
      787,
      788,
      789,
      692,
      691,
      790,
      791,
      712,
      792
    ]
  },
  {
    "name": "Manuel Egele",
    "display_name": "Manuel Egele",
    "affiliation": "Boston University",
    "artifact_count": 8,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 9,
      "ACSAC": 1,
      "SC": 0,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2020": 1,
        "2023": 3,
        "2022": 1,
        "2021": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "SC": {},
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 80.0,
    "repro_rate": 37.5,
    "functional_rate": 62.5,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2022,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "FlexFilt: Towards Flexible Instruction Filtering for Security",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Argus: All your (PHP) Injection-sinks are belong to us",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Pandawan: Quantifying Progress in Linux-based Firmware Rehosting",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PHMon: A Programmable Hardware Monitor and Its Security Use Cases",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Morphuzz: Bending (Input) Space to Fuzz Virtual Devices",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Saphire: Sandboxing PHP Applications with Tailored System Call Allowlists",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hyperpill fuzzing for hypervisorbugs by leveraging the hardware virtualization interface",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "animatedead debloating web applications using concolic execution",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 50,
    "paper_ids": [
      793,
      794,
      795,
      796,
      797,
      798,
      799,
      800
    ],
    "papers_without_artifact_ids": [
      22,
      801
    ]
  },
  {
    "name": "Zubair Shafiq",
    "display_name": "Zubair Shafiq",
    "affiliation": "Univ. of California - Davis",
    "artifact_count": 8,
    "total_papers": 13,
    "total_papers_by_conf": {
      "PETS": 7,
      "USENIXSEC": 5,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 3,
        "2022": 1,
        "2023": 2,
        "2025": 1,
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 2,
        "2025": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 61.5,
    "repro_rate": 25.0,
    "functional_rate": 62.5,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 5,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Eluding ML-based Adblockers With Actionable Adversarial Examples",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PURL: Safe and Effective Sanitization of Link Decoration",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AutoFR: Automated Filter Rule Generation for Adblocking",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Khaleesi: Breaker of Advertising and Tracking Request Chains",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Big Help or Big Brother? Auditing Tracking, Profiling, and Personalization in Generative AI Assistants",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The TV is Smart and Full of Trackers: Measuring Smart TV Advertising and Tracking",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Blocking JavaScript Without Breaking the Web: An Empirical Investigation",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "editors introduction",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "editors introduction",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "a utilitypreserving obfuscation approach for youtube recommendations",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "fpradar longitudinal measurement and early detection of browser fingerprinting",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "canarytrap detecting data misuse by thirdparty apps on online social networks",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "inferring trackeradvertiser relationships in the online advertising ecosystem using header bidding",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 51,
    "paper_ids": [
      802,
      803,
      804,
      805,
      806,
      807,
      808,
      809
    ],
    "papers_without_artifact_ids": [
      810,
      810,
      811,
      812,
      813,
      814
    ]
  },
  {
    "name": "Adam Doupé",
    "display_name": "Adam Doupé",
    "affiliation": "Arizona State University",
    "artifact_count": 8,
    "total_papers": 18,
    "total_papers_by_conf": {
      "USENIXSEC": 15,
      "ACSAC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 6,
        "2020": 3,
        "2023": 1,
        "2022": 3,
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {
        "2018": 2
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 44.4,
    "repro_rate": 62.5,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2018-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 8,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scammagnifier piercing the veil of fraudulent shopping website campaigns",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "i feel physically safe but not politically safe understanding the digital threats and safety practices of onlyfans creators",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "tygr type inference on stripped binaries using graph neural networks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "take a step further understanding page spray in linux kernel exploitation",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "unleash the simulacrum shifting browser realities for robust extensionfingerprinting prevention",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "having your cake and eating it an analysis of concessionabuseasaservice",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "exploiting uses of uninitialized stack variables in linux kernels to leak kernel pointers",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "phishtime continuous longitudinal measurement of the effectiveness of antiphishing blacklists",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "sunrise to sunset analyzing the endtoend life cycle and effectiveness of phishing attacks at scale",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "primecount novel crossworld covert channels on arm trustzone",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 7908,
    "paper_ids": [
      815,
      816,
      817,
      818,
      819,
      820,
      821,
      822
    ],
    "papers_without_artifact_ids": [
      823,
      824,
      825,
      826,
      827,
      828,
      829,
      830,
      831,
      832
    ]
  },
  {
    "name": "Jianying Zhou 0001",
    "display_name": "Jianying Zhou",
    "affiliation": "SUTD",
    "artifact_count": 8,
    "total_papers": 13,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 3,
      "ACSAC": 9,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1,
        "2025": 2
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1,
        "2018": 2,
        "2022": 2,
        "2019": 1,
        "2023": 1,
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 61.5,
    "repro_rate": 37.5,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2019,
      2020,
      2022,
      2023,
      2025
    ],
    "year_range": "2018-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 6,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Designing a Provenance Analysis for SGX Enclaves",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Proof of aliveness",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TAP: Transparent and Privacy-Preserving Data Services",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SNI5GECT: A Practical Approach to Inject aNRchy into 5G NR",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Boosting Gradient Leakage Attacks: Data Reconstruction in Realistic FL Settings",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mfaa historical hash based multifactor authentication and authorization in iiot",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "sepanner analyzing semantics of controller variables in industrial control systems based on network traffic",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "if you cant beat them pay them bitcoin protection racket is profitable",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "group timebased onetime passwords and its application to efficient privacypreserving proof of location",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "finding dependencies between cyberphysical domains for security testing of industrial control systems",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 53,
    "paper_ids": [
      833,
      3,
      834,
      835,
      836,
      837,
      838,
      839
    ],
    "papers_without_artifact_ids": [
      840,
      841,
      842,
      843,
      844
    ]
  },
  {
    "name": "Christian Rossow",
    "display_name": "Christian Rossow",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 8,
    "total_papers": 13,
    "total_papers_by_conf": {
      "USENIXSEC": 9,
      "NDSS": 1,
      "ACSAC": 2,
      "EUROSYS": 0,
      "CHES": 1,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 3,
        "2022": 1,
        "2025": 1,
        "2021": 2
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2022": 1,
        "2020": 1
      },
      "EUROSYS": {},
      "CHES": {
        "2025": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 61.5,
    "repro_rate": 37.5,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2022,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DPIFuzz: A Differential Fuzzing Framework to Detect DPI Elusion Strategies for QUIC",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Await() a Second: Evading Control Flow Integrity by Hijacking C++ Coroutines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "YARIX: Scalable YARA-based Malware Intelligence",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Osiris: Automated Discovery of Microarchitectural Side Channels",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "keyvisor a lightweight isa extension for protected key handles with cpuenforced usage policies",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "loopy hellow infinite traffic loops at the application layer",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "00seven reenabling virtual machine forensics introspecting confidential vms using privileged invm agents",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "padding aint enough assessing the privacy guarantees of encrypted dns",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "slitheen stealth tlsbased decoy routing",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 54,
    "paper_ids": [
      845,
      846,
      847,
      848,
      849,
      850,
      329,
      330
    ],
    "papers_without_artifact_ids": [
      851,
      852,
      853,
      854,
      855
    ]
  },
  {
    "name": "Adam J. Aviv",
    "display_name": "Adam J. Aviv",
    "affiliation": "George Washington University",
    "artifact_count": 8,
    "total_papers": 26,
    "total_papers_by_conf": {
      "PETS": 4,
      "USENIXSEC": 16,
      "ACSAC": 6,
      "EUROSYS": 0,
      "ATC": 0,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 2,
        "2021": 2
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 2,
        "2022": 3,
        "2025": 1,
        "2021": 8
      },
      "ACSAC": {
        "2018": 1,
        "2022": 2,
        "2017": 1,
        "2020": 2
      },
      "EUROSYS": {},
      "ATC": {},
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 30.8,
    "repro_rate": 25.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 6,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "User Perceptions of Five-Word Passwords",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "User Perceptions of the Privacy and Usability of Smart DNS",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Educators' Perspectives of Using (or Not Using) Online Exam Proctoring",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Why Users (Don't) Use Password Managers at a Large Educational Institution",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Security and Privacy Perceptions of Third-Party Application Access for Google Accounts",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "How Researchers De-Identify Data in Practice",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how does connecting online activities to advertising inferences impact privacy perceptions",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "i would not install an app with this label privacy label impact on risk perception and willingness to install ios apps",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "cadence a simulator for human movementbased communication protocols",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "the same pin just longer on the insecurity of upgrading pins from 4 to 6 digits",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "holes in the geofence privacy vulnerabilities in smart dns services",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "warn them or just block them investigating privacy concerns among older and working age adults",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "i have no idea what theyre trying to accomplish enthusiastic and casual signal users understanding of signal pins",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "security obstacles and motivations for small businesses from a cisos perspective",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "why older adults dont use password managers",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "using a blocklist to improve the security of user selection of android patterns",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "now im a bit angry individuals awareness perception and responses to data breaches that affected them",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "examining the examiners students privacy and security perceptions of online proctoring services",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "strategies and perceived risks of sending sensitive documents",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "are privacy dashboards good for end users evaluating user perceptions and reactions to googles my activity",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "widely reused and shared infrequently updated and sometimes inherited a holistic view of pin authentication in digital lives and beyond",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "knock knock whos there on the security of lgs knock codes",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "comparing video based shoulder surfing with live simulation",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "towards baselines for shoulder surfing on mobile authentication",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 55,
    "paper_ids": [
      856,
      857,
      858,
      859,
      860,
      861,
      862,
      863
    ],
    "papers_without_artifact_ids": [
      864,
      865,
      866,
      867,
      868,
      869,
      870,
      871,
      872,
      873,
      874,
      875,
      876,
      877,
      878,
      879,
      880,
      881
    ]
  },
  {
    "name": "Amir Houmansadr",
    "display_name": "Amir Houmansadr",
    "affiliation": "Univ. of Massachusetts Amherst",
    "artifact_count": 8,
    "total_papers": 14,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 8,
      "NDSS": 3,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 2,
        "2022": 1,
        "2025": 2,
        "2021": 1
      },
      "NDSS": {
        "2025": 3
      },
      "ACSAC": {
        "2021": 1,
        "2019": 1
      }
    },
    "artifact_rate": 57.1,
    "repro_rate": 75.0,
    "functional_rate": 87.5,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2022,
      2023,
      2025
    ],
    "year_range": "2019-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 7,
    "badges_reproducible": 6,
    "papers": [
      {
        "title": "Revisiting utility metrics for location privacy-preserving mechanisms",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Machine Learning with Differentially Private Labels: Mechanisms and Frameworks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Diffence: Fencing Membership Privacy With Diffusion Models",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data Manipulation",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "wallbleed a memory disclosure vulnerability in the great firewall of china",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "backdooring bias b2 into stable diffusion models",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "fingerprinting obfuscated proxy traffic with encapsulated tls handshakes",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "finn fingerprinting network flows using neural networks",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "defeating dnnbased traffic analysis systems in realtime with blind adversarial perturbations",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "triplet censors demystifying great firewalls dns censorship behavior",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 56,
    "paper_ids": [
      882,
      883,
      884,
      130,
      885,
      133,
      886,
      887
    ],
    "papers_without_artifact_ids": [
      888,
      889,
      890,
      891,
      892,
      893
    ]
  },
  {
    "name": "Tianhao Wang 0001",
    "display_name": "Tianhao Wang",
    "affiliation": "University of Virginia",
    "artifact_count": 8,
    "total_papers": 15,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "NDSS": 5,
      "ACSAC": 3,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 3,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2025": 5
      },
      "ACSAC": {
        "2019": 1,
        "2023": 2
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 53.3,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2023,
      2024,
      2025
    ],
    "year_range": "2019-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Koinonia: verifiable e-voting with long-term privacy",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Differentially Private Resource Allocation",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware Pretraining",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One Run",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Black-box Membership Inference Attacks against Fine-tuned Diffusion Models",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Delay-allowed Differentially Private Data Stream Release",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Understanding Unsafe Video Generation",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TrajDeleter: Enabling Trajectory Forgetting in Offline Reinforcement Learning Agents",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "revisiting embased estimation for locally differentially private protocols",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "whitebox membership inference attacks against diffusion models",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "mitigating membership inference attacks via weighted smoothing",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "a plot is worth a thousand words model information stealing attacks via scientific plots",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "privtrace differentially private trajectory synthesis by adaptive markov models",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "faceauditor data auditing in facial recognition systems",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "privsyn differentially private data synthesis",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 57,
    "paper_ids": [
      894,
      180,
      895,
      896,
      897,
      303,
      192,
      898
    ],
    "papers_without_artifact_ids": [
      899,
      195,
      900,
      204,
      202,
      203,
      210
    ]
  },
  {
    "name": "Haixin Duan",
    "display_name": "Haixin Duan",
    "affiliation": "Tsinghua University",
    "artifact_count": 8,
    "total_papers": 29,
    "total_papers_by_conf": {
      "USENIXSEC": 19,
      "ACSAC": 3,
      "NDSS": 7
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 5,
        "2020": 1,
        "2023": 3,
        "2022": 2,
        "2025": 6,
        "2021": 2
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1,
        "2020": 1
      },
      "NDSS": {
        "2024": 3,
        "2025": 4
      }
    },
    "artifact_rate": 27.6,
    "repro_rate": 25.0,
    "functional_rate": 37.5,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 8,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Building an Open, Robust, and Stable Voting-Based Domain Top List",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Misty Registry: An Empirical Study of Flawed Domain Registry Operation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "My ZIP isn't your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hades attack understanding and evaluating manipulation risks of email blocklists",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "automatic insecurity exploring email autoconfiguration in the wild",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "crossorigin web attacks via http2 server push and signed http exchange",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "revealing the black box of device search engine scanning assets strategies and ethical consideration",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "dissecting open edge computing platforms ecosystem usage and security risks",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "reqsminer automated discovery of cdn forwarding request inconsistencies and dos attacks with grammarbased fuzzing",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "understanding the implementation and security implications of protective dns services",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "breakspf how shared infrastructures magnify spf vulnerabilities across the internet",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "tickets or privacy understand the ecosystem of chinese ticket grabbing apps",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "rethinking the security threats of stale dns glue records",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "cross the zone toward a covert domain hijacking via shared dns infrastructure",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "into the dark unveiling internal site search abused for black hat seo",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "mtsan a feasible and practical memory sanitizer for fuzzing cots binaries",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "temporal cdnconvex lens a cdnassisted practical pulsing ddos attack",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "the maginot line attacking the boundary of dns caching protection",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "a largescale and longitudinal measurement study of dkim deployment",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "detecting and characterizing sms spearphishing attacks",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "weak links in authentication chains a largescale analysis of email sender spoofing attacks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "sharing more and checking less leveraging common input keywords to detect bugs in embedded systems",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "understanding promotionasaservice on github",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "poison over troubled forwarders a cache poisoning attack targeting dns forwarding devices",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 58,
    "paper_ids": [
      544,
      901,
      232,
      902,
      903,
      549,
      904,
      242
    ],
    "papers_without_artifact_ids": [
      247,
      905,
      906,
      245,
      907,
      908,
      909,
      910,
      911,
      912,
      913,
      914,
      915,
      916,
      569,
      917,
      918,
      259,
      919,
      260,
      920
    ]
  },
  {
    "name": "Kaveh Razavi",
    "display_name": "Kaveh Razavi",
    "affiliation": "ETH Zurich",
    "artifact_count": 8,
    "total_papers": 13,
    "total_papers_by_conf": {
      "USENIXSEC": 12,
      "SOSP": 0,
      "SC": 0,
      "ATC": 0,
      "FAST": 1,
      "WOOT": 0,
      "NDSS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 1,
        "2022": 2,
        "2025": 5,
        "2021": 1
      },
      "SOSP": {},
      "SC": {},
      "ATC": {},
      "FAST": {
        "2022": 1
      },
      "WOOT": {},
      "NDSS": {},
      "OSDI": {}
    },
    "artifact_rate": 61.5,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 8,
    "badges_functional": 8,
    "badges_reproducible": 8,
    "papers": [
      {
        "title": "Cascade: CPU Fuzzing via Intricate Program Generation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Inception: Exposing New Attack Surfaces with Training in Transient Execution",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RETBLEED: Arbitrary Speculative Code Execution with Return Instructions",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Posthammer: Pervasive Browser-based Rowhammer Attacks with Postponed Refresh Commands",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Branch Privilege Injection: Compromising Spectre v2 Hardware Mitigations by Exploiting Branch Predictor Race Conditions",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "McSee: Evaluating Advanced Rowhammer Attacks and Defenses via Automated DRAM Traffic Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lost in translation enabling confused deputy attacks on eda software with transfuzz",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "zenhammer rowhammer attacks on amd zenbased platforms",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "dupefs leaking data over the network with filesystem deduplication side channels",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "smash synchronized manysided rowhammer attacks from javascript",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "parmesan sanitizerguided greybox fuzzing",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 59,
    "paper_ids": [
      921,
      922,
      923,
      924,
      925,
      926,
      927,
      928
    ],
    "papers_without_artifact_ids": [
      929,
      930,
      93,
      96,
      97
    ]
  },
  {
    "name": "Xinyu Xing 0001",
    "display_name": "Xinyu Xing",
    "affiliation": "Northwestern University",
    "artifact_count": 8,
    "total_papers": 16,
    "total_papers_by_conf": {
      "USENIXSEC": 14,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 5,
        "2020": 1,
        "2023": 3,
        "2022": 1,
        "2025": 2,
        "2021": 2
      },
      "ACSAC": {
        "2023": 1,
        "2017": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 62.5,
    "functional_rate": 62.5,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 5,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "CAMP: Compiler and Allocator-based Heap Memory Protection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SeaK: Rethinking the Design of a Secure Allocator for OS Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PATCHAGENT: A Practical Program Repair Agent Mimicking Human Expertise",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CADE: Detecting and Explaining Concept Drift Samples for Security Applications",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Adversarial Policy Training against Deep Reinforcement Learning",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mind the inconspicuous revealing the hidden weakness in aligned llms refusal boundaries",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "llmfuzzer scaling assessment of large language model jailbreaks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "take a step further understanding page spray in linux kernel exploitation",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "tgc transaction graph contrast network for ethereum phishing scam detection",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "airs explanation for deep reinforcement learning based security applications",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "patrol provable defense against adversarial policy in twoplayer games",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "bscout direct whole patch presence test for java executables",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "supporting transparent snapshot for baremetal malware analysis on mobile devices",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 60,
    "paper_ids": [
      931,
      932,
      933,
      934,
      821,
      935,
      936,
      937
    ],
    "papers_without_artifact_ids": [
      938,
      939,
      826,
      940,
      941,
      942,
      261,
      943
    ]
  },
  {
    "name": "Simon Koch 0001",
    "display_name": "Simon Koch",
    "affiliation": "IIT Bombay",
    "artifact_count": 8,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "PETS": 3,
      "WOOT": 1,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 2
      },
      "PETS": {
        "2022": 1,
        "2025": 1,
        "2024": 1
      },
      "WOOT": {
        "2025": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 37.5,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 8,
    "badges_functional": 3,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SSRF vs. Developers: A Study of SSRF-Defenses in PHP Applications",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Confusing Value with Enumeration: Studying the Use of CVEs in Academia",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HyTrack: Resurrectable and Persistent Tracking Across Android Apps and the Web",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Extract: A PHP Foot-Gun Case Study",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Keeping Privacy Labels Honest",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Impact of Default Mobile SDK Usage on Privacy and Data Protection",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Black-Box Privacy Analysis of Messaging Service Providers' Chat Message Processing",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 61,
    "paper_ids": [
      214,
      217,
      108,
      218,
      219,
      221,
      223,
      224
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuai Wang 0011",
    "display_name": "Shuai Wang",
    "affiliation": "HKUST",
    "artifact_count": 8,
    "total_papers": 13,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 8,
      "NDSS": 4
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 4,
        "2022": 1,
        "2025": 2
      },
      "NDSS": {
        "2024": 1,
        "2025": 3
      }
    },
    "artifact_rate": 61.5,
    "repro_rate": 25.0,
    "functional_rate": 37.5,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 8,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "MOAT: Towards Safe BPF Kernel Extension",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Precise and Generalized Robustness Certification for Neural Networks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Decompiling x86 Deep Neural Network Executables",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automated Side Channel Analysis of Media Software with Manifold Learning",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input Generators",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SANRAZOR: Reducing Redundant Sanitizer Checks in C/C++ Programs",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mtzk testing and exploring bugs in zeroknowledge zk compilers",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "compiled models builtin exploits uncovering pervasive bitflip attack surfaces in dnn executables",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "bitshield defending against bitflip attacks on dnn executables",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "mpcdiff testing and repairing mpchardened deep learning models",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "cipherh automated detection of ciphertext sidechannel vulnerabilities in cryptographic implementations",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 62,
    "paper_ids": [
      944,
      945,
      946,
      947,
      948,
      949,
      950,
      951
    ],
    "papers_without_artifact_ids": [
      952,
      953,
      954,
      955,
      375
    ]
  },
  {
    "name": "Juraj Somorovsky",
    "display_name": "Juraj Somorovsky",
    "affiliation": "Paderborn University",
    "artifact_count": 8,
    "total_papers": 11,
    "total_papers_by_conf": {
      "USENIXSEC": 11,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 2,
        "2022": 2,
        "2025": 3,
        "2021": 2
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 72.7,
    "repro_rate": 75.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 6,
    "badges_reproducible": 6,
    "papers": [
      {
        "title": "With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Analysis of DTLS Implementations Using Protocol State Fuzzing",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Internet-Based State Learning of TLS State Machines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "STEK Sharing is Not Caring: Bypassing TLS Authentication in Web Servers using Session Tickets",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Security Implications of Malicious G-Codes in 3D Printing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i dont know why i check this investigating expert users strategies to detect email signature spoofing attacks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "raccoon attack finding and exploiting mostsignificantbitoracles in tlsdhe",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "alpaca application layer protocol confusion analyzing and mitigating cracks in tls authentication",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 63,
    "paper_ids": [
      583,
      956,
      584,
      586,
      588,
      590,
      957,
      958
    ],
    "papers_without_artifact_ids": [
      959,
      591,
      592
    ]
  },
  {
    "name": "David Klein 0001",
    "display_name": "David Klein",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 8,
    "total_papers": 11,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "PETS": 4,
      "WOOT": 1,
      "EUROSYS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2025": 2
      },
      "PETS": {
        "2025": 1,
        "2024": 2,
        "2021": 1
      },
      "WOOT": {
        "2025": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 72.7,
    "repro_rate": 0.0,
    "functional_rate": 37.5,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2020,
      2021,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 3,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Confusing Value with Enumeration: Studying the Use of CVEs in Academia",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HyTrack: Resurrectable and Persistent Tracking Across Android Apps and the Web",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Comma Separated Vulnerabilities: Detecting Formula Injection in the Wild",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Making Web Applications GDPR Compliant: A Comparative Evaluation of GDPR-Enforcement Frameworks",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Black-Box Privacy Analysis of Messaging Service Providers' Chat Message Processing",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LogPicker: Strengthening Certificate Transparency Against Covert Adversaries",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fptracer finegrained browser fingerprinting detection via tainttracking and entropybased thresholds",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "accept all exploits exploring the security impact of cookie banners",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "talking about my generation targeted dombased xss exploit generation using dynamic data flow analysis",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 64,
    "paper_ids": [
      215,
      216,
      108,
      218,
      220,
      222,
      224,
      225
    ],
    "papers_without_artifact_ids": [
      226,
      227,
      228
    ]
  },
  {
    "name": "Athina Markopoulou",
    "display_name": "Athina Markopoulou",
    "affiliation": "University of California, Irvine",
    "artifact_count": 8,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 6,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2,
        "2022": 1
      },
      "PETS": {
        "2020": 2,
        "2022": 1,
        "2023": 1,
        "2025": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 88.9,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 8,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "AutoFR: Automated Filter Rule Generation for Adblocking",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The TV is Smart and Full of Trackers: Measuring Smart TV Advertising and Tracking",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NoMoATS: Towards Automatic Detection of Mobile Tracking",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FingerprinTV: Fingerprinting Smart TV Apps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Understanding Privacy Norms through Web Forms",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BehaVR: User Identification Based on VR Sensor Data",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacy by projection federated population density estimation by projecting on random features",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 65,
    "paper_ids": [
      804,
      960,
      961,
      808,
      962,
      963,
      964,
      965
    ],
    "papers_without_artifact_ids": [
      966
    ]
  },
  {
    "name": "Carmela Troncoso",
    "display_name": "Carmela Troncoso",
    "affiliation": "Max Planck Society",
    "artifact_count": 8,
    "total_papers": 13,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "PETS": 6,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 2,
        "2022": 3,
        "2025": 2
      },
      "PETS": {
        "2020": 2,
        "2022": 1,
        "2023": 2,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 61.5,
    "repro_rate": 25.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 8,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Synthetic Data - Anonymisation Groundhog Day",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Characterizing and Detecting Propaganda-Spreading Accounts on Telegram",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Double-Edged Shield: On the Fingerprintability of Customized Ad Blockers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Tandem: Securing Keys by Using a Central Server While Preserving Privacy",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Disparate Vulnerability to Membership Inference Attacks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Evaluating practical QUIC website fingerprinting defenses for the masses",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Private Collection Matching Protocols",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "online website fingerprinting evaluating website fingerprinting attacks on tor in the real world",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "crowdnotifier decentralized privacypreserving presence tracing",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "angel or devil a privacy study of mobile parental control apps",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "voteagain a scalable coercionresistant voting system",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "datasharenetwork a decentralized privacypreserving search engine for investigative journalists",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 66,
    "paper_ids": [
      967,
      806,
      968,
      969,
      970,
      971,
      972,
      973
    ],
    "papers_without_artifact_ids": [
      974,
      975,
      976,
      977,
      978
    ]
  },
  {
    "name": "Nickolai Zeldovich",
    "display_name": "Nickolai Zeldovich",
    "affiliation": "Massachusetts Inst. of Technology",
    "artifact_count": 7,
    "total_papers": 15,
    "total_papers_by_conf": {
      "SOSP": 4,
      "OSDI": 6,
      "USENIXSEC": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 4,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 3,
        "2024": 1
      },
      "OSDI": {
        "2021": 1,
        "2022": 3,
        "2023": 1,
        "2020": 1
      },
      "USENIXSEC": {
        "2022": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2014": 1,
        "2016": 1,
        "2008": 1,
        "2005": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 46.7,
    "repro_rate": 85.7,
    "functional_rate": 85.7,
    "category": "both",
    "conferences": [
      "OSDI",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2022,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 6,
    "badges_reproducible": 6,
    "papers": [
      {
        "title": "Grove: a Separation-Logic Library for Verifying Distributed Systems",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Private Web Search with Tiptoe",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GoJournal: a verified, concurrent, crash-safe journaling system",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Verifying the DaisyNFS concurrent and crash-safe file system with sequential reasoning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "verifying vmvcc a highperformance transaction library using multiversion concurrency control",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "the k2 architecture for trustworthy hardware security modules",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "groove flexible metadataprivate messaging",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "verifying hardware security modules with informationpreserving refinement",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "sieve cryptographically enforced access control for user data in untrusted clouds",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "building web applications on top of encrypted data using mylar",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "securing distributed systems with information flow control",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "the collective a cachebased system management architecture",
        "conference": "NSDI",
        "year": 2005
      }
    ],
    "author_id": 38,
    "paper_ids": [
      979,
      980,
      981,
      982,
      983,
      984,
      985
    ],
    "papers_without_artifact_ids": [
      986,
      987,
      988,
      989,
      990,
      683,
      991,
      992
    ]
  },
  {
    "name": "Xin Jin 0008",
    "display_name": "Xin Jin",
    "affiliation": "Peking University",
    "artifact_count": 7,
    "total_papers": 27,
    "total_papers_by_conf": {
      "SOSP": 4,
      "OSDI": 7,
      "EUROSYS": 2,
      "ATC": 0,
      "FAST": 1,
      "USENIXSEC": 1,
      "NSDI": 12
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 3,
        "2024": 1
      },
      "OSDI": {
        "2024": 3,
        "2023": 1,
        "2020": 3
      },
      "EUROSYS": {
        "2024": 1,
        "2022": 1
      },
      "ATC": {},
      "FAST": {
        "2019": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "NSDI": {
        "2021": 2,
        "2024": 3,
        "2025": 2,
        "2023": 2,
        "2022": 1,
        "2018": 1,
        "2015": 1
      }
    },
    "artifact_rate": 25.9,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 7,
    "badges_reproducible": 7,
    "papers": [
      {
        "title": "Oobleck: Resilient Distributed Training of Large Models Using Pipeline Templates",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Halfmoon: Log-Optimal Fault-Tolerant Stateful Serverless Computing",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "LoongServe: Efficiently Serving Long-Context Large Language Models with Elastic Sequence Parallelism",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Unison: A Parallel-Efficient and User-Transparent Network Simulation Kernel",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "dLoRA: Dynamically Orchestrating Requests and Adapters for LoRA LLM Serving",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pegasus: Tolerating Skewed Workloads in Distributed Storage with In-Network Coherence Directories",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "RackSched: A Microsecond-Scale Scheduler for Rack-Scale Computers",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "optimizing rlhf training for large language models with stage fusion",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "meshtest endtoend testing for service mesh traffic management",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "megascale scaling large language model training to more than 10 000 gpus",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "fast vector query processing for large datasets beyond gpu memory with reordered pipelining",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "jolteon unleashing the promise of serverless for serverless workflows",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "burstable cloud block storage with data processing units",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "distserve disaggregating prefill and decoding for goodputoptimized large language model serving",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "fast approximate vector queries on very large unstructured datasets",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "transparent gpu sharing in container clouds for deep learning workloads",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "alpaserve statistical multiplexing with model parallelism for deep learning serving",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "automated verification of an inproduction dns authoritative engine",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "multiobjective congestion control",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "netvrm virtual register memory for programmable networks",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "twenty years after hierarchical corestateless fair queueing",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "ship compute or ship data why not both",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "jaqen a highperformance switchnative approach for detecting and mitigating volumetric ddos attacks with programmable switches",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "pipeswitch fast pipelined context switching for deep learning applications",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "distcache provable load balancing for largescale storage systems with distributed caching",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "netchain scalefree subrtt coordination",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "covisor a compositional hypervisor for softwaredefined networks",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 68,
    "paper_ids": [
      993,
      994,
      995,
      996,
      997,
      998,
      473
    ],
    "papers_without_artifact_ids": [
      999,
      1000,
      1001,
      1002,
      1003,
      1004,
      1005,
      1006,
      1007,
      484,
      1008,
      1009,
      1010,
      491,
      1011,
      1012,
      1013,
      495,
      498,
      1014
    ]
  },
  {
    "name": "Henry Corrigan-Gibbs",
    "display_name": "Henry Corrigan-Gibbs",
    "affiliation": "Univ. of California - Berkeley",
    "artifact_count": 7,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 2,
      "USENIXSEC": 5,
      "NSDI": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2023": 1,
        "2020": 1
      },
      "USENIXSEC": {
        "2023": 2,
        "2025": 1,
        "2021": 2
      },
      "NSDI": {
        "2017": 1
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 63.6,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 7,
    "badges_reproducible": 7,
    "papers": [
      {
        "title": "Private Web Search with Tiptoe",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Authenticated private information retrieval",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Distributional Private Information Retrieval",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Accountable authentication with privacy protection: The Larch system for universal login",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SafetyPin: Encrypted Backups with Human-Memorable Secrets",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "divisible ecash for billing in private ad retargeting",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "express lowering the cost of metadatahiding communication with cryptographic privacy",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "private blocklist lookups with checklist",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "prio private robust and scalable computation of aggregate statistics",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 69,
    "paper_ids": [
      980,
      981,
      1015,
      1016,
      1017,
      1018,
      1019
    ],
    "papers_without_artifact_ids": [
      1020,
      1021,
      1022,
      1023
    ]
  },
  {
    "name": "Yuqing Yang 0001",
    "display_name": "Yuqing Yang",
    "affiliation": "IISc Bangalore",
    "artifact_count": 7,
    "total_papers": 9,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 5,
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2
      },
      "OSDI": {
        "2022": 1,
        "2024": 2,
        "2023": 2
      },
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 77.8,
    "repro_rate": 85.7,
    "functional_rate": 85.7,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 6,
    "badges_reproducible": 6,
    "papers": [
      {
        "title": "SPFresh: Incremental In-Place Update for Billion-Scale Vector Search",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PIT: Optimization of Dynamic Sparse Deep Learning Models via Permutation Invariant Transformation",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PilotFish: Harvesting Free Cycles of Cloud Gaming with Deep Learning Training",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SparTA: Deep-Learning Model Sparsity via Tensor-with-Sparsity-Attribute",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Parrot: Efficient Serving of LLM-based Applications with Semantic Variable",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "VBASE: Unifying Online Vector Similarity Search and Relational Queries via Relaxed Monotonicity",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Optimizing Dynamic Neural Networks with Brainstorm",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ladder enabling efficient lowprecision deep learning computing through hardwareaware tensor transformation",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "silod a codesign of caching and scheduling for deep learning clusters",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 70,
    "paper_ids": [
      145,
      146,
      149,
      151,
      152,
      154,
      155
    ],
    "papers_without_artifact_ids": [
      159,
      160
    ]
  },
  {
    "name": "Mao Yang 0004",
    "display_name": "Mao Yang",
    "affiliation": "Microsoft Research",
    "artifact_count": 7,
    "total_papers": 16,
    "total_papers_by_conf": {
      "SOSP": 3,
      "OSDI": 8,
      "SC": 0,
      "EUROSYS": 2,
      "ATC": 0,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2,
        "2024": 1
      },
      "OSDI": {
        "2022": 2,
        "2024": 2,
        "2023": 2,
        "2020": 2
      },
      "SC": {},
      "EUROSYS": {
        "2025": 1,
        "2023": 1
      },
      "ATC": {},
      "NSDI": {
        "2009": 1,
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 43.8,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2022,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 7,
    "badges_reproducible": 7,
    "papers": [
      {
        "title": "SPFresh: Incremental In-Place Update for Billion-Scale Vector Search",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PIT: Optimization of Dynamic Sparse Deep Learning Models via Permutation Invariant Transformation",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Uncovering Nested Data Parallelism and Data Reuse in DNN Computation with FractalTensor",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ROLLER: Fast and Efficient Tensor Compilation for Deep Learning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SparTA: Deep-Learning Model Sparsity via Tensor-with-Sparsity-Attribute",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "VBASE: Unifying Online Vector Similarity Search and Relational Queries via Relaxed Monotonicity",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Retiarii: A Deep Learning Exploratory-Training Framework",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tmac cpu renaissance via table lookup for lowbit llm deployment on edge",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "litepred transferable and scalable latency prediction for hardwareaware neural architecture search",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "nnscaler constraintguided parallelization plan generation for deep learning training",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "ladder enabling efficient lowprecision deep learning computing through hardwareaware tensor transformation",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "frozenhot cache rethinking cache management for modern hardware",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "on modular learning of distributed systems for predicting endtoend latency",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "cocktailer analyzing and optimizing dynamic control flow in deep learning",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "hived sharing a gpu cluster for deep learning with guarantees",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "modist transparent model checking of unmodified distributed systems",
        "conference": "NSDI",
        "year": 2009
      }
    ],
    "author_id": 71,
    "paper_ids": [
      145,
      146,
      147,
      150,
      151,
      154,
      157
    ],
    "papers_without_artifact_ids": [
      1024,
      1025,
      158,
      159,
      1026,
      161,
      162,
      163,
      294
    ]
  },
  {
    "name": "Zhendong Su 0001",
    "display_name": "Zhendong Su",
    "affiliation": "ETH Zurich",
    "artifact_count": 7,
    "total_papers": 9,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 5,
      "USENIXSEC": 3,
      "ATC": 0,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2021": 1,
        "2024": 2,
        "2023": 1,
        "2020": 1
      },
      "USENIXSEC": {
        "2023": 2,
        "2025": 1
      },
      "ATC": {},
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 77.8,
    "repro_rate": 42.9,
    "functional_rate": 85.7,
    "category": "both",
    "conferences": [
      "OSDI",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 6,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Validating JIT Compilers via Compilation Space Exploration",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Precise and Generalized Robustness Certification for Neural Networks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Approximation Enforced Execution of Untrusted Linux Kernel Extensions",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SANRAZOR: Reducing Redundant Sanitizer Checks in C/C++ Programs",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Detecting Logic Bugs in Database Engines via Equivalent Expression Transformation",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Detecting Transactional Bugs in Database Engines via Graph-Based Oracle Construction",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Testing Database Engines via Pivoted Query Synthesis",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "validating the ebpf verifier via state embedding",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "dynsql stateful fuzzing for database management systems with complex and valid sql query generation",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 72,
    "paper_ids": [
      1027,
      946,
      1028,
      951,
      1029,
      1030,
      1031
    ],
    "papers_without_artifact_ids": [
      1032,
      1033
    ]
  },
  {
    "name": "Lingxiao Ma",
    "display_name": "Lingxiao Ma",
    "affiliation": "Microsoft Research",
    "artifact_count": 7,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 7,
      "EUROSYS": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2022": 2,
        "2024": 1,
        "2023": 3,
        "2020": 1
      },
      "EUROSYS": {
        "2025": 2
      },
      "ATC": {}
    },
    "artifact_rate": 63.6,
    "repro_rate": 85.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2022,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 7,
    "badges_reproducible": 6,
    "papers": [
      {
        "title": "PIT: Optimization of Dynamic Sparse Deep Learning Models via Permutation Invariant Transformation",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "NeuStream: Bridging Deep Learning Serving and Stream Processing",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ROLLER: Fast and Efficient Tensor Compilation for Deep Learning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SparTA: Deep-Learning Model Sparsity via Tensor-with-Sparsity-Attribute",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Welder: Scheduling Deep Learning Memory Access via Tile-graph",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Optimizing Dynamic Neural Networks with Brainstorm",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rammer: Enabling Holistic Deep Learning Compiler Optimizations with rTasks",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tmac cpu renaissance via table lookup for lowbit llm deployment on edge",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "ladder enabling efficient lowprecision deep learning computing through hardwareaware tensor transformation",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "scaling deep learning computation over the intercore connected intelligence processor with t10",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "cocktailer analyzing and optimizing dynamic control flow in deep learning",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 74,
    "paper_ids": [
      146,
      1034,
      150,
      151,
      153,
      155,
      156
    ],
    "papers_without_artifact_ids": [
      1024,
      159,
      1035,
      162
    ]
  },
  {
    "name": "Jiwu Shu",
    "display_name": "Jiwu Shu",
    "affiliation": "Tsinghua University",
    "artifact_count": 7,
    "total_papers": 38,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 4,
      "ATC": 6,
      "SC": 0,
      "EUROSYS": 6,
      "FAST": 20,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2021": 1,
        "2023": 2,
        "2020": 1
      },
      "ATC": {
        "2022": 2,
        "2024": 2,
        "2023": 2
      },
      "SC": {},
      "EUROSYS": {
        "2025": 3,
        "2023": 1,
        "2024": 1,
        "2022": 1
      },
      "FAST": {
        "2024": 1,
        "2021": 2,
        "2026": 7,
        "2014": 1,
        "2013": 1,
        "2023": 6,
        "2022": 1,
        "2025": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 18.4,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2022,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 7,
    "badges_reproducible": 7,
    "papers": [
      {
        "title": "Crash Consistent Non-Volatile Memory Express",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AlNiCo: SmartNIC-accelerated Contention-aware Request Scheduling for Transaction Processing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pacman: An Efficient Compaction Approach for Log-Structured Key-Value Store on Persistent Memory",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Removing Obstacles before Breaking Through the Memory Wall: A Close Look at HBM Errors in the Field",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "UniMem: Redesigning Disaggregated Memory within A Unified Local-Remote Memory Hierarchy",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Revisiting Secondary Indexing in LSM-based Storage Systems with Persistent Memory",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Nap: A Black-Box Approach to NUMA-Aware Persistent Memory Indexes",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "discardbased garbage collection for distributed logstructured storage systems in bytedance",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "skysync accelerating file synchronization with collaborative delta generation",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "mlsdisk trusted block storage for tees based on layered secure logging",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "parasync exploiting finegrained parallelism for efficient file synchronization",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "rosenbridge a framework for enabling express io paths across the virtualization boundary",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "costefficient archive cloud storage with tape design and deployment",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "gpu checkpointrestore made fast and lightweight",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "cheetah metadata aggregation for fast object storage without distributed ordering",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "fast state restoration in llm serving with hcache",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "deft a scalable tree index for disaggregated memory",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "shiftlock mitigate onesided rdma lock contention via handover",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "achieving wirelatency storage systems by exploiting hardware acks",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "exploring the asynchrony of slow memory filesystem with easyio",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "term extending rdmaattached memory with ssd",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "singularfs a billionscale distributed file system using a single metadata server",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "rio orderpreserving and cpuefficient remote storage access",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "patronus highperformance and protective remote memory",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "citron distributed range lock management with onesided rdma",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "λio a unified io stack for computational storage",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "perseus a failslow detection framework for cloud storage systems",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "more than capacity performanceoriented evolution of pangu in alibaba",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "fisc a largescale cloudnativeoriented file system",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "flor an open high performance rdma framework over heterogeneous rnics",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "replicating persistent memory keyvalue stores with efficient rdma abstraction",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "fleche an efficient gpu embedding cache for personalized recommendations",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "infinifs an efficient metadata service for largescale distributed filesystems",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "concordia distributed shared memory with innetwork cache coherence",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "scalable persistent memory file system with kerneluserspace collaboration",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "write dependency disentanglement with horae",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "reconfs a reconstructable file system on flash storage",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "extending the lifetime of flashbased storage through reducing write amplification from file systems",
        "conference": "FAST",
        "year": 2013
      }
    ],
    "author_id": 19,
    "paper_ids": [
      1036,
      1037,
      1038,
      1039,
      1040,
      1041,
      1042
    ],
    "papers_without_artifact_ids": [
      1043,
      1044,
      1045,
      1046,
      1047,
      1048,
      1049,
      1050,
      1051,
      1052,
      1053,
      1054,
      1055,
      1056,
      1057,
      1058,
      1059,
      1060,
      1061,
      1062,
      1063,
      1064,
      1065,
      1066,
      1067,
      1068,
      1069,
      1070,
      1071,
      1072,
      1073
    ]
  },
  {
    "name": "Sebastian Angel",
    "display_name": "Sebastian Angel",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 7,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3,
      "USENIXSEC": 3,
      "EUROSYS": 1,
      "NSDI": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2021": 1,
        "2023": 1,
        "2020": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2022": 2
      },
      "EUROSYS": {
        "2022": 1
      },
      "NSDI": {
        "2024": 1,
        "2023": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 63.6,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2022,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 7,
    "badges_reproducible": 7,
    "papers": [
      {
        "title": "Mycelium: Large-Scale Distributed Graph Queries with Differential Privacy",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rolis: a software approach to efficiently replicating multi-core transactions",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Incremental Offline/Online PIR",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Efficient Representation of Numerical Optimization Problems for SNARKs",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Nimble: Rollback Protection for Confidential Cloud Services",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fault-tolerant and transactional stateful serverless workflows",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oryx private detection of cycles in federated graphs",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "mucache a general framework for caching in microservice graphs",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "addax a fast private and accountable ad exchange infrastructure",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "bringing decentralized search to decentralized services",
        "conference": "OSDI",
        "year": 2021
      }
    ],
    "author_id": 75,
    "paper_ids": [
      1074,
      1075,
      1076,
      1077,
      1078,
      1079,
      1080
    ],
    "papers_without_artifact_ids": [
      1081,
      1082,
      1083,
      72
    ]
  },
  {
    "name": "Quan Chen 0002",
    "display_name": "Quan Chen",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 7,
    "total_papers": 8,
    "total_papers_by_conf": {
      "SC": 1,
      "OSDI": 1,
      "ATC": 5,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "OSDI": {
        "2023": 1
      },
      "ATC": {
        "2022": 4,
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 87.5,
    "repro_rate": 57.1,
    "functional_rate": 57.1,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SC"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Enable simultaneous DNN services based on deterministic operator overlap and precise latency prediction",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Help Rather Than Recycle: Alleviating Cold Startup in Serverless Computing Through Inter-Function Container Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PilotFish: Harvesting Free Cycles of Cloud Gaming with Deep Learning Training",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DVABatch: Diversity-aware Multi-Entry Multi-Exit Batching for Efficient Processing of DNN Services on GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "RunD: A Lightweight Secure Container Runtime for High-density Deployment and High-concurrency Startup in Serverless Computing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Nodens: Enabling Resource Efficient and Fast QoS Recovery of Dynamic Microservice Applications in Datacenters",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Optimizing Dynamic Neural Networks with Brainstorm",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improving gpu sharing performance through adaptive bubbleless spatialtemporal sharing",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 77,
    "paper_ids": [
      1084,
      1085,
      149,
      1086,
      1087,
      1088,
      155
    ],
    "papers_without_artifact_ids": [
      1089
    ]
  },
  {
    "name": "Minyi Guo",
    "display_name": "Minyi Guo",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 7,
    "total_papers": 9,
    "total_papers_by_conf": {
      "SC": 1,
      "OSDI": 1,
      "ATC": 5,
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "OSDI": {
        "2023": 1
      },
      "ATC": {
        "2022": 4,
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "FAST": {
        "2026": 1
      }
    },
    "artifact_rate": 77.8,
    "repro_rate": 57.1,
    "functional_rate": 57.1,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SC"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Enable simultaneous DNN services based on deterministic operator overlap and precise latency prediction",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Help Rather Than Recycle: Alleviating Cold Startup in Serverless Computing Through Inter-Function Container Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PilotFish: Harvesting Free Cycles of Cloud Gaming with Deep Learning Training",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DVABatch: Diversity-aware Multi-Entry Multi-Exit Batching for Efficient Processing of DNN Services on GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "RunD: A Lightweight Secure Container Runtime for High-density Deployment and High-concurrency Startup in Serverless Computing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Nodens: Enabling Resource Efficient and Fast QoS Recovery of Dynamic Microservice Applications in Datacenters",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Optimizing Dynamic Neural Networks with Brainstorm",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cacheslide unlocking cross positionaware kv cache reuse for accelerating llm serving",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "improving gpu sharing performance through adaptive bubbleless spatialtemporal sharing",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 78,
    "paper_ids": [
      1084,
      1085,
      149,
      1086,
      1087,
      1088,
      155
    ],
    "papers_without_artifact_ids": [
      1090,
      1089
    ]
  },
  {
    "name": "Hai Jin 0001",
    "display_name": "Hai Jin",
    "affiliation": "HUST",
    "artifact_count": 7,
    "total_papers": 20,
    "total_papers_by_conf": {
      "SC": 3,
      "USENIXSEC": 4,
      "ACSAC": 3,
      "EUROSYS": 4,
      "ATC": 3,
      "FAST": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 3
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2025": 2
      },
      "ACSAC": {
        "2018": 1,
        "2022": 2
      },
      "EUROSYS": {
        "2025": 3,
        "2024": 1
      },
      "ATC": {
        "2024": 2,
        "2023": 1
      },
      "FAST": {
        "2025": 2
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 35.0,
    "repro_rate": 42.9,
    "functional_rate": 57.1,
    "category": "both",
    "conferences": [
      "ACSAC",
      "SC",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Hardware-supported remote persistence for distributed persistent memory",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Whale: efficient one-to-many data partitioning in RDMA-assisted distributed stream processing systems",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "LCCG: a locality-centric hardware accelerator for high throughput of concurrent graph processing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Trebiz: Byzantine Fault Tolerance with Byzantine Merchants",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Precise and Effective Gadget Chain Mining through Deserialization Guided Call Graph Construction",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Automated Vulnerability Repair: Methods, Tools, and Assessments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "metahg enhancing hgnn systems leveraging advanced metapath graph abstraction",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "hourglass enabling efficient split federated learning with data parallelism",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "ohminer an overlapcentric system for efficient hypergraph pattern mining",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "aegonkv a high bandwidth low tail latency and low storage cost kvseparated lsm store with smartssdbased gc offloading",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "towards highthroughput and lowlatency billionscale vector search via cpugpu collaborative filtering and reranking",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "scalable billionpoint approximate nearest neighbor search using smartssds",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "streambox a lightweight gpu sandbox for serverless inference workflow",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "lsgraph a localitycentric highperformance streaming graph engine",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "dorpatch distributed and occlusionrobust adversarial patch to evade certifiable defenses",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "fire combining multistage filtering with taint analysis for scalable recurring vulnerability detection",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "cyclosa redundancyfree graph pattern mining via set dataflow",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "shattered chain of trust understanding security risks in crosscloud iot access delegation",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "a heuristic framework to detect concurrency vulnerabilities",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 47,
    "paper_ids": [
      1091,
      1092,
      1093,
      1094,
      1095,
      1096,
      1097
    ],
    "papers_without_artifact_ids": [
      1098,
      1099,
      1100,
      1101,
      1102,
      1103,
      1104,
      1105,
      1106,
      1107,
      1108,
      615,
      1109
    ]
  },
  {
    "name": "Lukas Maar",
    "display_name": "Lukas Maar",
    "affiliation": "Graz University of Technology,Graz,Austria",
    "artifact_count": 7,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 2,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 3
      },
      "NDSS": {
        "2025": 2
      },
      "ACSAC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 77.8,
    "repro_rate": 71.4,
    "functional_rate": 71.4,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "Manifest Problems: Analyzing Code Transparency for Android Application Bundles",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DOPE: DOmain Protection Enforcement with PKS",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "KernelSnitch: Side Channel-Attacks on Kernel Data Structures",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "powerrelated sidechannel attacks using the android sensor framework",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "the doom of device drivers your android device most likely has nday kernel vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 79,
    "paper_ids": [
      1110,
      265,
      269,
      270,
      274,
      275,
      276
    ],
    "papers_without_artifact_ids": [
      277,
      279
    ]
  },
  {
    "name": "Nick Nikiforakis",
    "display_name": "Nick Nikiforakis",
    "affiliation": "Stony Brook University",
    "artifact_count": 7,
    "total_papers": 12,
    "total_papers_by_conf": {
      "USENIXSEC": 8,
      "ACSAC": 3,
      "PETS": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2022": 2,
        "2025": 2,
        "2021": 1
      },
      "ACSAC": {
        "2024": 2,
        "2017": 1
      },
      "PETS": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 58.3,
    "repro_rate": 57.1,
    "functional_rate": 71.4,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2017,
      2021,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2017-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 5,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Harnessing Multiplicity: Granular Browser Extension Fingerprinting through User Configurations",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Lost in the Mists of Time: Expirations in DNS Footprints of Mobile Apps",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Doubly Dangerous: Evading Phishing Reporting Systems by Leveraging Email Tracking Techniques",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ready or not here i come characterizing the security of prematurelypublic web applications",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "like comment get scammed characterizing comment scams on media platforms",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "smudged fingerprints characterizing and improving the performance of web application fingerprinting",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "animatedead debloating web applications using concolic execution",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "the dangers of human touch fingerprinting browser extensions through user actions",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 80,
    "paper_ids": [
      1111,
      1112,
      798,
      1113,
      1114,
      1115,
      1116
    ],
    "papers_without_artifact_ids": [
      1117,
      1118,
      1119,
      801,
      1120
    ]
  },
  {
    "name": "Hyoungshick Kim",
    "display_name": "Hyoungshick Kim",
    "affiliation": "Sungkyunkwan University",
    "artifact_count": 7,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "NDSS": 1,
      "ACSAC": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2025": 4,
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      },
      "ACSAC": {
        "2021": 1,
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 70.0,
    "repro_rate": 71.4,
    "functional_rate": 42.9,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 3,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Logs In, Patches Out: Automated Vulnerability Repair via Tree-of-Thought LLM Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TAPAS: An Efficient Online APT Detection with Task-guided Process Provenance Graph Segmentation and Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sharing cyber threat intelligence: Does it really help?",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i experienced more than 10 defi scams on defi users perception of security breaches and countermeasures",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "towards usable and secure locationbased smartphone authentication",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "void a fast and light voice liveness detection system",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 81,
    "paper_ids": [
      1121,
      765,
      1122,
      1123,
      1124,
      1125,
      1126
    ],
    "papers_without_artifact_ids": [
      661,
      1127,
      1128
    ]
  },
  {
    "name": "Mauro Conti",
    "display_name": "Mauro Conti",
    "affiliation": "University of Padova",
    "artifact_count": 7,
    "total_papers": 12,
    "total_papers_by_conf": {
      "PETS": 2,
      "CHES": 1,
      "NDSS": 2,
      "WOOT": 1,
      "USENIXSEC": 4,
      "ACSAC": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 1
      },
      "CHES": {
        "2022": 1
      },
      "NDSS": {
        "2025": 2
      },
      "WOOT": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2021": 1,
        "2022": 1
      },
      "ATC": {}
    },
    "artifact_rate": 58.3,
    "repro_rate": 42.9,
    "functional_rate": 42.9,
    "category": "security",
    "conferences": [
      "ACSAC",
      "CHES",
      "NDSS",
      "PETS",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2021,
      2022,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Efficient Batchable Secure Outsourced Computation: Depth-Aware Arithmetization of Common Primitives for BFV & BGV",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeepRed: A Deep Learning-Powered Command and Control Framework for Multi-Stage Red Teaming Against ML-based Network Intrusion Detection Systems",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Topology-Based Reconstruction Prevention for Decentralised Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "speak up im listening extracting speech from zeropermission vr sensors",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "privacypreserving data aggregation with public verifiability against internal adversaries",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "it doesnt look like anything to me using diffusion model to subvert visual phishing detectors",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "sok secure aggregation based on cryptographic schemes for federated learning",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "hand me your pin inferring atm pins of users typing with a covered hand",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 82,
    "paper_ids": [
      1129,
      1130,
      4,
      1131,
      1132,
      1133,
      1134
    ],
    "papers_without_artifact_ids": [
      1135,
      1136,
      1137,
      1138,
      1139
    ]
  },
  {
    "name": "Micah Sherr",
    "display_name": "Micah Sherr",
    "affiliation": "Georgetown University",
    "artifact_count": 7,
    "total_papers": 16,
    "total_papers_by_conf": {
      "PETS": 5,
      "USENIXSEC": 6,
      "ACSAC": 4,
      "SOSP": 0,
      "ATC": 0,
      "WOOT": 0,
      "NDSS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2025": 1,
        "2024": 1,
        "2021": 2
      },
      "USENIXSEC": {
        "2024": 2,
        "2023": 2,
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {
        "2018": 2,
        "2022": 1,
        "2019": 1
      },
      "SOSP": {},
      "ATC": {},
      "WOOT": {},
      "NDSS": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 43.8,
    "repro_rate": 14.3,
    "functional_rate": 71.4,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2021,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2018-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 5,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "An Extensive Evaluation of the Internet's Open Proxies",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeDoS: Defusing DoS with Dispersion Oriented Software",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "User Perceptions of the Privacy and Usability of Smart DNS",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SpotProxy: Rediscovering the Cloud for Censorship Circumvention",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Educators' Perspectives of Using (or Not Using) Online Exam Proctoring",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Censorship Evasion with Unidentified Protocol Generation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Residue-Free Computing",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scif privacypreserving statistics collection with input validation and full security",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "on precisely detecting censorship circumvention in realworld networks",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "editors introduction",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "i can say im john travoltabut im not john travolta investigating the impact of changes to social media verification policies on user perceptions of verified accounts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "editors introduction",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "cadence a simulator for human movementbased communication protocols",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "learning to behave improving covert channel security with behaviorbased designs",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "holes in the geofence privacy vulnerabilities in smart dns services",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "examining the examiners students privacy and security perceptions of online proctoring services",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "whisper a unilateral defense against voip traffic reidentification attacks",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 83,
    "paper_ids": [
      1140,
      696,
      857,
      698,
      859,
      1141,
      1142
    ],
    "papers_without_artifact_ids": [
      1143,
      1144,
      810,
      1145,
      810,
      866,
      1146,
      868,
      875,
      1147
    ]
  },
  {
    "name": "Yan Shoshitaishvili",
    "display_name": "Yan Shoshitaishvili",
    "affiliation": "Arizona State University",
    "artifact_count": 7,
    "total_papers": 16,
    "total_papers_by_conf": {
      "USENIXSEC": 12,
      "ACSAC": 3,
      "PETS": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2020": 2,
        "2023": 1,
        "2022": 3,
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {
        "2018": 1,
        "2019": 1,
        "2017": 1
      },
      "PETS": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 43.8,
    "repro_rate": 71.4,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2018-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 7,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scammagnifier piercing the veil of fraudulent shopping website campaigns",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "take a step further understanding page spray in linux kernel exploitation",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "tygr type inference on stripped binaries using graph neural networks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "unleash the simulacrum shifting browser realities for robust extensionfingerprinting prevention",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "having your cake and eating it an analysis of concessionabuseasaservice",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "exploiting uses of uninitialized stack variables in linux kernels to leak kernel pointers",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "phishtime continuous longitudinal measurement of the effectiveness of antiphishing blacklists",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "sleak automating address space layout derandomization",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "piston uncooperative remote runtime patching",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 84,
    "paper_ids": [
      815,
      817,
      818,
      819,
      820,
      821,
      822
    ],
    "papers_without_artifact_ids": [
      823,
      826,
      825,
      827,
      828,
      829,
      830,
      1148,
      1149
    ]
  },
  {
    "name": "Giovanni Vigna",
    "display_name": "Giovanni Vigna",
    "affiliation": "Univ. of California - Santa Barbara",
    "artifact_count": 7,
    "total_papers": 23,
    "total_papers_by_conf": {
      "USENIXSEC": 13,
      "ACSAC": 7,
      "WOOT": 0,
      "PETS": 0,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2020": 1,
        "2023": 3,
        "2022": 3,
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {
        "2024": 1,
        "2018": 1,
        "2022": 1,
        "2019": 2,
        "2017": 2
      },
      "WOOT": {},
      "PETS": {},
      "NDSS": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 30.4,
    "repro_rate": 57.1,
    "functional_rate": 57.1,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "POPKORN: Popping Windows Kernel Drivers At Scale",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Regulator: Dynamic Analysis to Detect ReDoS",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Approve Once, Regret Forever: On the Exploitation of Ethereum's Approve-TransferFrom Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a largescale measurement study of the proxy protocol and its security implications",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "malintent coverage guided intent fuzzing framework for android",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "deepcapa identifying malicious capabilities in windows malware",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "not your type detecting storage collision vulnerabilities in ethereum smart contracts",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "remote keylogging attacks in multiuser vr applications",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "guideenricher protecting the anonymity of ethereum mixing service users with deep reinforcement learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a large scale study of the ethereum arbitrage ecosystem",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "confusum contractum confused deputy vulnerabilities in ethereum smart contracts",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "actor actionguided kernel fuzzing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "decomperson how humans decompile and what we can learn from it",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "tokenlevel fuzzing",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "neurlux dynamic malware analysis without feature engineering",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "sleak automating address space layout derandomization",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "using loops for malware classification resilient to featureunaware perturbations",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "piston uncooperative remote runtime patching",
        "conference": "ACSAC",
        "year": 2017
      },
      {
        "title": "exploitation and mitigation of authentication schemes based on devicepublic information",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 85,
    "paper_ids": [
      654,
      817,
      1150,
      9,
      106,
      1151,
      1152
    ],
    "papers_without_artifact_ids": [
      1153,
      659,
      1154,
      1155,
      1156,
      1157,
      1158,
      1159,
      24,
      1160,
      1161,
      1162,
      1148,
      1163,
      1149,
      1164
    ]
  },
  {
    "name": "Christopher Kruegel",
    "display_name": "Christopher Kruegel",
    "affiliation": "Univ. of California - Santa Barbara",
    "artifact_count": 7,
    "total_papers": 23,
    "total_papers_by_conf": {
      "USENIXSEC": 13,
      "ACSAC": 7,
      "ATC": 0,
      "WOOT": 0,
      "PETS": 0,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2020": 1,
        "2023": 3,
        "2022": 3,
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {
        "2024": 1,
        "2018": 1,
        "2022": 1,
        "2019": 2,
        "2017": 2
      },
      "ATC": {},
      "WOOT": {},
      "PETS": {},
      "NDSS": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 30.4,
    "repro_rate": 57.1,
    "functional_rate": 57.1,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "POPKORN: Popping Windows Kernel Drivers At Scale",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Regulator: Dynamic Analysis to Detect ReDoS",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Approve Once, Regret Forever: On the Exploitation of Ethereum's Approve-TransferFrom Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a largescale measurement study of the proxy protocol and its security implications",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "malintent coverage guided intent fuzzing framework for android",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "deepcapa identifying malicious capabilities in windows malware",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "not your type detecting storage collision vulnerabilities in ethereum smart contracts",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "remote keylogging attacks in multiuser vr applications",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "guideenricher protecting the anonymity of ethereum mixing service users with deep reinforcement learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a large scale study of the ethereum arbitrage ecosystem",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "confusum contractum confused deputy vulnerabilities in ethereum smart contracts",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "actor actionguided kernel fuzzing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "decomperson how humans decompile and what we can learn from it",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "tokenlevel fuzzing",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "neurlux dynamic malware analysis without feature engineering",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "sleak automating address space layout derandomization",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "using loops for malware classification resilient to featureunaware perturbations",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "piston uncooperative remote runtime patching",
        "conference": "ACSAC",
        "year": 2017
      },
      {
        "title": "exploitation and mitigation of authentication schemes based on devicepublic information",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 86,
    "paper_ids": [
      654,
      817,
      1150,
      9,
      106,
      1151,
      1152
    ],
    "papers_without_artifact_ids": [
      1153,
      659,
      1154,
      1155,
      1156,
      1157,
      1158,
      1159,
      24,
      1160,
      1161,
      1162,
      1148,
      1163,
      1149,
      1164
    ]
  },
  {
    "name": "Elisa Bertino",
    "display_name": "Elisa Bertino",
    "affiliation": "Purdue University",
    "artifact_count": 7,
    "total_papers": 12,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 2,
      "ACSAC": 4,
      "ATC": 0,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2025": 2
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "ACSAC": {
        "2021": 1,
        "2019": 2,
        "2020": 1
      },
      "ATC": {},
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 58.3,
    "repro_rate": 28.6,
    "functional_rate": 85.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2022,
      2024,
      2025
    ],
    "year_range": "2019-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 6,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Gotta Detect 'Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sharing cyber threat intelligence: Does it really help?",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "medusa attack exploring security hazards of inapp qr code scanning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "cryptochain a relay resilience framework for smart vehicles",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "certified copy understanding security risks of wifi hotspot based android data clone services",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "protecting the 4g and 5g cellular paging protocols against security and privacy attacks",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "an empirical study of sms onetime password authentication in android apps",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 87,
    "paper_ids": [
      1165,
      1166,
      1167,
      1168,
      445,
      1126,
      1169
    ],
    "papers_without_artifact_ids": [
      1170,
      1171,
      768,
      1172,
      769
    ]
  },
  {
    "name": "Gene Tsudik",
    "display_name": "Gene Tsudik",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 7,
    "total_papers": 11,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 9,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 3,
        "2025": 3,
        "2021": 1
      },
      "ACSAC": {
        "2019": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 63.6,
    "repro_rate": 28.6,
    "functional_rate": 57.1,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2020,
      2022,
      2025
    ],
    "year_range": "2019-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "PDoT: private DNS-over-TLS with TEE support",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Scoop: Mitigation of Recapture Attacks on Provenance-Based Media Authentication",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "URL Inspection Tasks: Helping Users Detect Phishing Links in Emails",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Oblivious Digital Tokens",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DB-PAISA: Discovery-Based Privacy-Agile IoT Sensing+Actuation",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an empirical study evaluation of modern captchas",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "vcer efficient certificate validation in constrained networks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "garota generalized active rootoftrust architecture for tiny embedded devices",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "cacti captcha avoidance via clientside tee integration",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 88,
    "paper_ids": [
      1173,
      1174,
      1175,
      1176,
      1177,
      446,
      1178
    ],
    "papers_without_artifact_ids": [
      1179,
      1180,
      1181,
      1182
    ]
  },
  {
    "name": "Ben Stock",
    "display_name": "Ben Stock",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 7,
    "total_papers": 11,
    "total_papers_by_conf": {
      "USENIXSEC": 8,
      "ACSAC": 1,
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 3,
        "2021": 1
      },
      "ACSAC": {
        "2019": 1
      },
      "PETS": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 63.6,
    "repro_rate": 28.6,
    "functional_rate": 57.1,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2020,
      2022,
      2024,
      2025
    ],
    "year_range": "2019-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "JStap: a static pre-filter for malicious JavaScript detection",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Trust Me If You Can - How Usable Is Trusted Types In Practice?",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Security Lottery: Measuring Client-Side Web Security Inconsistencies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Web Execution Bundles: Reproducible, Accurate, and Archivable Web Measurements",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"I have no idea how to make it safer\": Studying Security and Privacy Mindsets of Browser Extension Developers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Double-Edged Shield: On the Fingerprintability of Customized Ad Blockers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the unusual suspects studying reasons for lacking updates in wordpress",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "comparing largescale privacy and security notifications",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "extended hello a comprehensive largescale study on email confidentiality and integrity mechanisms in the wild",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "share first ask later or never studying violations of gdprs explicit consent in android apps",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 89,
    "paper_ids": [
      401,
      1183,
      403,
      1184,
      1185,
      1186,
      969
    ],
    "papers_without_artifact_ids": [
      1187,
      1188,
      1189,
      407
    ]
  },
  {
    "name": "N. Asokan",
    "display_name": "N. Asokan",
    "affiliation": "University of Waterloo",
    "artifact_count": 7,
    "total_papers": 9,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 5,
      "NDSS": 1,
      "ACSAC": 1,
      "SOSP": 0,
      "SYSTEX": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      },
      "ACSAC": {
        "2023": 1
      },
      "SOSP": {},
      "SYSTEX": {}
    },
    "artifact_rate": 77.8,
    "repro_rate": 28.6,
    "functional_rate": 57.1,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "False Claims against Model Ownership Resolution",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ariadne: Navigating through the Labyrinth of Data-Driven Customization Inconsistencies in Android",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PACStack: an Authenticated Call Stack",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Effective writing style transfer via combinatorial paraphrasing",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok the spectre of surveillance and censorship in future internet architectures",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "auditing framework apis via inferred appside security specifications",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 90,
    "paper_ids": [
      1190,
      298,
      1191,
      1192,
      1193,
      1194,
      1195
    ],
    "papers_without_artifact_ids": [
      1196,
      1197
    ]
  },
  {
    "name": "Hongxin Hu",
    "display_name": "Hongxin Hu",
    "affiliation": "University at Buffalo",
    "artifact_count": 7,
    "total_papers": 11,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "ACSAC": 1,
      "WOOT": 1,
      "NSDI": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1,
        "2022": 1,
        "2025": 2
      },
      "ACSAC": {
        "2020": 1
      },
      "WOOT": {
        "2024": 1
      },
      "NSDI": {
        "2024": 1,
        "2023": 1,
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 63.6,
    "repro_rate": 28.6,
    "functional_rate": 71.4,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2020,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 5,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Where's the \"up\"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "APPATCH: Automated Adaptive Prompting Large Language Models for Real-World Software Vulnerability Patching",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i know what you meme understanding and detecting harmful memes with multimodal large language models",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "hairpin rethinking packet loss recovery in edgebased interactive video streaming",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "enabling high quality realtime communications with adaptive framerate",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "imap fast and scalable innetwork scanning with programmable switches",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 91,
    "paper_ids": [
      1198,
      167,
      1199,
      1200,
      1201,
      1202,
      1203
    ],
    "papers_without_artifact_ids": [
      1204,
      1205,
      1206,
      1207
    ]
  },
  {
    "name": "Florian Kerschbaum",
    "display_name": "Florian Kerschbaum",
    "affiliation": "University of Waterloo",
    "artifact_count": 7,
    "total_papers": 17,
    "total_papers_by_conf": {
      "PETS": 6,
      "USENIXSEC": 9,
      "NDSS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 2,
        "2022": 1,
        "2023": 2,
        "2025": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 1,
        "2022": 3,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 41.2,
    "repro_rate": 28.6,
    "functional_rate": 57.1,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Practical Over-Threshold Multi-Party Private Set Intersection",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Caring about Sharing: User Perceptions of Multiparty Data Sharing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mind the Gap: Ceremonies for Applied Secret Sharing",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Differentially Private Simple Genetic Algorithms",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Private Shared Random Minimum Spanning Forests",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "THEMIS: Regulating Textual Inversion for Personalized Concept Censorship",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fastlloyd federated accurate secure and tunable kmeans clustering with differential privacy",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "fast and private inference of deep neural networks by codesigning activation functions",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "pepsi practically efficient private set intersection in the unbalanced setting",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "trifecta faster highthroughput threeparty computation over wan using multifanin logic gates",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "ptw pivotal tuning watermarking for pretrained image generators",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "editors introduction",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "ihop improved statistical query recovery against searchable symmetric encryption through quadratic optimization",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "editors introduction",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "hiding the access pattern is not enough exploiting search pattern leakage in searchable encryption",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "computation on encrypted data using dataflow authentication",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "secure multiparty computation of differentially private median",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 92,
    "paper_ids": [
      1208,
      1209,
      1210,
      1211,
      1212,
      1213,
      735
    ],
    "papers_without_artifact_ids": [
      1214,
      1215,
      1216,
      1217,
      1218,
      810,
      1219,
      810,
      1220,
      1221,
      1222
    ]
  },
  {
    "name": "Vincent Hwang",
    "display_name": "Vincent Hwang",
    "affiliation": "Max Planck Institute for Security and Privacy",
    "artifact_count": 7,
    "total_papers": 7,
    "total_papers_by_conf": {
      "CHES": 7
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 4,
        "2021": 2,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021,
      2022,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 7,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NTT Multiplication for NTT-unfriendly Rings New Speed Records for Saber and NTRU on Cortex-M4 and AVX2",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Multiplying Polynomials without Powerful Multiplication Instructions",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 93,
    "paper_ids": [
      428,
      429,
      430,
      431,
      432,
      434,
      1223
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Srdjan Capkun",
    "display_name": "Srdjan Capkun",
    "affiliation": "ETH Zurich",
    "artifact_count": 7,
    "total_papers": 18,
    "total_papers_by_conf": {
      "USENIXSEC": 12,
      "NDSS": 1,
      "ACSAC": 3,
      "CHES": 1,
      "WOOT": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 2,
        "2025": 5,
        "2021": 2
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1,
        "2019": 1
      },
      "CHES": {
        "2022": 1
      },
      "WOOT": {},
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 38.9,
    "repro_rate": 14.3,
    "functional_rate": 42.9,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PURE: Payments with UWB RElay-protection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GNSS-WASP: GNSS Wide Area SPoofing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LEO-Range: Physical Layer Design for Secure Ranging with Low Earth Orbiting Satellites",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "URL Inspection Tasks: Helping Users Detect Phishing Links in Emails",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "glados locationaware denialofservice of cellular networks",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "phishing attacks against password manager browser extensions",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "confidential computing with heterogeneous devices at cloudscale",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "time for change how clocks break uwb secure ranging",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "composite enclaves towards disaggregated trusted execution",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "ltrack stealthy tracking of mobile phones in lte",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "security of multicarrier timeofflight ranging",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "is realtime phishing eliminated with fido social engineering downgrade attacks against fido protocols",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "digital contact tracing",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "drsgx automated and adjustable sidechannel protection for sgx using data location randomization",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "deniable upload and download via passive participation",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 94,
    "paper_ids": [
      440,
      413,
      1224,
      1225,
      1177,
      1226,
      1227
    ],
    "papers_without_artifact_ids": [
      1228,
      1229,
      1230,
      1231,
      1232,
      1233,
      1234,
      1235,
      1236,
      1237,
      1238
    ]
  },
  {
    "name": "Sascha Fahl",
    "display_name": "Sascha Fahl",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 7,
    "total_papers": 22,
    "total_papers_by_conf": {
      "USENIXSEC": 17,
      "NDSS": 1,
      "ACSAC": 2,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2020": 2,
        "2023": 3,
        "2022": 2,
        "2025": 3,
        "2021": 4
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1,
        "2018": 1
      },
      "PETS": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 31.8,
    "repro_rate": 14.3,
    "functional_rate": 28.6,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "How Transparent is Usable Privacy and Security Research? A Meta-Study on Current Research Transparency Practices",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"That's my perspective from 30 years of doing this\": An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"Threat modeling is very formal, it's very technical, and also very hard to do correctly\": Investigating Threat Modeling Practices in Open-Source Software Projects",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "its not my data anymore exploring nonusers privacy perceptions of medical data donation apps",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "passwords togo investigating multifaceted challenges for password managers in the android ecosystem",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "a mixedmethods study on user experiences and challenges of recovery codes for an endtoend encrypted service",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "you have to read 50 different rfcs that contradict each other an interview study on the experiences of implementing cryptographic standards",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "the challenges of bringing cryptography from research papers to products results from an interview study with experts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "privacy rarely considered exploring considerations in the adoption of thirdparty services by websites",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "security is not my field im a stats guy a qualitative root cause analysis of barriers to adversarial machine learning defenses in industry",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "i wouldnt want my unsafe code to run my pacemaker an interview study on the use comprehension and perceived risks of unsafe rust",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "if you cant get them to the lab evaluating a virtual study environment with security information workers",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "on the limited impact of visualizing encryption perceptions of e2e messaging security",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "never ever or no matter what investigating adoption intentions and misconceptions about the coronawarnapp in germany",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "why eve and mallory still love android revisiting tls insecurity in android applications",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "a largescale interview study on information security in and attacks against small and mediumsized enterprises",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "cloudy with a chance of misconceptions exploring users perceptions and expectations of security and privacy in cloud office suites",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "a large scale investigation of obfuscation use in google play",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 95,
    "paper_ids": [
      1239,
      1240,
      1241,
      1242,
      1243,
      1244,
      1245
    ],
    "papers_without_artifact_ids": [
      1246,
      1247,
      1248,
      1249,
      1250,
      116,
      1251,
      1252,
      1253,
      1254,
      1255,
      408,
      1256,
      1257,
      1258
    ]
  },
  {
    "name": "Michelle L. Mazurek",
    "display_name": "Michelle L. Mazurek",
    "affiliation": "Univ. of Maryland - College Park",
    "artifact_count": 7,
    "total_papers": 29,
    "total_papers_by_conf": {
      "USENIXSEC": 23,
      "PETS": 4,
      "FAST": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 7,
        "2020": 4,
        "2023": 3,
        "2022": 1,
        "2025": 2,
        "2021": 6
      },
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2024": 1,
        "2021": 1,
        "2026": 1
      },
      "FAST": {
        "2012": 1,
        "2014": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 24.1,
    "repro_rate": 0.0,
    "functional_rate": 14.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2022,
      2024,
      2025,
      2026
    ],
    "year_range": "2020-2026",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Why Users (Don't) Use Password Managers at a Large Educational Institution",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "How Researchers De-Identify Data in Practice",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "What Does It Mean to Be Creepy? Responses to Visualizations of Personal Browsing Activity, Online Tracking, and Targeted Ads",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ML-CB: Machine Learning Canvas Block",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "How Experts Personalize Privacy & Security Advice for At-Risk Users",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "as advertised understanding the impact of influencer vpn ads",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "i can say im john travoltabut im not john travolta investigating the impact of changes to social media verification policies on user perceptions of verified accounts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "understanding how people share passwords",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "write read or fix exploring alternative methods for secure development studies",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "how entertainment journalists manage online hate and harassment",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "data subjects reactions to exercising their right of access",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a decade of privacyrelevant android app reviews large scale trends",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a survey of cybersecurity professionals perceptions and experiences of safety and belonging in the community",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "editors introduction",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "bug hunters perspectives on the challenges and benefits of the bug bounty ecosystem",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "how library it staff navigate privacy and security challenges and responsibilities",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "the role of professional product reviewers in evaluating security and privacy",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "editors introduction",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "pursuing usable and useful data downloads under gdprccpa access rights via codesign",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "comparing security and privacy attitudes among us users of different smartphone and smartspeaker platforms",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "its stressful having all these phones investigating sex workers safety goals risks and practices online",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "strategies and perceived risks of sending sensitive documents",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "benefits and drawbacks of adopting a secure programming language rust as a case study",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "what twitter knows characterizing ad targeting practices user perceptions and ad explanations through users own twitter data",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "an observational investigation of reverse engineers processes",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "understanding security mistakes developers make qualitative analysis from build it break it fix it",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "toward strong usable access control for shared distributed data",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "zzfs a hybrid device and cloud file system for spontaneous users",
        "conference": "FAST",
        "year": 2012
      }
    ],
    "author_id": 96,
    "paper_ids": [
      1259,
      860,
      862,
      1260,
      1261,
      1262,
      1263
    ],
    "papers_without_artifact_ids": [
      1264,
      1145,
      1265,
      1266,
      1267,
      1268,
      1269,
      1270,
      810,
      1271,
      1272,
      1273,
      810,
      1274,
      1275,
      1276,
      876,
      1277,
      1278,
      1279,
      1280,
      1281,
      1282
    ]
  },
  {
    "name": "Ian Goldberg 0001",
    "display_name": "Ian Goldberg",
    "affiliation": "University of Waterloo",
    "artifact_count": 7,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 7,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2021": 1
      },
      "PETS": {
        "2020": 2,
        "2023": 1,
        "2025": 1,
        "2024": 2,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 70.0,
    "repro_rate": 28.6,
    "functional_rate": 28.6,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mind the Gap: Ceremonies for Applied Secret Sharing",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mitigator: Privacy policy compliance using trusted hardware",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Lox: Protecting the Social Graph in Bridge Distribution",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TEEMS: A Trusted Execution Environment based Metadata-protected Messaging System",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok metadataprotecting communication systems",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "sok privacypreserving reputation systems",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "walking onions scaling anonymity networks while protecting users",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 97,
    "paper_ids": [
      1283,
      1284,
      1211,
      1285,
      1286,
      1287,
      1288
    ],
    "papers_without_artifact_ids": [
      1289,
      1290,
      1291
    ]
  },
  {
    "name": "M. Frans Kaashoek",
    "display_name": "M. Frans Kaashoek",
    "affiliation": "Massachusetts Inst. of Technology",
    "artifact_count": 6,
    "total_papers": 20,
    "total_papers_by_conf": {
      "SOSP": 5,
      "OSDI": 5,
      "SC": 0,
      "EUROSYS": 1,
      "ATC": 0,
      "USENIXSEC": 0,
      "NSDI": 9
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 3,
        "2024": 2
      },
      "OSDI": {
        "2021": 1,
        "2022": 2,
        "2023": 1,
        "2020": 1
      },
      "SC": {},
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {},
      "USENIXSEC": {},
      "NSDI": {
        "2009": 1,
        "2010": 1,
        "2006": 2,
        "2008": 2,
        "2005": 2,
        "2004": 1
      }
    },
    "artifact_rate": 30.0,
    "repro_rate": 83.3,
    "functional_rate": 83.3,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2022,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 5,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "Grove: a Separation-Logic Library for Verifying Distributed Systems",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Edna: Disguising and Revealing User Data in Web Applications",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "GoJournal: a verified, concurrent, crash-safe journaling system",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Verifying the DaisyNFS concurrent and crash-safe file system with sequential reasoning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unifying serverless and microservice workloads with sigmaos",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "verifying vmvcc a highperformance transaction library using multiversion concurrency control",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "the k2 architecture for trustworthy hardware security modules",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "performance evolution of mitigating transient execution attacks",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "verifying hardware security modules with informationpreserving refinement",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "whanau a sybilproof distributed hash table",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "flexible widearea storage for distributed systems with wheelfs",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "d3s debugging deployed distributed systems",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "usenetdht a lowoverhead design for usenet",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "overcite a distributed cooperative citeseer",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "efficient replica maintenance for distributed storage systems",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "improving web availability for clients with monet",
        "conference": "NSDI",
        "year": 2005
      },
      {
        "title": "bandwidthefficient management of dht routing tables",
        "conference": "NSDI",
        "year": 2005
      },
      {
        "title": "designing a dht for low latency and high throughput",
        "conference": "NSDI",
        "year": 2004
      }
    ],
    "author_id": 98,
    "paper_ids": [
      979,
      1292,
      981,
      983,
      984,
      985
    ],
    "papers_without_artifact_ids": [
      1293,
      986,
      987,
      1294,
      989,
      1295,
      1296,
      1297,
      1298,
      1299,
      1300,
      1301,
      1302,
      1303
    ]
  },
  {
    "name": "Shivaram Venkataraman",
    "display_name": "Shivaram Venkataraman",
    "affiliation": "University of Wisconsin - Madison",
    "artifact_count": 6,
    "total_papers": 14,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "EUROSYS": 4,
      "SC": 1,
      "ATC": 0,
      "ACSAC": 0,
      "FAST": 1,
      "NSDI": 6
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 2,
        "2023": 1,
        "2024": 1
      },
      "SC": {
        "2021": 1
      },
      "ATC": {},
      "ACSAC": {},
      "FAST": {
        "2011": 1
      },
      "NSDI": {
        "2021": 1,
        "2017": 1,
        "2019": 1,
        "2023": 1,
        "2016": 1,
        "2020": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SC",
      "SOSP"
    ],
    "years": [
      2021,
      2023,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 6,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Bagpipe: Accelerating Deep Recommendation Model Training",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "KAISA: an adaptive second-order optimizer framework for deep neural networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TUNA: Tuning Unstable and Noisy Cloud Applications",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Eva: Cost-Efficient Cloud-Based Cluster Scheduling",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "MariusGNN: Resource-Efficient Out-of-Core Training of Graph Neural Networks",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Marius: Learning Massive Graph Embeddings on a Single Machine",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "blox a modular toolkit for deep learning schedulers",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "shockwave fair and efficient cluster scheduling for dynamic adaptation in machine learning",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "move fast and meet deadlines finegrained realtime stream processing with cameo",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "themis fair and efficient gpu cluster scheduling",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "shuffling fast and slow scalable analytics on serverless infrastructure",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "cherrypick adaptively unearthing the best cloud configurations for big data analytics",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "ernest efficient performance prediction for largescale advanced analytics",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "consistent and durable data structures for nonvolatile byteaddressable memory",
        "conference": "FAST",
        "year": 2011
      }
    ],
    "author_id": 67,
    "paper_ids": [
      1304,
      1305,
      1306,
      1307,
      1308,
      1309
    ],
    "papers_without_artifact_ids": [
      1310,
      1311,
      1312,
      1313,
      497,
      1314,
      505,
      1315
    ]
  },
  {
    "name": "Rong Chen 0001",
    "display_name": "Rong Chen",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 6,
    "total_papers": 16,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 7,
      "EUROSYS": 3,
      "ATC": 2,
      "FAST": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2021": 1,
        "2022": 1,
        "2024": 1,
        "2023": 3,
        "2020": 1
      },
      "EUROSYS": {
        "2024": 1,
        "2021": 1,
        "2022": 1
      },
      "ATC": {
        "2022": 1,
        "2023": 1
      },
      "FAST": {
        "2026": 1
      },
      "NSDI": {
        "2021": 1,
        "2025": 1
      }
    },
    "artifact_rate": 37.5,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2022,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "UGACHE: A Unified GPU Cache for Embedding-based Deep Learning",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "GNNLab: a factored system for sample-based GNN training over GPUs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "KRCORE: A Microsecond-scale RDMA Control Plane for Elastic Computing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Bridging the Gap between Relational OLTP and Graph-based OLAP",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Retrofitting High Availability Mechanism to Tame Hybrid Transaction/Analytical Processing",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fast RDMA-based Ordered Key-Value Store using Remote Learned Cache",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fast cloud storage for ai jobs via grouped io api with transparent readwrite optimizations",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "odrp ondemand remote paging with programmable rdma",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "serializationdeserializationfree state transfer in serverless workflows",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "fast and scalable innetwork lock management using lock fission",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "characterizing offpath smartnic for accelerating distributed systems",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "automated verification of idempotence for stateful serverless applications",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "no provisioned concurrency fast rdmacodesigned remote fork for serverless computing",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "microsecondscale preemption for concurrent gpuaccelerated dnn inferences",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "flexgraph a flexible and efficient distributed framework for gnn training",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "unifying timestamp with transaction ordering for mvcc with decentralized scalar timestamp",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 39,
    "paper_ids": [
      31,
      1316,
      34,
      37,
      40,
      46
    ],
    "papers_without_artifact_ids": [
      1317,
      51,
      54,
      59,
      63,
      64,
      62,
      69,
      1318,
      71
    ]
  },
  {
    "name": "Emma Dauterman",
    "display_name": "Emma Dauterman",
    "affiliation": "UC Berkeley, Berkeley, United States of America",
    "artifact_count": 6,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 4
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "OSDI": {
        "2024": 1,
        "2023": 1,
        "2020": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 6,
    "badges_reproducible": 6,
    "papers": [
      {
        "title": "Private Web Search with Tiptoe",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Secret Key Recovery in a Global-Scale End-to-End Encryption System",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Accountable authentication with privacy protection: The Larch system for universal login",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DORY: An Encrypted Search System with Distributed Trust",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SafetyPin: Encrypted Backups with Human-Memorable Secrets",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 102,
    "paper_ids": [
      980,
      668,
      673,
      1018,
      471,
      1019
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gregory R. Ganger",
    "display_name": "Gregory R. Ganger",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 6,
    "total_papers": 34,
    "total_papers_by_conf": {
      "SOSP": 6,
      "OSDI": 6,
      "SC": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "FAST": 19,
      "USENIXSEC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 3,
        "2024": 2
      },
      "OSDI": {
        "2021": 1,
        "2022": 1,
        "2024": 1,
        "2020": 3
      },
      "SC": {
        "2021": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "FAST": {
        "2009": 1,
        "2024": 1,
        "2008": 2,
        "2002": 3,
        "2005": 2,
        "2014": 2,
        "2004": 4,
        "2007": 2,
        "2003": 1,
        "2019": 1
      },
      "USENIXSEC": {},
      "NSDI": {
        "2017": 1,
        "2011": 1
      }
    },
    "artifact_rate": 17.6,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SC",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 6,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Sia: Heterogeneity-aware, goodput-optimized ML-cluster scheduling",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "WineFS: a hugepage-aware file system for persistent memory that ages gracefully",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Kangaroo: Caching Billions of Tiny Objects on Flash",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DeltaFS: a scalable no-ground-truth filesystem for massively-parallel computing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pollux: Co-adaptive Cluster Scheduling for Goodput-Optimized Deep Learning",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PACEMAKER: Avoiding HeART attacks in storage clusters with disk-adaptive redundancy",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "baleen ml admission prefetching for flash caches",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "fairywren a sustainable cache for emerging writereaderase flash interfaces",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "morph efficient filelifetime redundancy management for cluster file systems",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "reducing crosscloudregion costs with the autoconfiguring macaron cache",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "tiger diskadaptive redundancy without placement restrictions",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "loda a hostdevice codesign for strong predictability contract on modern flash storage",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "unearthing interjob dependencies for better cluster scheduling",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "the cachelib caching engine design and experiences at scale",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "cluster storage systems gotta have heart improving storage efficiency by exploiting diskreliability heterogeneity",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "gaia geodistributed machine learning approaching lan speeds",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "springfs bridging agility and performance in elastic distributed storage",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "toward strong usable access control for shared distributed data",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "diagnosing performance changes by comparing request flows",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "perspective semantic data management for the home",
        "conference": "FAST",
        "year": 2009
      },
      {
        "title": "measurement and analysis of tcp throughput collapse in clusterbased storage systems",
        "conference": "FAST",
        "year": 2008
      },
      {
        "title": "using utility to provision storage systems",
        "conference": "FAST",
        "year": 2008
      },
      {
        "title": "argon performance insulation for shared storage servers",
        "conference": "FAST",
        "year": 2007
      },
      {
        "title": "trace parallel trace replay with approximate causal events",
        "conference": "FAST",
        "year": 2007
      },
      {
        "title": "ursa minor versatile clusterbased storage",
        "conference": "FAST",
        "year": 2005
      },
      {
        "title": "on multidimensional data and modern disks",
        "conference": "FAST",
        "year": 2005
      },
      {
        "title": "a framework for building unobtrusive disk maintenance applications awarded best student paper",
        "conference": "FAST",
        "year": 2004
      },
      {
        "title": "memsbased storage devices and standard disk interfaces a square peg in a round hole",
        "conference": "FAST",
        "year": 2004
      },
      {
        "title": "diamond a storage architecture for early discard in interactive search",
        "conference": "FAST",
        "year": 2004
      },
      {
        "title": "atropos a disk array volume manager for orchestrated use of disks",
        "conference": "FAST",
        "year": 2004
      },
      {
        "title": "metadata efficiency in versioning file systems",
        "conference": "FAST",
        "year": 2003
      },
      {
        "title": "timingaccurate storage emulation",
        "conference": "FAST",
        "year": 2002
      },
      {
        "title": "freeblock scheduling outside of disk firmware",
        "conference": "FAST",
        "year": 2002
      },
      {
        "title": "trackaligned extents matching access patterns to disk drive characteristics",
        "conference": "FAST",
        "year": 2002
      }
    ],
    "author_id": 73,
    "paper_ids": [
      1319,
      1320,
      1321,
      1322,
      1323,
      1324
    ],
    "papers_without_artifact_ids": [
      1325,
      1326,
      1327,
      1328,
      1329,
      1330,
      1331,
      1332,
      1333,
      1334,
      1335,
      1281,
      1336,
      1337,
      1338,
      1339,
      1340,
      1341,
      1342,
      1343,
      1344,
      1345,
      1346,
      1347,
      1348,
      1349,
      1350,
      1351
    ]
  },
  {
    "name": "Asaf Cidon",
    "display_name": "Asaf Cidon",
    "affiliation": "Columbia University",
    "artifact_count": 6,
    "total_papers": 15,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 6,
      "EUROSYS": 1,
      "ATC": 1,
      "FAST": 1,
      "USENIXSEC": 1,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2021": 1,
        "2022": 2,
        "2024": 1,
        "2023": 2
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2022": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "NSDI": {
        "2019": 1,
        "2016": 1,
        "2018": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 66.7,
    "functional_rate": 83.3,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2022,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 5,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Turbo: Effective Caching in Differentially-Private Databases",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Cookie Monster: Efficient On-Device Budgeting for Differentially-Private Ad-Measurement Systems",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Privacy Budget Scheduling",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ROLLER: Fast and Efficient Tensor Compilation for Deep Learning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "XRP: In-Kernel Storage Functions with eBPF",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Managing Memory Tiers with CXL in Virtualized Environments",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dpack efficiencyoriented privacy budget scheduling",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "rubbledb cpuefficient replication with nvmeof",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "karma resource allocation for dynamic demands",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "chardonnay fast and general datacenter transactions for ondisk databases",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "hydra resilient and highly available remote memory",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "costaware robust tree ensembles for security applications",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "flashield a hybrid keyvalue cache that controls flash write amplification",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "lhd improving cache hit rate by maximizing hit density",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "cliffhanger scaling performance cliffs in web memory caches",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 106,
    "paper_ids": [
      1352,
      1353,
      1354,
      150,
      1355,
      1356
    ],
    "papers_without_artifact_ids": [
      1357,
      1358,
      1359,
      1360,
      1361,
      1362,
      1363,
      1364,
      1365
    ]
  },
  {
    "name": "Simon Peter 0001",
    "display_name": "Simon Peter",
    "affiliation": "University of Washington",
    "artifact_count": 6,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 5,
      "EUROSYS": 0,
      "ATC": 0,
      "FAST": 1,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 2
      },
      "OSDI": {
        "2021": 1,
        "2022": 1,
        "2023": 1,
        "2020": 2
      },
      "EUROSYS": {},
      "ATC": {},
      "FAST": {
        "2021": 1
      },
      "NSDI": {
        "2017": 1,
        "2022": 2
      }
    },
    "artifact_rate": 54.5,
    "repro_rate": 66.7,
    "functional_rate": 83.3,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 5,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "HeMem: Scalable Tiered Memory Management for Big Data Applications and Real NVM",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "LineFS: Efficient SmartNIC Offload of a Distributed File System with Pipeline Parallelism",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rearchitecting Linux Storage Stack for µs Latency and High Throughput",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "zIO: Accelerating IO-Intensive Applications with Transparent Zero-Copy IO",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Assise: Performance and Availability via Client-local NVM in a Distributed File System",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AGAMOTTO: How Persistent is your Persistent Memory Application?",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scaledb a scalable asynchronous inmemory database",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "flextoe flexible tcp offload with finegrained parallelism",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "rdma is turing complete we just did not know it yet",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "rethinking file mapping for persistent memory",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "evaluating the power of flexible packet processing for network resource allocation",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 154,
    "paper_ids": [
      1366,
      344,
      1367,
      1368,
      352,
      353
    ],
    "papers_without_artifact_ids": [
      1369,
      1370,
      1371,
      357,
      1372
    ]
  },
  {
    "name": "Youyou Lu",
    "display_name": "Youyou Lu",
    "affiliation": "Tsinghua University",
    "artifact_count": 6,
    "total_papers": 26,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 4,
      "ATC": 4,
      "SC": 0,
      "EUROSYS": 3,
      "FAST": 13
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1,
        "2024": 1
      },
      "OSDI": {
        "2021": 1,
        "2024": 1,
        "2023": 1,
        "2020": 1
      },
      "ATC": {
        "2022": 2,
        "2023": 2
      },
      "SC": {},
      "EUROSYS": {
        "2024": 2,
        "2022": 1
      },
      "FAST": {
        "2024": 1,
        "2021": 2,
        "2026": 4,
        "2014": 1,
        "2013": 1,
        "2023": 3,
        "2022": 1
      }
    },
    "artifact_rate": 23.1,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2022,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 6,
    "badges_reproducible": 6,
    "papers": [
      {
        "title": "Crash Consistent Non-Volatile Memory Express",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fast Core Scheduling with Userspace Process Abstraction",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AlNiCo: SmartNIC-accelerated Contention-aware Request Scheduling for Transaction Processing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pacman: An Efficient Compaction Approach for Log-Structured Key-Value Store on Persistent Memory",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Revisiting Secondary Indexing in LSM-based Storage Systems with Persistent Memory",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Nap: A Black-Box Approach to NUMA-Aware Persistent Memory Indexes",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "costefficient archive cloud storage with tape design and deployment",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "discardbased garbage collection for distributed logstructured storage systems in bytedance",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "odinann direct insert for consistently stable performance in billionscale graphbased vector search",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "gpu checkpointrestore made fast and lightweight",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "wormhole filters caching your hash on persistent memory",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "volley accelerating writeread orders in disaggregated storage",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "term extending rdmaattached memory with ssd",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "a tale of two paths toward a hybrid data plane for efficient farmemory applications",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "singularfs a billionscale distributed file system using a single metadata server",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "λio a unified io stack for computational storage",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "patronus highperformance and protective remote memory",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "citron distributed range lock management with onesided rdma",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "replicating persistent memory keyvalue stores with efficient rdma abstraction",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "fleche an efficient gpu embedding cache for personalized recommendations",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "infinifs an efficient metadata service for largescale distributed filesystems",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "concordia distributed shared memory with innetwork cache coherence",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "scalable persistent memory file system with kerneluserspace collaboration",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "write dependency disentanglement with horae",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "reconfs a reconstructable file system on flash storage",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "extending the lifetime of flashbased storage through reducing write amplification from file systems",
        "conference": "FAST",
        "year": 2013
      }
    ],
    "author_id": 42,
    "paper_ids": [
      1036,
      1373,
      1037,
      1038,
      1041,
      1042
    ],
    "papers_without_artifact_ids": [
      1048,
      1043,
      1374,
      1049,
      1375,
      1376,
      1056,
      1377,
      1057,
      1061,
      1059,
      1060,
      1066,
      1067,
      1068,
      1069,
      1070,
      1071,
      1072,
      1073
    ]
  },
  {
    "name": "Rachid Guerraoui",
    "display_name": "Rachid Guerraoui",
    "affiliation": "EPFL",
    "artifact_count": 6,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3,
      "EUROSYS": 1,
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2024": 2,
        "2020": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2011": 1
      }
    },
    "artifact_rate": 85.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2022,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 6,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "SWARM: Replicating Shared Disaggregated-Memory Data in No Time",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Diablo: A Benchmark Suite for Blockchains",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "uKharon: A Membership Service for Microsecond Applications",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Chop Chop: Byzantine Atomic Broadcast to the Network Limit",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DSig: Breaking the Barrier of Signatures in Data Centers",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Microsecond Consensus for Microsecond Applications",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "model checking a networked system without the network",
        "conference": "NSDI",
        "year": 2011
      }
    ],
    "author_id": 112,
    "paper_ids": [
      1378,
      1379,
      1380,
      1381,
      1382,
      1383
    ],
    "papers_without_artifact_ids": [
      1384
    ]
  },
  {
    "name": "Peter R. Pietzuch",
    "display_name": "Peter R. Pietzuch",
    "affiliation": "Imperial College London",
    "artifact_count": 6,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3,
      "EUROSYS": 2,
      "ATC": 2,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2022": 1,
        "2023": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2024": 1,
        "2021": 1
      },
      "ATC": {
        "2023": 2
      },
      "NSDI": {
        "2025": 1,
        "2022": 1,
        "2007": 1
      }
    },
    "artifact_rate": 54.5,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 6,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Tenplex: Dynamic Parallelism for Deep Learning using Parallelizable Tensor Collections",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "rkt-io: a direct I/O stack for shielded execution",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Translation Pass-Through for Near-Native Paging Performance in VMs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "MSRL: Distributed Reinforcement Learning with Dataflow Fragments",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ORC: Increasing Cloud Memory Density via Object Reuse with Capabilities",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "KungFu: Making Training in Distributed Machine Learning Adaptive",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "granny granular management of computeintensive applications in the cloud",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "serverless confidential containers challenges and opportunities",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "iaccf individual accountability for permissioned ledgers",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "capvms capabilitybased isolation and sharing in the cloud",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "cobra contentbased filtering and aggregation of blogs and rss feeds",
        "conference": "NSDI",
        "year": 2007
      }
    ],
    "author_id": 113,
    "paper_ids": [
      1385,
      1386,
      1387,
      1388,
      1389,
      1390
    ],
    "papers_without_artifact_ids": [
      1391,
      1392,
      1393,
      1394,
      1395
    ]
  },
  {
    "name": "Binyu Zang",
    "display_name": "Binyu Zang",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 6,
    "total_papers": 12,
    "total_papers_by_conf": {
      "OSDI": 3,
      "EUROSYS": 3,
      "ATC": 3,
      "SOSP": 1,
      "USENIXSEC": 1,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 2,
        "2023": 1
      },
      "EUROSYS": {
        "2024": 2,
        "2021": 1
      },
      "ATC": {
        "2022": 1,
        "2023": 2
      },
      "SOSP": {
        "2021": 1
      },
      "USENIXSEC": {
        "2020": 1
      },
      "NSDI": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2022,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Characterization and Reclamation of Frozen Garbage in Managed FaaS Workloads",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Zero-Change Object Transmission for Distributed Big Data Analytics",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Bridging the Gap between Relational OLTP and Graph-based OLAP",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Retrofitting High Availability Mechanism to Tame Hybrid Transaction/Analytical Processing",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Scalable Memory Protection in the PENGLAI Enclave",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Security and Performance in the Delegated User-level Virtualization",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "jade a highthroughput concurrent copying garbage collector",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "bifrost analysis and optimization of network io tax in confidential virtual machines",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "bridging the performance gap for copybased garbage collectors atop nonvolatile memory",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "unifying timestamp with transaction ordering for mvcc with decentralized scalar timestamp",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "twinvisor hardwareisolated confidential virtual machines for arm",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "mostly exitless vm protection from untrusted hypervisor through disaggregated nested virtualization",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 115,
    "paper_ids": [
      33,
      35,
      37,
      40,
      41,
      45
    ],
    "papers_without_artifact_ids": [
      55,
      61,
      70,
      71,
      73,
      74
    ]
  },
  {
    "name": "Yansong Gao 0001",
    "display_name": "Yansong Gao",
    "affiliation": "IISc Bangalore",
    "artifact_count": 6,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1,
      "ACSAC": 2,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2019": 1,
        "2023": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 85.7,
    "repro_rate": 50.0,
    "functional_rate": 33.3,
    "category": "both",
    "conferences": [
      "ACSAC",
      "ATC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2022,
      2023,
      2025
    ],
    "year_range": "2019-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 2,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "STRIP: a defence against trojan attacks on deep neural networks",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TAPAS: An Efficient Online APT Detection with Task-guided Process Provenance Graph Segmentation and Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum!",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "yes onebitflip matters universal dnn model inference depletion with runtime code fault injection",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 117,
    "paper_ids": [
      760,
      764,
      765,
      1396,
      1125,
      1397
    ],
    "papers_without_artifact_ids": [
      1398
    ]
  },
  {
    "name": "Thang Hoang",
    "display_name": "Thang Hoang",
    "affiliation": "Virginia Tech",
    "artifact_count": 6,
    "total_papers": 8,
    "total_papers_by_conf": {
      "PETS": 4,
      "USENIXSEC": 2,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 2,
        "2025": 1,
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      },
      "ACSAC": {
        "2024": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 83.3,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "Privacy-Preserving Verifiable Neural Network Inference Service",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MUSES: Efficient Multi-User Searchable Encrypted Database",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Polynomial Commitment with a One-to-Many Prover and Applications",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Client-Efficient Online-Offline Private Information Retrieval",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ezdps an efficient and zeroknowledge machine learning inference pipeline",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "maple a metadatahiding policycontrollable encrypted search platform with minimal trust",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 118,
    "paper_ids": [
      1399,
      1400,
      1401,
      1402,
      1403,
      1404
    ],
    "papers_without_artifact_ids": [
      1405,
      1406
    ]
  },
  {
    "name": "Daniel Weber 0007",
    "display_name": "Daniel Weber",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 6,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 83.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CacheWarp: Software-based Fault Injection using Selective State Reset",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Osiris: Automated Discovery of Microarchitectural Side Channels",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 119,
    "paper_ids": [
      323,
      324,
      325,
      328,
      329,
      330
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lukas Gerlach 0001",
    "display_name": "Lukas Gerlach",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 6,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 2
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 83.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CacheWarp: Software-based Fault Injection using Selective State Reset",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Confusing Value with Enumeration: Studying the Use of CVEs in Academia",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 120,
    "paper_ids": [
      323,
      324,
      272,
      108,
      328,
      330
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenke Lee",
    "display_name": "Wenke Lee",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 6,
    "total_papers": 16,
    "total_papers_by_conf": {
      "USENIXSEC": 11,
      "ACSAC": 4,
      "ATC": 0,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 4,
        "2025": 1,
        "2021": 4
      },
      "ACSAC": {
        "2018": 1,
        "2022": 2,
        "2020": 1
      },
      "ATC": {},
      "NSDI": {
        "2010": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 37.5,
    "repro_rate": 0.0,
    "functional_rate": 83.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2020,
      2022,
      2023,
      2025
    ],
    "year_range": "2018-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 5,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeView: Confining Progressive Web Applications by Debloating Web APIs",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "On the Feasibility of Automating Stock Market Manipulation",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PUMM: Preventing Use-After-Free Using Execution Unit Partitioning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VulChecker: Graph-based Vulnerability Localization in Source Code",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hybrid Language Processor Fuzzing via LLM-Based Constraint Solving",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "webrr a forensic system for replaying and investigating webbased attacks in the modern web",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "towards generic database management system fuzzing",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "trident towards detecting and mitigating webbased social engineering attacks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "µfuzz redesign of parallel fuzzing using microservice architecture",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "dragon deep reinforcement learning for autonomous grid operation and attack detection",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "abusing hidden properties to attack the nodejs ecosystem",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "deepreflect discovering malicious functionality through binary reconstruction",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "arcus symbolic root cause analysis of exploits in production systems",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "fuzzy labeled private set intersection with applications to private realtime biometric search",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "behavioral clustering of httpbased malware and signature generation using malicious network traces",
        "conference": "NSDI",
        "year": 2010
      }
    ],
    "author_id": 121,
    "paper_ids": [
      1407,
      1408,
      1409,
      1410,
      1411,
      1412
    ],
    "papers_without_artifact_ids": [
      1413,
      1414,
      1415,
      1416,
      1417,
      1418,
      1419,
      1420,
      1421,
      1422
    ]
  },
  {
    "name": "Ziming Zhao 0001",
    "display_name": "Ziming Zhao",
    "affiliation": "Northeastern University",
    "artifact_count": 6,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "NDSS": 1,
      "ACSAC": 2,
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2020": 1,
        "2023": 1,
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2018": 2
      },
      "WOOT": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2018,
      2023,
      2024,
      2025
    ],
    "year_range": "2018-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Where's the \"up\"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Unveiling IoT Security in Reality: A Firmware-Centric Journey",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "having your cake and eating it an analysis of concessionabuseasaservice",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "liveness is not enough enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "primecount novel crossworld covert channels on arm trustzone",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 122,
    "paper_ids": [
      815,
      167,
      1199,
      1423,
      1200,
      1424
    ],
    "papers_without_artifact_ids": [
      828,
      1425,
      832
    ]
  },
  {
    "name": "Thomas Eisenbarth 0001",
    "display_name": "Thomas Eisenbarth",
    "affiliation": "University of Lübeck",
    "artifact_count": 6,
    "total_papers": 12,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 1,
      "CHES": 6,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 2,
        "2023": 1,
        "2025": 2
      },
      "ACSAC": {
        "2018": 1
      },
      "CHES": {
        "2024": 3,
        "2021": 2,
        "2025": 1
      },
      "PETS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 16.7,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2020,
      2021,
      2023,
      2025
    ],
    "year_range": "2018-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MicroWalk: A Framework for Finding Side Channels in Binaries",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Side-Channel Protections for Picnic Signatures",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "teecorrelate an informationpreserving defense against performancecounter attacks on tees",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "teejam subcacheline leakages strike back",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "sevstep a singlestepping framework for amdsev",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "polynomial sharings on two secrets buy one get one free",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "a whitebox masking scheme resisting computational and algebraic attacks",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "tpmfail tpm meets timing and lattice attacks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 123,
    "paper_ids": [
      1426,
      1427,
      1428,
      1429,
      1430,
      338
    ],
    "papers_without_artifact_ids": [
      342,
      1431,
      1432,
      1433,
      1434,
      1435
    ]
  },
  {
    "name": "Andreas Peter 0001",
    "display_name": "Andreas Peter",
    "affiliation": "University of Oldenburg",
    "artifact_count": 6,
    "total_papers": 8,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 3,
      "ACSAC": 1,
      "EUROSYS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2025": 2,
        "2021": 1
      },
      "ACSAC": {
        "2017": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2017,
      2021,
      2023,
      2025
    ],
    "year_range": "2017-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Automated TTP Extraction from CTI Reports - Are We There Yet?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Efficient Ranking, Order Statistics, and Sorting under CKKS",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Private Sampling with Identifiable Cheaters",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "replicawatcher trainingless anomaly detection in containerized microservices",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "privacypreserving crowdmonitoring using bloom filters and homomorphic encryption",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 124,
    "paper_ids": [
      1436,
      1437,
      1438,
      1439,
      1440,
      1441
    ],
    "papers_without_artifact_ids": [
      1442,
      1443
    ]
  },
  {
    "name": "Jo Van Bulck",
    "display_name": "Jo Van Bulck",
    "affiliation": "KU Leuven",
    "artifact_count": 6,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "ACSAC": 2,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2025": 3
      },
      "ACSAC": {
        "2017": 1,
        "2020": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2017,
      2020,
      2024,
      2025
    ],
    "year_range": "2017-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Faulty Point Unit: ABI Poisoning Attacks on Intel SGX",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Confusing Value with Enumeration: Studying the Use of CVEs in Academia",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TLBlur: Compiler-Assisted Automated Hardening against Controlled Channels on Off-the-Shelf Intel SGX Platforms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aexnotify thwarting precise singlestepping attacks through interrupt awareness for intel sgx enclaves",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "copycat controlled instructionlevel attacks on enclaves",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 125,
    "paper_ids": [
      1444,
      1445,
      1446,
      108,
      328,
      16
    ],
    "papers_without_artifact_ids": [
      663,
      1447
    ]
  },
  {
    "name": "Brendan Saltaformaggio",
    "display_name": "Brendan Saltaformaggio",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 6,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "NDSS": 1,
      "ACSAC": 2,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 2,
        "2022": 1,
        "2021": 2
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2017": 1,
        "2020": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 6,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Feasibility of Automating Stock Market Manipulation",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PUMM: Preventing Use-After-Free Using Execution Unit Partitioning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mistrust plugins you must a largescale study of malicious plugins in wordpress marketplaces",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "arcus symbolic root cause analysis of exploits in production systems",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "forecasting malware capabilities from cyber attack memory images",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "revarm a platformagnostic arm binary rewriter for security applications",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 126,
    "paper_ids": [
      1409,
      1448,
      1449,
      1410,
      1450,
      1451
    ],
    "papers_without_artifact_ids": [
      1452,
      1420,
      1453,
      1454
    ]
  },
  {
    "name": "Long Cheng 0005",
    "display_name": "Long Cheng",
    "affiliation": "Clemson University",
    "artifact_count": 6,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1,
      "ACSAC": 2,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 2
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2017": 1,
        "2020": 1
      },
      "PETS": {}
    },
    "artifact_rate": 85.7,
    "repro_rate": 0.0,
    "functional_rate": 83.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "APPATCH: Automated Adaptive Prompting Large Language Models for Real-World Software Vulnerability Patching",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "No Way to Sign Out? Unpacking Non-Compliance with Google Play's App Account Deletion Requirements",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SKILLPoV: Towards Accessible and Effective Privacy Notice for Amazon Alexa Skills",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "orpheus enforcing cyberphysical execution semantics to defend against dataoriented attacks",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 127,
    "paper_ids": [
      1198,
      771,
      1201,
      1203,
      1455,
      1456
    ],
    "papers_without_artifact_ids": [
      1457
    ]
  },
  {
    "name": "Kun Sun 0001",
    "display_name": "Kun Sun",
    "affiliation": "George Mason University",
    "artifact_count": 6,
    "total_papers": 19,
    "total_papers_by_conf": {
      "USENIXSEC": 9,
      "NDSS": 7,
      "ACSAC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 2,
        "2022": 3,
        "2025": 2
      },
      "NDSS": {
        "2024": 5,
        "2025": 2
      },
      "ACSAC": {
        "2021": 1,
        "2018": 1,
        "2020": 1
      }
    },
    "artifact_rate": 31.6,
    "repro_rate": 50.0,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "RusTEE: Developing Memory-Safe ARM TrustZone Applications",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DISPATCH: Unraveling Security Patches from Entangled Code Changes",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TYPEPULSE: Detecting Type Confusion Bugs in Rust Programs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "offpath tcp hijacking in wifi networks a packetsize side channel attack",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "redan an empirical study on remote dos attacks against nat networks",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "eavesdropping on controller acoustic emanation for keystroke inference attack in virtual reality",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "exploiting sequence number leakage tcp hijacking in natenabled wifi networks",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "compensating removed frequency components thwarting voice spectrum reduction attacks",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "lowquality training data only a robust framework for detecting encrypted malicious network traffic",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "what if is not enough fixing null pointer dereference with contextual check",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "cross container attacks the bewildered ebpf on clouds",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "rosetta enabling robust tls encrypted traffic classification in diverse network environments with tcpaware traffic augmentation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "offpath network traffic manipulation via revitalized icmp redirect attacks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "exploring the unchartered space of container registry typosquatting",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "try before you buy privacypreserving data evaluation on cloudbased machine learning data marketplace",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "a measurement study on linux container security attacks and countermeasures",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 128,
    "paper_ids": [
      166,
      170,
      547,
      548,
      1458,
      550
    ],
    "papers_without_artifact_ids": [
      551,
      552,
      1459,
      553,
      555,
      559,
      568,
      572,
      571,
      574,
      1460,
      576,
      1461
    ]
  },
  {
    "name": "Tim Güneysu",
    "display_name": "Tim Güneysu",
    "affiliation": "Ruhr-University Bochum",
    "artifact_count": 6,
    "total_papers": 21,
    "total_papers_by_conf": {
      "CHES": 19,
      "ACSAC": 0,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 6,
        "2022": 3,
        "2021": 3,
        "2025": 6,
        "2023": 1
      },
      "ACSAC": {},
      "USENIXSEC": {
        "2023": 2
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Correction Fault Attacks on Randomized CRYSTALS-Dilithium",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Improved Circuit Synthesis with Multi-Value Bootstrapping for FHEW-like Schemes",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a new perspective on key switching for bgvlike schemes",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "hades automated hardware design exploration for cryptographic primitives",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "pracy a practical compiler for attributebased encryption in python",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "keyvisor a lightweight isa extension for protected key handles with cpuenforced usage policies",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "abe cubed advanced benchmarking extensions for abe squared",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "combined threshold implementation",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "haetae shorter latticebased fiatshamir signatures",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "risky translations securing tlbs against timing side channels",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "scarf a lowlatency block cipher for secure cacherandomization",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "clepsydracache preventing cache attacks with timebased evictions",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "verica verification of combined attacks automated formal verification of security against simultaneous information leakage and tampering",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "randomness optimization for gadget compositions in higherorder masking",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "fiver robust verification of countermeasures against fault injections",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "sidechannel analysis of the xilinx zynq ultrascale encryption engine",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "lifeline for fpga protection obfuscated cryptography for realworld security",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 7909,
    "paper_ids": [
      1462,
      1463,
      1464,
      1465,
      1466,
      1467
    ],
    "papers_without_artifact_ids": [
      1468,
      1469,
      1470,
      851,
      1471,
      1472,
      1473,
      1474,
      1475,
      1476,
      1477,
      1478,
      1479,
      1480,
      1481
    ]
  },
  {
    "name": "Shivam Bhasin",
    "display_name": "Shivam Bhasin",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 6,
    "total_papers": 15,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "WOOT": 1,
      "CHES": 12,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "WOOT": {
        "2025": 1
      },
      "CHES": {
        "2024": 1,
        "2022": 5,
        "2021": 2,
        "2025": 1,
        "2023": 3
      },
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Practical Multiple Persistent Faults Analysis",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Will You Cross the Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "KyberSlash: Exploiting secret-dependent division timings in Kyber implementations",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Reality Check on Side-Channels: Lessons learnt from breaking AES on ARM Cortex-A72 processor with Out-of-Order Execution",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "defeating lowcost countermeasures against sidechannel attacks in latticebased encryption a case study on crystalskyber",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "achilles heel in secure boot breaking rsa authentication and bitstream recovery from zynq7000 soc",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "pushing the limits of generic sidechannel attacks on lwebased kems parallel pc oracle attacks on kyber kem and beyond",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "fiddling the twiddle constants fault injection analysis of the number theoretic transform",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "peek into the blackbox interpretable neural network using sat equations in sidechannel analysis",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "a finergrain analysis of the leakage non resilience of ocb",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "sipfa statistical ineffective persistent faults analysis on feistel ciphers",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "attacking and defending masked polynomial comparison for latticebased cryptography",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "dapa differential analysis aided power attack on non linear feedback shift registers",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 130,
    "paper_ids": [
      1482,
      1483,
      1484,
      581,
      1485,
      1486
    ],
    "papers_without_artifact_ids": [
      1487,
      1488,
      1489,
      1490,
      1491,
      1492,
      1493,
      1494,
      1495
    ]
  },
  {
    "name": "Marcel Busch",
    "display_name": "Marcel Busch",
    "affiliation": "",
    "artifact_count": 6,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "WOOT": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2020": 1,
        "2025": 2
      },
      "WOOT": {
        "2024": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 85.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 6,
    "badges_reproducible": 6,
    "papers": [
      {
        "title": "Exploiting Android's Hardened Memory Allocator",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "EL3XIR: Fuzzing COTS Secure Monitors",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Spill the TeA: An Empirical Study of Trusted Application Rollback Prevention on Android Smartphones",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GlobalConfusion: TrustZone Trusted Application 0-Days by Design",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hercules Droidot and the murder on the JNI Express",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NASS: Fuzzing All Native Android System Services with Interface Awareness and Coverage",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unearthing the trustedcore a critical review on huaweis trusted execution environment",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 131,
    "paper_ids": [
      5,
      6,
      7,
      8,
      14,
      15
    ],
    "papers_without_artifact_ids": [
      1496
    ]
  },
  {
    "name": "Daniel Genkin",
    "display_name": "Daniel Genkin",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 6,
    "total_papers": 14,
    "total_papers_by_conf": {
      "USENIXSEC": 13,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2020": 1,
        "2023": 4,
        "2022": 1,
        "2025": 2,
        "2021": 1
      },
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BunnyHop: Exploiting the Instruction Prefetcher",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Impostor Among US(B): Off-Path Injection Attacks on USB Communications",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FLOP: Breaking the Apple M3 CPU via False Load Output Predictions",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "evictspectime exploiting outoforder execution to improve cachetiming attacks",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "pixel thief exploiting svg filter leakage in firefox and chrome",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "go go gadget hammer flipping nested pointers for arbitrary data leakage",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "checking passwords on leaky computers a side channel analysis of chromes password leak detect protocol",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "hot pixels frequency power and temperature attacks on gpus and arm socs",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "lend me your ear passive remote physical side channels on pcs",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "primeprobe 1 javascript 0 overcoming browserbased sidechannel defenses",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "light commands laserbased audio injection attacks on voicecontrollable systems",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 132,
    "paper_ids": [
      1497,
      1498,
      1499,
      1500,
      1501,
      1502
    ],
    "papers_without_artifact_ids": [
      1503,
      1504,
      1505,
      1506,
      1507,
      1508,
      1509,
      1510
    ]
  },
  {
    "name": "Andreas Kogler",
    "display_name": "Andreas Kogler",
    "affiliation": "",
    "artifact_count": 6,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2022": 4
      },
      "NDSS": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 6,
    "badges_reproducible": 6,
    "papers": [
      {
        "title": "CacheWarp: Software-based Fault Injection using Selective State Reset",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Side-Channel Attacks on Optane Persistent Memory",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Half-Double: Hammering From the Next Row Over",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "powerrelated sidechannel attacks using the android sensor framework",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "a systematic evaluation of novel and existing cache side channels",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "idleleak exploiting idle state side effects for information leakage",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "æpic leak architecturally leaking uninitialized data from the microarchitecture",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 133,
    "paper_ids": [
      324,
      336,
      272,
      337,
      326,
      327
    ],
    "papers_without_artifact_ids": [
      277,
      341,
      343,
      333
    ]
  },
  {
    "name": "Saba Eskandarian",
    "display_name": "Saba Eskandarian",
    "affiliation": "University of North Carolina",
    "artifact_count": 6,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1,
      "PETS": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2020": 1,
        "2025": 1,
        "2024": 2,
        "2021": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 16.7,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Silent Splitter: Privacy for Payment Splitting via New Protocols for Distributed Point Functions",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CheckOut: User-Controlled Anonymization for Customer Loyalty Programs",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Anonymous Complaint Aggregation for Secure Messaging",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fast Privacy-Preserving Punch Cards",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Onion Franking: Abuse Reports for Mix-Based Private Messaging",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "express lowering the cost of metadatahiding communication with cryptographic privacy",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "privacypreserving payment splitting",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 134,
    "paper_ids": [
      1511,
      1512,
      1513,
      1514,
      1515,
      1516
    ],
    "papers_without_artifact_ids": [
      1021,
      1517
    ]
  },
  {
    "name": "Marius Muench",
    "display_name": "Marius Muench",
    "affiliation": "University of Birmingham",
    "artifact_count": 6,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "WOOT": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 2,
        "2025": 1
      },
      "WOOT": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 83.3,
    "functional_rate": 83.3,
    "category": "security",
    "conferences": [
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 5,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "SIMurai: Slicing Through the Complexity of SIM Card Security Research",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Forming Faster Firmware Fuzzers",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Security through Transparency: Tales from the RP2350 Hacking Challenge",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 135,
    "paper_ids": [
      1518,
      1519,
      87,
      106,
      109,
      1520
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuval Yarom",
    "display_name": "Yuval Yarom",
    "affiliation": "Ruhr-University Bochum",
    "artifact_count": 6,
    "total_papers": 16,
    "total_papers_by_conf": {
      "USENIXSEC": 12,
      "EUROSYS": 0,
      "ACSAC": 0,
      "CHES": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 6,
        "2025": 3,
        "2021": 1
      },
      "EUROSYS": {},
      "ACSAC": {},
      "CHES": {
        "2024": 2,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 37.5,
    "repro_rate": 16.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 4,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BunnyHop: Exploiting the Instruction Prefetcher",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Gates of Time: Improving Cache Attacks with Transient Execution",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Impostor Among US(B): Off-Path Injection Attacks on USB Communications",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FLOP: Breaking the Apple M3 CPU via False Load Output Predictions",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "leaky mceliece secret key recovery from highly erroneous sidechannel information",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "on borrowed time preventing static sidechannel analysis",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "barracuda edge gpus do leak dnn weights",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "teejam subcacheline leakages strike back",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "evictspectime exploiting outoforder execution to improve cachetiming attacks",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "pixel thief exploiting svg filter leakage in firefox and chrome",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "hot pixels frequency power and temperature attacks on gpus and arm socs",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "checking passwords on leaky computers a side channel analysis of chromes password leak detect protocol",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "ultimate slh taking speculative load hardening to the next level",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "primeprobe 1 javascript 0 overcoming browserbased sidechannel defenses",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 136,
    "paper_ids": [
      1498,
      1499,
      1521,
      1500,
      1501,
      1502
    ],
    "papers_without_artifact_ids": [
      1522,
      1523,
      1524,
      1431,
      1503,
      1504,
      1507,
      1506,
      1525,
      1509
    ]
  },
  {
    "name": "Robert Merget",
    "display_name": "Robert Merget",
    "affiliation": "Ruhr University Bochum",
    "artifact_count": 6,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 8,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 2,
        "2022": 1,
        "2025": 1,
        "2021": 2
      },
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 83.3,
    "functional_rate": 83.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Analysis of DTLS Implementations Using Protocol State Fuzzing",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Internet-Based State Learning of TLS State Machines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "raccoon attack finding and exploiting mostsignificantbitoracles in tlsdhe",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "alpaca application layer protocol confusion analyzing and mitigating cracks in tls authentication",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "t0rtt noninteractive immediate forwardsecret singlepass circuit construction",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 137,
    "paper_ids": [
      583,
      956,
      584,
      586,
      588,
      590
    ],
    "papers_without_artifact_ids": [
      591,
      592,
      593
    ]
  },
  {
    "name": "Gang Wang 0011",
    "display_name": "Gang Wang",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 6,
    "total_papers": 14,
    "total_papers_by_conf": {
      "USENIXSEC": 13,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2020": 1,
        "2023": 2,
        "2022": 1,
        "2025": 2,
        "2021": 4
      },
      "PETS": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 42.9,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2022,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "How does Endpoint Detection use the MITRE ATT&CK Framework?",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CADE: Detecting and Explaining Concept Drift Samples for Security Applications",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok towards effective automated vulnerability repair",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "true attacks attack attempts or benign triggers an empirical measurement of network alerts in a security operations center",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "it doesnt look like anything to me using diffusion model to subvert visual phishing detectors",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "senrev measurement of personal information disclosure in online health communities",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "how to cover up anomalous accesses to electronic health records",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "airs explanation for deep reinforcement learning based security applications",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "assessing browserlevel defense against idnbased phishing",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "doublecross attacks subverting active learning systems",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 138,
    "paper_ids": [
      1526,
      1527,
      1528,
      903,
      936,
      1529
    ],
    "papers_without_artifact_ids": [
      1530,
      1531,
      1137,
      1532,
      1533,
      941,
      1534,
      1535
    ]
  },
  {
    "name": "Tiffany Bao",
    "display_name": "Tiffany Bao",
    "affiliation": "Arizona State University",
    "artifact_count": 6,
    "total_papers": 11,
    "total_papers_by_conf": {
      "USENIXSEC": 10,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2020": 1,
        "2023": 1,
        "2022": 3,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 54.5,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 6,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scammagnifier piercing the veil of fraudulent shopping website campaigns",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "take a step further understanding page spray in linux kernel exploitation",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "tygr type inference on stripped binaries using graph neural networks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "having your cake and eating it an analysis of concessionabuseasaservice",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "exploiting uses of uninitialized stack variables in linux kernels to leak kernel pointers",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 139,
    "paper_ids": [
      818,
      819,
      1536,
      820,
      821,
      822
    ],
    "papers_without_artifact_ids": [
      823,
      826,
      825,
      828,
      829
    ]
  },
  {
    "name": "Tobias Scharnowski",
    "display_name": "Tobias Scharnowski",
    "affiliation": "Ruhr University Bochum",
    "artifact_count": 6,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 3,
        "2022": 1,
        "2025": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 85.7,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Instructions Unclear: Undefined Behaviour in Cellular Network Specifications",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aidfuzzer adaptive interruptdriven firmware fuzzing via runtime state recognition",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 140,
    "paper_ids": [
      9,
      1537,
      101,
      104,
      106,
      109
    ],
    "papers_without_artifact_ids": [
      113
    ]
  },
  {
    "name": "Moritz Schloegel",
    "display_name": "Moritz Schloegel",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 6,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 8,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 3,
        "2022": 2,
        "2025": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Instructions Unclear: Undefined Behaviour in Cellular Network Specifications",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Loki: Hardening Code Obfuscation Against Automated Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Confusing Value with Enumeration: Studying the Use of CVEs in Academia",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "atropos effective fuzzing of web applications for serverside vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a binarylevel thread sanitizer or why sanitizing on the binary level is hard",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 141,
    "paper_ids": [
      1537,
      101,
      104,
      105,
      106,
      108
    ],
    "papers_without_artifact_ids": [
      114,
      115
    ]
  },
  {
    "name": "Shouling Ji",
    "display_name": "Shouling Ji",
    "affiliation": "Zhejiang University",
    "artifact_count": 6,
    "total_papers": 28,
    "total_papers_by_conf": {
      "USENIXSEC": 24,
      "NDSS": 4,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 6,
        "2020": 3,
        "2023": 5,
        "2022": 3,
        "2025": 4,
        "2021": 3
      },
      "NDSS": {
        "2024": 3,
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 21.4,
    "repro_rate": 0.0,
    "functional_rate": 16.7,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Security Risks of AutoML",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Watch the Watchers! On the Security Risks of Robustness-Enhancing Diffusion Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Pretender: Universal Active Defense against Diffusion Finetuning Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PRSA: Prompt Stealing Attacks against Real-World Prompt Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "clibe detecting dynamic backdoors in transformerbased nlp models",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "improving the robustness of transformerbased large language models with dynamic attention",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "mock optimizing kernel fuzzing mutation with contextaware dependency",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "on the difficulty of defending contrastive learning against backdoor attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "improving indirectcall analysis in llvm with type and dataflow coanalysis",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "detecting kernel memory bugs through inconsistent memory management intention inferences",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "critical code guided directed greybox fuzzing for commits",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a wolf in sheeps clothing practical blackbox adversarial attacks for evading learningbased windows malware detection in the wild",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "exploring chatgpts capabilities on vulnerability management",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "miner a hybrid datadriven approach for rest api fuzzing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "detecting union type confusion in component object model",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "on the security risks of knowledge graph reasoning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "freeeagle detecting complex neural trojans in datafree cases",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "uvscan detecting thirdparty component usage violations in iot firmware",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "label inference attacks against vertical federated learning",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "seeing is living rethinking the security of facial liveness verification in the deepfake era",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "unifuzz a holistic and pragmatic metricsdriven platform for evaluating fuzzers",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "graph backdoor",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "mpinspector a systematic and automatic approach for evaluating the security of iot messaging protocols",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "textshield robust text classification based on multimodal embedding and neural machine translation",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "interpretable deep learning under fire",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "justinians gaavernor robust distributed learning with gradient aggregation agent",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 142,
    "paper_ids": [
      773,
      1538,
      1539,
      1540,
      1541,
      1542
    ],
    "papers_without_artifact_ids": [
      1543,
      1544,
      1545,
      1546,
      1547,
      1548,
      1549,
      1550,
      1551,
      1552,
      1553,
      785,
      1554,
      1555,
      1556,
      1557,
      1558,
      1559,
      1560,
      262,
      792,
      263
    ]
  },
  {
    "name": "Lei Zhang 0096",
    "display_name": "Lei Zhang",
    "affiliation": "Fudan University",
    "artifact_count": 6,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 6
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 16.7,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply Chains",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "misdirection of trust demystifying the abuse of dedicated url shortening service",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "identity confusion in webviewbased mobile appinapp ecosystems",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 143,
    "paper_ids": [
      232,
      235,
      236,
      238,
      239,
      240
    ],
    "papers_without_artifact_ids": [
      243,
      254
    ]
  },
  {
    "name": "Xingliang Yuan",
    "display_name": "Xingliang Yuan",
    "affiliation": "University of Melbourne",
    "artifact_count": 6,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 4
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 50.0,
    "functional_rate": 83.3,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 5,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "V-ORAM: A Versatile and Adaptive ORAM Framework with Service Transformation for Dynamic Workloads",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "siguard guarding secure inference with post data privacy",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "oblivgnn oblivious inference on transductive and inductive graph neural network",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 144,
    "paper_ids": [
      1561,
      1562,
      1396,
      1563,
      1564,
      1565
    ],
    "papers_without_artifact_ids": [
      1566,
      1567
    ]
  },
  {
    "name": "Minhui Xue 0001",
    "display_name": "Minhui Xue",
    "affiliation": "Adelaide University",
    "artifact_count": 6,
    "total_papers": 18,
    "total_papers_by_conf": {
      "USENIXSEC": 9,
      "NDSS": 8,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2020": 1,
        "2023": 1,
        "2025": 3
      },
      "NDSS": {
        "2024": 3,
        "2025": 5
      },
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 83.3,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 6,
    "badges_functional": 5,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cross-Modal Prompt Inversion: Unifying Threats to Text and Image Generative AI Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum!",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the philosophers stone trojaning plugins of large language models",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "reinforcement unlearning",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "provably unlearnable data examples",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "a duty to forget a right to be assured exposing vulnerabilities in machine unlearning services",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "shapfuzz efficient fuzzing via shapleyguided byte selection",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "dppromise differentially private diffusion probabilistic models for image synthesis",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "yes onebitflip matters universal dnn model inference depletion with runtime code fault injection",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "being transparent is merely the beginning enforcing purpose limitation with polynomial approximation",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "dnngp diagnosing and mitigating models faults using latent concepts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "detecting union type confusion in component object model",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "the audio auditor userlevel membership inference in internet of things voice services",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "ios your os everybodys os vetting and analyzing network services of ios applications",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 145,
    "paper_ids": [
      1568,
      1569,
      1570,
      1565,
      1397,
      1571
    ],
    "papers_without_artifact_ids": [
      1572,
      1573,
      1574,
      1575,
      1576,
      1577,
      1398,
      1578,
      1579,
      1553,
      1580,
      1581
    ]
  },
  {
    "name": "Joseph Tassarotti",
    "display_name": "Joseph Tassarotti",
    "affiliation": "New York University",
    "artifact_count": 5,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 4,
      "OSDI": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2,
        "2021": 1,
        "2024": 1
      },
      "OSDI": {
        "2021": 1,
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 71.4,
    "repro_rate": 80.0,
    "functional_rate": 80.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2022,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Grove: a Separation-Logic Library for Verifying Distributed Systems",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rabia: Simplifying State-Machine Replication Through Randomization",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "GoJournal: a verified, concurrent, crash-safe journaling system",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Verifying the DaisyNFS concurrent and crash-safe file system with sequential reasoning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "verifying vmvcc a highperformance transaction library using multiversion concurrency control",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "the k2 architecture for trustworthy hardware security modules",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 146,
    "paper_ids": [
      979,
      1582,
      981,
      983,
      984
    ],
    "papers_without_artifact_ids": [
      986,
      987
    ]
  },
  {
    "name": "Changwoo Min",
    "display_name": "Changwoo Min",
    "affiliation": "Igalia, Remote, Korea, South ? Republic of Korea",
    "artifact_count": 5,
    "total_papers": 14,
    "total_papers_by_conf": {
      "SOSP": 4,
      "OSDI": 3,
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 4,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 3
      },
      "OSDI": {
        "2022": 2,
        "2020": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {},
      "FAST": {
        "2024": 1,
        "2012": 1,
        "2023": 2
      },
      "USENIXSEC": {
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 35.7,
    "repro_rate": 20.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2022,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MEMTIS: Efficient Memory Tiering with Dynamic Page Classification and Page Size Determination",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Witcher: Systematic Crash Consistency Testing for Non-Volatile Memory Key-Value Stores",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PACTree: A High Performance Persistent Range Index Using PAC Guidelines",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ODINFS: Scaling PM Performance with Opportunistic Delegation",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CrossFS: A Cross-layered Direct-Access File System",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "omnicache collaborative caching for nearstorage accelerators",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "tenet memory safe and fault tolerant persistent transactional memory",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "cjfs concurrent journaling for better scalability",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "fireworks a fast efficient and safe serverless framework using vmlevel postjit snapshot",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "durinn adversarial memory and thread interleaving for detecting durable linearizability bugs",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "tightly seal your sensitive pointers with pactight",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "birds of a feather flock together scaling rdma rpcs with flock",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "exprace exploiting kernel races through raising interrupts",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "sfs random write considered harmful in solid state drives",
        "conference": "FAST",
        "year": 2012
      }
    ],
    "author_id": 99,
    "paper_ids": [
      1583,
      1584,
      524,
      529,
      1585
    ],
    "papers_without_artifact_ids": [
      1586,
      532,
      1587,
      1588,
      1589,
      1590,
      533,
      1591,
      1592
    ]
  },
  {
    "name": "George Candea",
    "display_name": "George Candea",
    "affiliation": "EPFL",
    "artifact_count": 5,
    "total_papers": 9,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 3,
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2024": 2,
        "2020": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {},
      "NSDI": {
        "2019": 1,
        "2022": 2
      }
    },
    "artifact_rate": 55.6,
    "repro_rate": 80.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Achieving Microsecond-Scale Tail Latency Efficiently with Approximate Optimal Scheduling",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Practical Verification of System-Software Components Written in Standard C",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Transparent Multicore Scaling of Single-Threaded Network Functions",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Performance Interfaces for Hardware Accelerators",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "A Simpler and Faster NIC Driver Model for Network Functions",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automatically reasoning about how systems code uses the cpu cache",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "automated verification of network function binaries",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "performance interfaces for network functions",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "performance contracts for software network functions",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 147,
    "paper_ids": [
      1593,
      646,
      526,
      1594,
      1595
    ],
    "papers_without_artifact_ids": [
      1596,
      1597,
      1598,
      1599
    ]
  },
  {
    "name": "Yongwei Wu 0001",
    "display_name": "Yongwei Wu",
    "affiliation": "Tsinghua University",
    "artifact_count": 5,
    "total_papers": 8,
    "total_papers_by_conf": {
      "SOSP": 4,
      "ATC": 1,
      "SC": 0,
      "EUROSYS": 1,
      "FAST": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2,
        "2021": 2
      },
      "ATC": {
        "2023": 1
      },
      "SC": {},
      "EUROSYS": {
        "2023": 1
      },
      "FAST": {
        "2021": 1,
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 62.5,
    "repro_rate": 40.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Falcon: Fast OLTP Engine for Persistent Cache and Non-Volatile Memory",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Partial Failure Resilient Memory Management System for (CXL-based) Distributed Shared Memory",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Random Walks on Huge Graphs at Cache Efficiency",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Geometric Partitioning: Explore the Boundary of Optimal Erasure Code Repair",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Explore Data Placement Algorithm for Balanced Recovery Load Distribution",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mooncake trading more storage for less computation a kvcachecentric architecture for serving llm chatbot",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "tea a generalpurpose temporal graph random walk engine",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "roart rangequery optimized persistent art",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 101,
    "paper_ids": [
      636,
      637,
      638,
      288,
      642
    ],
    "papers_without_artifact_ids": [
      1600,
      644,
      645
    ]
  },
  {
    "name": "Cheng Li 0001",
    "display_name": "Cheng Li",
    "affiliation": "USTC",
    "artifact_count": 5,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 3,
      "EUROSYS": 4,
      "SC": 1,
      "ATC": 0,
      "FAST": 2,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2,
        "2021": 1
      },
      "EUROSYS": {
        "2023": 2,
        "2024": 1,
        "2021": 1
      },
      "SC": {
        "2021": 1
      },
      "ATC": {},
      "FAST": {
        "2021": 1,
        "2023": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 45.5,
    "repro_rate": 80.0,
    "functional_rate": 80.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SC",
      "SOSP"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "gSampler: General and Efficient GPU-based Graph Sampling for Graph Learning",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SPFresh: Incremental In-Place Update for Billion-Scale Vector Search",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Gradient Compression Supercharged High-Performance Data Parallel DNN Training",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Lunule: an agile and judicious metadata load balancer for CephFS",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Achieving low tail-latency and high scalability for serializable transactions in edge computing",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "noctua towards automated and practical finegrained consistency analysis",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "nnscaler constraintguided parallelization plan generation for deep learning training",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "frozenhot cache rethinking cache management for modern hardware",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "cfs scaling metadata service for distributed file system via pruned scope of critical sections",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "revitalizing the forgotten onchip dma to expedite data movement in nvmbased storage systems",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "spandb a fast costeffective lsmtree based kv store on hybrid storage",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 148,
    "paper_ids": [
      1601,
      145,
      1602,
      1603,
      1604
    ],
    "papers_without_artifact_ids": [
      643,
      158,
      1026,
      1605,
      1606,
      1607
    ]
  },
  {
    "name": "Pengfei Zuo",
    "display_name": "Pengfei Zuo",
    "affiliation": "Huawei Cloud, Shenzhen, China",
    "artifact_count": 5,
    "total_papers": 9,
    "total_papers_by_conf": {
      "SOSP": 3,
      "OSDI": 1,
      "ATC": 2,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 2
      },
      "OSDI": {
        "2023": 1
      },
      "ATC": {
        "2022": 1,
        "2024": 1
      },
      "FAST": {
        "2023": 2,
        "2022": 1
      }
    },
    "artifact_rate": 55.6,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 5,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "Ditto: An Elastic and Adaptive Memory-Disaggregated Caching System",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CHIME: A Cache-Efficient and High-Performance Hybrid Index on Disaggregated Memory",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Aceso: Achieving Efficient Fault Tolerance in Memory-Disaggregated Key-Value Stores",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "uKharon: A Membership Service for Microsecond Applications",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SMART: A High-Performance Adaptive Radix Tree for Disaggregated Memory",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "costefficient large language model serving for multiturn conversations with cachedattention",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "fusee a fully memorydisaggregated keyvalue store",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "rolex a scalable rdmaoriented learned keyvalue store for disaggregated memory systems",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "ford fast onesided rdmabased distributed transactions for disaggregated persistent memory",
        "conference": "FAST",
        "year": 2022
      }
    ],
    "author_id": 149,
    "paper_ids": [
      1608,
      1609,
      1610,
      1380,
      1611
    ],
    "papers_without_artifact_ids": [
      1612,
      1613,
      1614,
      1615
    ]
  },
  {
    "name": "Zhihao Jia",
    "display_name": "Zhihao Jia",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 5,
    "total_papers": 8,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 4,
      "SC": 0,
      "ATC": 0,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2021": 2,
        "2022": 1,
        "2023": 1
      },
      "SC": {},
      "ATC": {},
      "NSDI": {
        "2024": 1,
        "2023": 2
      }
    },
    "artifact_rate": 62.5,
    "repro_rate": 80.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Sia: Heterogeneity-aware, goodput-optimized ML-cluster scheduling",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PET: Optimizing Tensor Programs with Partially Equivalent Transformations and Automated Corrections",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Unity: Accelerating DNN Training Through Joint Optimization of Algebraic Transformations and Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "EINNET: Optimizing Tensor Programs with Derivation-Based Transformations",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "parcae proactive liveputoptimized dnn training on preemptible instances",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "bamboo making preemptible instances resilient for affordable training of large dnns",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "topoopt cooptimizing network topology and parallelization strategy for distributed training jobs",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 103,
    "paper_ids": [
      1319,
      1616,
      1617,
      1618,
      1619
    ],
    "papers_without_artifact_ids": [
      1620,
      1621,
      1622
    ]
  },
  {
    "name": "Baris Kasikci",
    "display_name": "Baris Kasikci",
    "affiliation": "University of Washington",
    "artifact_count": 5,
    "total_papers": 9,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3,
      "USENIXSEC": 1,
      "ATC": 1,
      "EUROSYS": 1,
      "FAST": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2021": 1,
        "2022": 1,
        "2020": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "FAST": {
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 55.6,
    "repro_rate": 20.0,
    "functional_rate": 60.0,
    "category": "both",
    "conferences": [
      "ATC",
      "OSDI",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2022,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Sift: Using Refinement-guided Automation to Verify Complex Distributed Systems",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DOLMA: Securing Speculation with the Principle of Transient Non-Observability",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DMon: Efficient Detection and Correction of Data Locality Problems Using Selective Profiling",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AGAMOTTO: How Persistent is your Persistent Memory Application?",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gadgetmeter quantitatively and accurately gauging the exploitability of speculative gadgets",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "aptget profileguided",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "debugging the omnitable way",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "rethinking file mapping for persistent memory",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 104,
    "paper_ids": [
      1623,
      1624,
      1625,
      1626,
      353
    ],
    "papers_without_artifact_ids": [
      1627,
      1628,
      1629,
      357
    ]
  },
  {
    "name": "Zhenhua Han",
    "display_name": "Zhenhua Han",
    "affiliation": "Microsoft Research, Shanghai, China",
    "artifact_count": 5,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 4,
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2024": 1,
        "2023": 1,
        "2020": 2
      },
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 71.4,
    "repro_rate": 80.0,
    "functional_rate": 80.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2022,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "PIT: Optimization of Dynamic Sparse Deep Learning Models via Permutation Invariant Transformation",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PilotFish: Harvesting Free Cycles of Cloud Gaming with Deep Learning Training",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Parrot: Efficient Serving of LLM-based Applications with Semantic Variable",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Optimizing Dynamic Neural Networks with Brainstorm",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Retiarii: A Deep Learning Exploratory-Training Framework",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "silod a codesign of caching and scheduling for deep learning clusters",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "hived sharing a gpu cluster for deep learning with guarantees",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 150,
    "paper_ids": [
      146,
      149,
      152,
      155,
      157
    ],
    "papers_without_artifact_ids": [
      160,
      163
    ]
  },
  {
    "name": "Ding Yuan 0004",
    "display_name": "Ding Yuan",
    "affiliation": "University of Toronto",
    "artifact_count": 5,
    "total_papers": 8,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 4,
      "EUROSYS": 1,
      "ATC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2021": 1,
        "2022": 1,
        "2024": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2022": 1
      }
    },
    "artifact_rate": 62.5,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "Understanding and Detecting Software Upgrade Failures in Distributed Systems",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "M3: end-to-end memory management in elastic system software stacks",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Investigating Managed Language Runtime Performance: Why JavaScript and Python are 8x and 29x slower than C++, yet Java and Go can be Faster?",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CLP: Efficient and Scalable Search on Compressed Text Logs",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Relational Debugging - Pinpointing Root Causes of Performance Problems",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "μslope high compression and fast search on semistructured logs",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "ctfs replacing file indexing with hardware memory translation through contiguous file allocation for persistent memory",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "hubble performance debugging with inproduction justintime method tracing on android",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 107,
    "paper_ids": [
      1630,
      1631,
      1632,
      1633,
      623
    ],
    "papers_without_artifact_ids": [
      1634,
      1635,
      1636
    ]
  },
  {
    "name": "Aishwarya Ganesan",
    "display_name": "Aishwarya Ganesan",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 5,
    "total_papers": 9,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 2,
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 4
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1,
        "2024": 1
      },
      "OSDI": {
        "2022": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {},
      "FAST": {
        "2024": 1,
        "2020": 1,
        "2017": 1,
        "2018": 1
      }
    },
    "artifact_rate": 55.6,
    "repro_rate": 80.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2022,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Exploiting Nil-Externality for Fast Replicated Storage",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "LazyLog: A New Shared Log Abstraction for Low-Latency Applications",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SplitFT: Fault Tolerance for Disaggregated Datacenters via Remote Memory Logging",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Automatic Reliability Testing For Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "From WiscKey to Bourbon: A Learned Index for Log-Structured Merge Trees",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ionia highperformance replication for modern diskbased kv stores",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "strong and efficient consistency with consistencyaware durability",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "protocolaware recovery for consensusbased storage",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "redundancy does not imply fault tolerance analysis of distributed storage reactions to single errors and corruptions",
        "conference": "FAST",
        "year": 2017
      }
    ],
    "author_id": 108,
    "paper_ids": [
      1637,
      1638,
      1639,
      621,
      1640
    ],
    "papers_without_artifact_ids": [
      1641,
      1642,
      1643,
      1644
    ]
  },
  {
    "name": "Ramnatthan Alagappan",
    "display_name": "Ramnatthan Alagappan",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 5,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 2,
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 6
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1,
        "2024": 1
      },
      "OSDI": {
        "2022": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {},
      "FAST": {
        "2024": 1,
        "2021": 1,
        "2020": 1,
        "2017": 2,
        "2018": 1
      }
    },
    "artifact_rate": 45.5,
    "repro_rate": 80.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2022,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Exploiting Nil-Externality for Fast Replicated Storage",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "LazyLog: A New Shared Log Abstraction for Low-Latency Applications",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SplitFT: Fault Tolerance for Disaggregated Datacenters via Remote Memory Logging",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Automatic Reliability Testing For Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "From WiscKey to Bourbon: A Learned Index for Log-Structured Merge Trees",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ionia highperformance replication for modern diskbased kv stores",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "the storage hierarchy is not a hierarchy optimizing caching on modern storage devices with orthus",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "strong and efficient consistency with consistencyaware durability",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "protocolaware recovery for consensusbased storage",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "redundancy does not imply fault tolerance analysis of distributed storage reactions to single errors and corruptions",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "application crash consistency and performance with ccfs",
        "conference": "FAST",
        "year": 2017
      }
    ],
    "author_id": 109,
    "paper_ids": [
      1637,
      1638,
      1639,
      621,
      1640
    ],
    "papers_without_artifact_ids": [
      1641,
      1645,
      1642,
      1643,
      1644,
      1646
    ]
  },
  {
    "name": "Marco Canini",
    "display_name": "Marco Canini",
    "affiliation": "KAUST",
    "artifact_count": 5,
    "total_papers": 15,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "EUROSYS": 5,
      "ATC": 1,
      "NSDI": 7
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2023": 3,
        "2021": 1,
        "2022": 1
      },
      "ATC": {
        "2023": 1
      },
      "NSDI": {
        "2021": 1,
        "2017": 1,
        "2012": 1,
        "2016": 1,
        "2022": 2,
        "2015": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 20.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LineFS: Efficient SmartNIC Offload of a Distributed File System with Pipeline Parallelism",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "REFL: Resource-Efficient Federated Learning",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "With Great Freedom Comes Great Opportunity: Rethinking Resource Allocation for Serverless Functions",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SAGE: Software-based Attestation for GPU Execution",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Assise: Performance and Availability via Client-local NVM in a Distributed File System",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a first look at the impact of distillation hyperparameters in federated knowledge distillation",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "empirical analysis of federated learning in heterogeneous environments",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "rdma is turing complete we just did not know it yet",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "unlocking the power of inline floatingpoint operations on programmable switches",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "towards mitigating device heterogeneity in federated learning via adaptive model quantization",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "scaling distributed machine learning with innetwork aggregation",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "correct by construction networks using stepwise refinement",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "an industrialscale software defined internet exchange point",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "c3 cutting tail latency in cloud data stores via adaptive replica selection",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "a nice way to test openflow applications",
        "conference": "NSDI",
        "year": 2012
      }
    ],
    "author_id": 156,
    "paper_ids": [
      344,
      1647,
      1648,
      754,
      352
    ],
    "papers_without_artifact_ids": [
      1649,
      1650,
      1371,
      1651,
      1652,
      1653,
      1654,
      1655,
      1656,
      1657
    ]
  },
  {
    "name": "Heming Cui",
    "display_name": "Heming Cui",
    "affiliation": "University of Hong Kong",
    "artifact_count": 5,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ACSAC": 2,
      "ATC": 1,
      "FAST": 1,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "ACSAC": {
        "2019": 1,
        "2017": 1
      },
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2026": 1
      },
      "NSDI": {
        "2018": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 71.4,
    "repro_rate": 60.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "ATC",
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2017,
      2019,
      2021,
      2022
    ],
    "year_range": "2017-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 5,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Achieving low tail-latency and high scalability for serializable transactions in edge computing",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SOTER: Guarding Black-box Inference for General Neural Networks at the Edge",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dmtree towards efficient tree indexing on disaggregated memory via computeside collaborative design",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "plover fast multicore scalable virtual machine faulttolerance",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 158,
    "paper_ids": [
      1658,
      1604,
      770,
      1659,
      1660
    ],
    "papers_without_artifact_ids": [
      1661,
      1662
    ]
  },
  {
    "name": "Ana Klimovic",
    "display_name": "Ana Klimovic",
    "affiliation": "ETH Zurich",
    "artifact_count": 5,
    "total_papers": 10,
    "total_papers_by_conf": {
      "SOSP": 3,
      "EUROSYS": 5,
      "ATC": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2,
        "2024": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2023": 1,
        "2024": 3
      },
      "ATC": {
        "2022": 1,
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "Dirigent: Lightweight Serverless Orchestration",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DeltaZip: Efficient Serving of Multiple Full-Model-Tuned LLMs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Orion: Interference-aware, Fine-grained GPU Sharing for ML Applications",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Cachew: Machine Learning Input Data Processing as a Service",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pecan: Cost-Efficient ML Data Preprocessing with Automatic Transformation Ordering and Hybrid Placement",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ml training with cloud gpu shortages is crossregion the answer",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "serverless risc more",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "towards a platform and benchmark suite for model training on dynamic datasets",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "understanding the neglected cost of serverless cluster management",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "enabling invitro serverless systems research",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 159,
    "paper_ids": [
      1663,
      1664,
      1665,
      1666,
      1667
    ],
    "papers_without_artifact_ids": [
      1668,
      1669,
      1670,
      1671,
      1672
    ]
  },
  {
    "name": "Yufei Ding 0001",
    "display_name": "Yufei Ding",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 5,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SC": 2,
      "OSDI": 2,
      "ATC": 3,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      },
      "OSDI": {
        "2021": 1,
        "2023": 1
      },
      "ATC": {
        "2022": 1,
        "2024": 1,
        "2023": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 71.4,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SC"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "Efficient tensor core-based GPU kernels for structured sparsity under reduced precision",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "APNN-TC: accelerating arbitrary precision neural networks on ampere GPU tensor cores",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Faith: An Efficient Framework for Transformer Verification on GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TC-GNN: Bridging Sparse GNN Computation and Dense Tensor Cores on GPUs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "GNNAdvisor: An Adaptive and Efficient Runtime System for GNN Acceleration on GPUs",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oper optimalityguided embedding table parallelization for largescale recommendation model",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "mgg accelerating graph neural networks with finegrained intrakernel communicationcomputation pipelining on multigpu platforms",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 76,
    "paper_ids": [
      1673,
      1674,
      1675,
      1676,
      1677
    ],
    "papers_without_artifact_ids": [
      1678,
      1679
    ]
  },
  {
    "name": "Haibing Guan",
    "display_name": "Haibing Guan",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 5,
    "total_papers": 10,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 3,
      "ATC": 4,
      "SOSP": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 2,
        "2024": 1
      },
      "ATC": {
        "2024": 2,
        "2023": 2
      },
      "SOSP": {
        "2021": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 80.0,
    "functional_rate": 80.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Samoyeds: Accelerating MoE Models with Structured Sparsity Leveraging Sparse Tensor Cores",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "HD-IOV: SW-HW Co-designed I/O Virtualization with Scalability and Flexibility for Hyper-Density Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "gVulkan: Scalable GPU Pooling for Pixel-Grained Rendering in Ray Tracing",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "LPNS: Scalable and Latency-Predictable Local Storage Virtualization for Unpredictable NVMe SSDs in Clouds",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Security and Performance in the Delegated User-level Virtualization",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "spacefusion advanced deep learning operator fusion via spacemapping graph",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "cpc flexible secure and efficient cvm maintenance with confidential procedure calls",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "bifrost analysis and optimization of network io tax in confidential virtual machines",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "twinvisor hardwareisolated confidential virtual machines for arm",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "mostly exitless vm protection from untrusted hypervisor through disaggregated nested virtualization",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 165,
    "paper_ids": [
      1680,
      1681,
      1682,
      1683,
      45
    ],
    "papers_without_artifact_ids": [
      1684,
      52,
      61,
      73,
      74
    ]
  },
  {
    "name": "Yubin Xia",
    "display_name": "Yubin Xia",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 5,
    "total_papers": 12,
    "total_papers_by_conf": {
      "OSDI": 3,
      "USENIXSEC": 2,
      "EUROSYS": 1,
      "SOSP": 1,
      "ATC": 3,
      "FAST": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 2,
        "2023": 1
      },
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "SOSP": {
        "2021": 1
      },
      "ATC": {
        "2022": 1,
        "2024": 2
      },
      "FAST": {
        "2016": 1,
        "2026": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 41.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2023,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 5,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "A Hardware-Software Co-Design for Efficient Secure Containers",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "A Hardware-Software Co-design for Efficient Intra-Enclave Isolation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Serverless Functions Made Confidential and Efficient with Split Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Scalable Memory Protection in the PENGLAI Enclave",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Encrypted Databases Made Secure Yet Maintainable",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sharpen the spec cut the code a case for generative file system with sysspec",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "cpc flexible secure and efficient cvm maintenance with confidential procedure calls",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "harmonizing efficiency and practicability optimizing resource utilization in serverless computing with jiagu",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "epk scalable and efficient memory protection keys",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "bringing decentralized search to decentralized services",
        "conference": "OSDI",
        "year": 2021
      },
      {
        "title": "twinvisor hardwareisolated confidential virtual machines for arm",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "mitigating sync amplification for copyonwrite virtual disk",
        "conference": "FAST",
        "year": 2016
      }
    ],
    "author_id": 167,
    "paper_ids": [
      1685,
      38,
      39,
      41,
      43
    ],
    "papers_without_artifact_ids": [
      49,
      52,
      53,
      66,
      72,
      73,
      76
    ]
  },
  {
    "name": "Jilong Xue",
    "display_name": "Jilong Xue",
    "affiliation": "Microsoft Research",
    "artifact_count": 5,
    "total_papers": 9,
    "total_papers_by_conf": {
      "OSDI": 6,
      "EUROSYS": 1,
      "SOSP": 1,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2024": 1,
        "2023": 3,
        "2020": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "SOSP": {
        "2024": 1
      },
      "ATC": {},
      "NSDI": {
        "2017": 1
      }
    },
    "artifact_rate": 55.6,
    "repro_rate": 80.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2020,
      2022,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "NeuStream: Bridging Deep Learning Serving and Stream Processing",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ROLLER: Fast and Efficient Tensor Compilation for Deep Learning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Welder: Scheduling Deep Learning Memory Access via Tile-graph",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Optimizing Dynamic Neural Networks with Brainstorm",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rammer: Enabling Holistic Deep Learning Compiler Optimizations with rTasks",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ladder enabling efficient lowprecision deep learning computing through hardwareaware tensor transformation",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "scaling deep learning computation over the intercore connected intelligence processor with t10",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "cocktailer analyzing and optimizing dynamic control flow in deep learning",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "tux",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 168,
    "paper_ids": [
      1034,
      150,
      153,
      155,
      156
    ],
    "papers_without_artifact_ids": [
      159,
      1035,
      162,
      291
    ]
  },
  {
    "name": "David Lie",
    "display_name": "David Lie",
    "affiliation": "University of Toronto",
    "artifact_count": 5,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 2,
      "ATC": 1,
      "SOSP": 0,
      "EUROSYS": 1,
      "ACSAC": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2025": 2
      },
      "ATC": {
        "2022": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2024": 1
      },
      "ACSAC": {},
      "OSDI": {}
    },
    "artifact_rate": 71.4,
    "repro_rate": 60.0,
    "functional_rate": 80.0,
    "category": "both",
    "conferences": [
      "ATC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Modulo: Finding Convergence Failure Bugs in Distributed Systems with Divergence Resync Models",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Relocate-Vote: Using Sparsity Information to Exploit Ciphertext Side-Channels",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Duumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "EvoCrawl: Exploring Web Application Code and State using Evolutionary Search",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "stream processing with adaptive edgeenhanced confidential computing",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "a large scale study of user behavior expectations and engagement with android permissions",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 171,
    "paper_ids": [
      653,
      1686,
      1687,
      1688,
      1689
    ],
    "papers_without_artifact_ids": [
      1690,
      1691
    ]
  },
  {
    "name": "Zhi Zhang 0001",
    "display_name": "Zhi Zhang",
    "affiliation": "University of Western Australia",
    "artifact_count": 5,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1,
      "ATC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 3
      },
      "NDSS": {
        "2025": 1
      },
      "ATC": {
        "2022": 1
      },
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 71.4,
    "repro_rate": 20.0,
    "functional_rate": 40.0,
    "category": "both",
    "conferences": [
      "ATC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TAPAS: An Efficient Online APT Detection with Task-guided Process Provenance Graph Segmentation and Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum!",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "practical opcodebased fault attack on aesni",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "yes onebitflip matters universal dnn model inference depletion with runtime code fault injection",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 172,
    "paper_ids": [
      760,
      1396,
      1563,
      1125,
      1397
    ],
    "papers_without_artifact_ids": [
      1692,
      1398
    ]
  },
  {
    "name": "Yueqiang Cheng",
    "display_name": "Yueqiang Cheng",
    "affiliation": "NIO,China",
    "artifact_count": 5,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 4,
      "ATC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2025": 2,
        "2021": 2
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1,
        "2022": 1,
        "2017": 1
      },
      "ATC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 40.0,
    "functional_rate": 40.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2017,
      2022,
      2024,
      2025
    ],
    "year_range": "2017-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Alarms to Real Bugs: Multi-target Multi-step Directed Greybox Fuzzing for Static Analysis Result Verification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the ghost navigator revisiting the hidden vulnerability of localization in autonomous driving",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "tlb poisoning attacks on amd secure encrypted virtualization",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "hermes attack steal dnn models with lossless inference accuracy",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "cipherleaks breaking constanttime cryptography on amd sev via the ciphertext side channel",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "pckv locally differentially private correlated keyvalue data collection with optimized utility",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 173,
    "paper_ids": [
      760,
      1693,
      1694,
      1695,
      1696
    ],
    "papers_without_artifact_ids": [
      737,
      377,
      1697,
      378,
      1698
    ]
  },
  {
    "name": "Rob Jansen",
    "display_name": "Rob Jansen",
    "affiliation": "U.S. Naval Research Laboratory",
    "artifact_count": 5,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 4,
      "ATC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2025": 2,
        "2026": 1
      },
      "ATC": {
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 55.6,
    "repro_rate": 40.0,
    "functional_rate": 40.0,
    "category": "both",
    "conferences": [
      "ATC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2023,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Co-opting Linux Processes for High-Performance Network Simulation",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Censorship Evasion with Unidentified Protocol Generation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Data-Explainable Website Fingerprinting with Network Simulation",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Onion-Location Measurements and Fingerprinting",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "editors introduction",
        "conference": "PETS",
        "year": 2026
      },
      {
        "title": "editors introduction",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "on precisely detecting censorship circumvention in realworld networks",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "learning to behave improving covert channel security with behaviorbased designs",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "online website fingerprinting evaluating website fingerprinting attacks on tor in the real world",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 174,
    "paper_ids": [
      1699,
      1141,
      1284,
      1700,
      1701
    ],
    "papers_without_artifact_ids": [
      810,
      810,
      1144,
      1146,
      974
    ]
  },
  {
    "name": "Adrian Perrig",
    "display_name": "Adrian Perrig",
    "affiliation": "ETH Zurich",
    "artifact_count": 5,
    "total_papers": 14,
    "total_papers_by_conf": {
      "USENIXSEC": 10,
      "PETS": 1,
      "ATC": 1,
      "SOSP": 1,
      "EUROSYS": 0,
      "ACSAC": 0,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 3,
        "2022": 2,
        "2025": 1,
        "2021": 1
      },
      "PETS": {
        "2021": 1
      },
      "ATC": {
        "2023": 1
      },
      "SOSP": {
        "2024": 1
      },
      "EUROSYS": {},
      "ACSAC": {},
      "NSDI": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 35.7,
    "repro_rate": 40.0,
    "functional_rate": 80.0,
    "category": "both",
    "conferences": [
      "ATC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2023,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SAGE: Software-based Attestation for GPU Execution",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Creating a Secure Underlay for the Internet",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BGP Vortex: Update Message Floods Can Create Internet Instabilities",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Website Fingerprinting in the Age of QUIC",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dns congestion control in adversarial settings",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "camp compositional amplification attacks against dns",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "zerosetup intermediaterate communication guarantees in a global internet",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "rhine robust and highperformance internet naming with e2e authenticity",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "did the shark eat the watchdog in the ntp pool deceiving the ntp pools monitoring system",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "hey kimya is my smart speaker spying on me taking control of sensor privacy through isolation and amnesia",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "fabrid flexible attestationbased routing for interdomain networks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "redmark bypassing rdma security mechanisms",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "epic every packet is checked in the data plane of a pathaware internet",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 175,
    "paper_ids": [
      754,
      129,
      132,
      1702,
      139
    ],
    "papers_without_artifact_ids": [
      1703,
      450,
      1704,
      453,
      1705,
      1706,
      455,
      759,
      1707
    ]
  },
  {
    "name": "Frederik Armknecht",
    "display_name": "Frederik Armknecht",
    "affiliation": "University of Mannheim",
    "artifact_count": 5,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 3,
      "ACSAC": 2,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2024": 1
      },
      "ACSAC": {
        "2024": 2
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 40.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "R+R: Revisiting Graph Matching Attacks on Privacy-Preserving Record Linkage",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Practical Light Clients for Committee-Based Blockchains",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "If You Like Me, Please Don't \"Like\" Me: Inferring Vendor Bitcoin Addresses From Positive Reviews",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Strengthening Privacy-Preserving Record Linkage using Diffusion",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Differentially Private Functional Encryption",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 176,
    "paper_ids": [
      1708,
      1709,
      1710,
      1711,
      1712
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sooel Son",
    "display_name": "Sooel Son",
    "affiliation": "KAIST",
    "artifact_count": 5,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 2,
        "2025": 2,
        "2021": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 71.4,
    "repro_rate": 60.0,
    "functional_rate": 60.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "You Only Perturb Once: Bypassing (Robust) Ad-Blockers Using Universal Adversarial Perturbations",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Private Investigator: Extracting Personally Identifiable Information from Large Language Models Using Optimized Prompts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Refusal Is Not an Option: Unlearning Safety Alignment of Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "watching the watchers practical video identification attack in lte networks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "adcube webvr ad fraud and practical confinement of thirdparty ads",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 177,
    "paper_ids": [
      1713,
      1714,
      1715,
      1716,
      1717
    ],
    "papers_without_artifact_ids": [
      1718,
      1719
    ]
  },
  {
    "name": "Sherman S. M. Chow",
    "display_name": "Sherman S. M. Chow",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 5,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 3,
      "ACSAC": 3,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 2,
        "2025": 1
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1,
        "2023": 1
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 80.0,
    "functional_rate": 60.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 3,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sipster: Settling IOU Privately and Quickly with Smart Meters",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure Softmax/Sigmoid for Machine-learning Computation",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SHAFT: Secure, Handy, Accurate and Fast Transformer Inference",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secure multiparty computation of threshold signatures made more efficient",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "unus pro omnibus multiclient searchable encryption via access control",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "forward and backwardsecure rangesearchable symmetric encryption",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "omnes pro uno practical multiwriter encrypted database",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "gforce gpufriendly oblivious and rapid neural network inference",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 178,
    "paper_ids": [
      1400,
      1720,
      1721,
      1722,
      1723
    ],
    "papers_without_artifact_ids": [
      1724,
      1725,
      1726,
      1727,
      1728
    ]
  },
  {
    "name": "Z. Berkay Celik",
    "display_name": "Z. Berkay Celik",
    "affiliation": "Purdue University",
    "artifact_count": 5,
    "total_papers": 25,
    "total_papers_by_conf": {
      "USENIXSEC": 16,
      "ACSAC": 2,
      "ATC": 0,
      "PETS": 4,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2023": 5,
        "2022": 2,
        "2025": 3,
        "2021": 2
      },
      "ACSAC": {
        "2024": 1,
        "2023": 1
      },
      "ATC": {},
      "PETS": {
        "2023": 1,
        "2025": 1,
        "2024": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 40.0,
    "functional_rate": 20.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Shadowed Realities: An Investigation of UI Attacks in WebXR",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scopeverif analyzing the security of androids scoped storage via differential analysis",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "speak up im listening extracting speech from zeropermission vr sensors",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "why am i seeing double an investigation of device management flaws in voice assistant platforms",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "the dark side of ecommerce dropshipping abuse as a business model",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "physical sidechannel attacks against intermittent devices",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "vogues validation of object guise using estimated components",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "sain improving ics attack detection sensitivity via stateaware invariants",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "understanding the security and privacy implications of online toxic content on refugees",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "attention please an investigation of the app tracking transparency permission",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "istelan disclosing sensitive user information by mobile magnetometer from finger touches",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "patchverif discovering faulty patches in robotic vehicles",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "discovering adversarial driving maneuvers against autonomous vehicles",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "zbcan a zerobyte can defense system",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "locin inferring semantic location from spatial maps in mixed reality",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "that person moves like a car misclassification attack detection for autonomous systems using spatiotemporal consistency",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "sara secure android remote authorization",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "behind the tube exploitative monetization of content on youtube",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "realtime analysis of privacyunaware iot applications",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "exposing new vulnerabilities of error handling mechanism in can",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "atlas a sequencebased learning approach for attack investigation",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 179,
    "paper_ids": [
      1729,
      1730,
      1731,
      1732,
      1733
    ],
    "papers_without_artifact_ids": [
      1734,
      1135,
      1735,
      1736,
      1737,
      1738,
      1739,
      1740,
      1741,
      1742,
      1743,
      1744,
      1745,
      1746,
      1747,
      1748,
      1749,
      1750,
      1751,
      1752
    ]
  },
  {
    "name": "Jun Xu 0024",
    "display_name": "Jun Xu",
    "affiliation": "University of Utah",
    "artifact_count": 5,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 3,
      "ACSAC": 1,
      "WOOT": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2022": 2
      },
      "ACSAC": {
        "2024": 1
      },
      "WOOT": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 60.0,
    "functional_rate": 40.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 2,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Sidecar: Leveraging Debugging Extensions in Commodity Processors to Secure Software",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Where's the \"up\"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ground Truth for Binary Disassembly is Not Easy",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Debloating Address Sanitizer",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 180,
    "paper_ids": [
      1753,
      167,
      1754,
      1755,
      1756
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Strohmeier",
    "display_name": "Martin Strohmeier",
    "affiliation": "armasuisse, Switzerland",
    "artifact_count": 5,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "ACSAC": 1,
      "WOOT": 1,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2023": 1,
        "2022": 2,
        "2021": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "WOOT": {
        "2025": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 55.6,
    "repro_rate": 60.0,
    "functional_rate": 60.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2021,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS)",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Bluetooth Security Testing with BlueToolkit: a Large-Scale Automotive Case Study",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "wireless signal injection attacks on vsat satellite modems",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "fabrid flexible attestationbased routing for interdomain networks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "an experimental study of gps spoofing and takeover attacks on uavs",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "building an avionics laboratory for cybersecurity testing",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 181,
    "paper_ids": [
      1757,
      1758,
      1759,
      1760,
      1761
    ],
    "papers_without_artifact_ids": [
      1762,
      455,
      1763,
      1764
    ]
  },
  {
    "name": "Prateek Saxena",
    "display_name": "Prateek Saxena",
    "affiliation": "National University of Singapore",
    "artifact_count": 5,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 2,
      "PETS": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 2
      },
      "ACSAC": {
        "2018": 2
      },
      "PETS": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 71.4,
    "repro_rate": 20.0,
    "functional_rate": 60.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2022,
      2023
    ],
    "year_range": "2018-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Obscuro: A Bitcoin Mixer using Trusted Execution Environments",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Finding The Greedy, Prodigal, and Suicidal Contracts at Scale",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Capstone: A Capability-based Foundation for Trustless Secure Memory Access",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Elasticlave: An Efficient Memory Model for Enclaves",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "translating c to rust lessons from a user study",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "besfs a posix filesystem for enclaves with a mechanized safety proof",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 182,
    "paper_ids": [
      1765,
      1766,
      1767,
      1768,
      1769
    ],
    "papers_without_artifact_ids": [
      1770,
      1771
    ]
  },
  {
    "name": "Ilya Grishchenko",
    "display_name": "Ilya Grishchenko",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 5,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "ACSAC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2023": 1,
        "2022": 1,
        "2025": 2
      },
      "ACSAC": {
        "2024": 1,
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 40.0,
    "functional_rate": 80.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Approve Once, Regret Forever: On the Exploitation of Ethereum's Approve-TransferFrom Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Relocate-Vote: Using Sparsity Information to Exploit Ciphertext Side-Channels",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deepcapa identifying malicious capabilities in windows malware",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "not your type detecting storage collision vulnerabilities in ethereum smart contracts",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "remote keylogging attacks in multiuser vr applications",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "guideenricher protecting the anonymity of ethereum mixing service users with deep reinforcement learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "confusum contractum confused deputy vulnerabilities in ethereum smart contracts",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 183,
    "paper_ids": [
      845,
      1150,
      848,
      1152,
      1687
    ],
    "papers_without_artifact_ids": [
      1154,
      1155,
      1156,
      1157,
      1159
    ]
  },
  {
    "name": "Shuo Wang 0012",
    "display_name": "Shuo Wang",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 5,
    "total_papers": 7,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 3,
      "ACSAC": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "NDSS": {
        "2024": 2,
        "2025": 1
      },
      "ACSAC": {
        "2022": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 71.4,
    "repro_rate": 40.0,
    "functional_rate": 60.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "PETS"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Reconstruction Attack on Differential Private Trajectory Protection Mechanisms",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Can Trajectory Generation Combine Privacy and Utility?",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum!",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a duty to forget a right to be assured exposing vulnerabilities in machine unlearning services",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "dnngp diagnosing and mitigating models faults using latent concepts",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 184,
    "paper_ids": [
      763,
      765,
      767,
      1565,
      1397
    ],
    "papers_without_artifact_ids": [
      1575,
      1579
    ]
  },
  {
    "name": "Antonio Bianchi",
    "display_name": "Antonio Bianchi",
    "affiliation": "Purdue University",
    "artifact_count": 5,
    "total_papers": 21,
    "total_papers_by_conf": {
      "USENIXSEC": 16,
      "ACSAC": 2,
      "PETS": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2020": 1,
        "2023": 5,
        "2022": 2,
        "2025": 3,
        "2021": 2
      },
      "ACSAC": {
        "2022": 1,
        "2017": 1
      },
      "PETS": {
        "2025": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 23.8,
    "repro_rate": 20.0,
    "functional_rate": 20.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LEMIX: Enabling Testing of Embedded Applications as Linux Applications",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scopeverif analyzing the security of androids scoped storage via differential analysis",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "veribin adaptive verification of patches at the binary level",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "why am i seeing double an investigation of device management flaws in voice assistant platforms",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "neuroscope reverse engineering deep neural network on edge devices using dynamic analysis",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "finding traceability attacks in the bluetooth low energy specification and its implementations",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "attention please an investigation of the app tracking transparency permission",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "patchverif discovering faulty patches in robotic vehicles",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "discovering adversarial driving maneuvers against autonomous vehicles",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "fuzz the power dualrole state guided blackbox fuzzing for usb power delivery",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "locin inferring semantic location from spatial maps in mixed reality",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "sara secure android remote authorization",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "dnd a crossarchitecture deep neural network decompiler",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "m2mon building an mmiobased security reference monitor for unmanned vehicles",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "lightblue automatic profileaware debloating of bluetooth stacks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "blesa spoofing attacks against reconnections in bluetooth low energy",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "exploitation and mitigation of authentication schemes based on devicepublic information",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 185,
    "paper_ids": [
      2,
      1772,
      1773,
      1732,
      1774
    ],
    "papers_without_artifact_ids": [
      1734,
      1775,
      1735,
      1776,
      1777,
      1741,
      1743,
      1744,
      1778,
      1746,
      1748,
      1779,
      1780,
      27,
      30,
      1164
    ]
  },
  {
    "name": "Flavio Toffalini",
    "display_name": "Flavio Toffalini",
    "affiliation": "Ruhr-University Bochum",
    "artifact_count": 5,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 2
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 80.0,
    "functional_rate": 80.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Designing a Provenance Analysis for SGX Enclaves",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TLBlur: Compiler-Assisted Automated Hardening against Controlled Channels on Off-the-Shelf Intel SGX Platforms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "type++: Prohibiting Type Confusion with Inline Type Information",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 186,
    "paper_ids": [
      3,
      12,
      16,
      17,
      18
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Frank Piessens",
    "display_name": "Frank Piessens",
    "affiliation": "KU Leuven",
    "artifact_count": 5,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 2,
      "SOSP": 0,
      "SC": 0,
      "ATC": 0,
      "SYSTEX": 0,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 2,
        "2025": 1
      },
      "ACSAC": {
        "2017": 1,
        "2020": 1
      },
      "SOSP": {},
      "SC": {},
      "ATC": {},
      "SYSTEX": {},
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 71.4,
    "repro_rate": 80.0,
    "functional_rate": 80.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2017,
      2020,
      2023,
      2024,
      2025
    ],
    "year_range": "2017-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Faulty Point Unit: ABI Poisoning Attacks on Intel SGX",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ProSpeCT: Provably Secure Speculation for the Constant-Time Policy",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TLBlur: Compiler-Assisted Automated Hardening against Controlled Channels on Off-the-Shelf Intel SGX Platforms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aexnotify thwarting precise singlestepping attacks through interrupt awareness for intel sgx enclaves",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "copycat controlled instructionlevel attacks on enclaves",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 187,
    "paper_ids": [
      1444,
      1445,
      1446,
      1781,
      16
    ],
    "papers_without_artifact_ids": [
      663,
      1447
    ]
  },
  {
    "name": "Mohamed Sabt",
    "display_name": "Mohamed Sabt",
    "affiliation": "Univ Rennes, CNRS, IRISA",
    "artifact_count": 5,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 3,
      "ACSAC": 1,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 40.0,
    "functional_rate": 60.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Formal Security Analysis of Widevine through the W3C EME Standard",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"These results must be false\": A usability evaluation of constant-time analysis tools",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Narrowbeer: A Practical Replay Attack Against the Widevine DRM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 188,
    "paper_ids": [
      1782,
      1783,
      1784,
      1785,
      1786
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ingrid Verbauwhede",
    "display_name": "Ingrid Verbauwhede",
    "affiliation": "KU Leuven",
    "artifact_count": 5,
    "total_papers": 19,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "CHES": 16,
      "SOSP": 0,
      "ACSAC": 0,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "CHES": {
        "2024": 3,
        "2022": 5,
        "2021": 2,
        "2025": 5,
        "2023": 1
      },
      "SOSP": {},
      "ACSAC": {},
      "PETS": {}
    },
    "artifact_rate": 26.3,
    "repro_rate": 20.0,
    "functional_rate": 40.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Time Sharing - A Novel Approach to Low-Latency Masking",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Higher-Order Time Sharing Masking",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SpectrEM: Exploiting Electromagnetic Emanations During Transient Execution",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "final bootstrap acceleration on fpga using dspfree constantmultiplier ntts",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "optimsm fpga hardware accelerator for zeroknowledge msm",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "entropy extractor based highthroughput postprocessings for true random number generators",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "rudraksh a compact and lightweight postquantum keyencapsulation mechanism",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "leuvenshtein efficient fhebased edit distance computation with single bootstrap per cell",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "trng entropy model in the presence of flicker fm noise",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "carry your fault a fault propagation attack on sidechannel protected lwebased kem",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "basalisc programmable hardware accelerator for bgv fully homomorphic encryption",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "polynomial multiplication on embedded vector architectures",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "masked accelerators and instruction set extensions for postquantum cryptography",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "higherorder masked ciphertext comparison for latticebased cryptography",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "an energy and area efficient all digital entropy source compatible with modern standards based on jitter pipelining",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "scabbard a suite of efficient learning with rounding keyencapsulation mechanisms",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "analysis and comparison of tablebased arithmetic to boolean masking",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 189,
    "paper_ids": [
      1787,
      1788,
      1789,
      1790,
      1791
    ],
    "papers_without_artifact_ids": [
      1792,
      1793,
      1794,
      1795,
      1796,
      1797,
      1798,
      1799,
      1800,
      1801,
      1802,
      1803,
      1804,
      1805
    ]
  },
  {
    "name": "Daniel J. Bernstein",
    "display_name": "Daniel J. Bernstein",
    "affiliation": "University of Illinois at Chicago",
    "artifact_count": 5,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1,
      "CHES": 3,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      },
      "CHES": {
        "2021": 2,
        "2025": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 83.3,
    "repro_rate": 40.0,
    "functional_rate": 40.0,
    "category": "security",
    "conferences": [
      "CHES",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2022,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "CTIDH: faster constant-time CSIDH",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "KyberSlash: Exploiting secret-dependent division timings in Kyber implementations",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OpenSSLNTRU: Faster post-quantum TLS key exchange",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PQConnect: Automated Post-Quantum End-to-End Tunnels",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "concrete quantum cryptanalysis of binary elliptic curves",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 190,
    "paper_ids": [
      1806,
      581,
      1807,
      1808,
      437
    ],
    "papers_without_artifact_ids": [
      1809
    ]
  },
  {
    "name": "Peter Schwabe",
    "display_name": "Peter Schwabe",
    "affiliation": "Max Planck Society",
    "artifact_count": 5,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1
      },
      "CHES": {
        "2024": 1,
        "2025": 1,
        "2023": 2
      }
    },
    "artifact_rate": 71.4,
    "repro_rate": 20.0,
    "functional_rate": 20.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Let's DOIT: Using Intel's Extended HW/SW Contract for Secure Compilation of Crypto Code",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: SCA-secure ECC in software - mission impossible?",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Formally verifying Kyber Episode IV: Implementation correctness",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"These results must be false\": A usability evaluation of constant-time analysis tools",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "highassurance zeroization",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "ultimate slh taking speculative load hardening to the next level",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 191,
    "paper_ids": [
      1810,
      1811,
      1812,
      1813,
      1784
    ],
    "papers_without_artifact_ids": [
      1814,
      1525
    ]
  },
  {
    "name": "Giovanni Camurati",
    "display_name": "Giovanni Camurati",
    "affiliation": "ETH Zurich",
    "artifact_count": 5,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "CHES": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2025": 2
      },
      "CHES": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 83.3,
    "repro_rate": 0.0,
    "functional_rate": 40.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PURE: Payments with UWB RElay-protection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GNSS-WASP: GNSS Wide Area SPoofing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LEO-Range: Physical Layer Design for Secure Ranging with Low Earth Orbiting Satellites",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "time for change how clocks break uwb secure ranging",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 192,
    "paper_ids": [
      1815,
      440,
      413,
      1224,
      1225
    ],
    "papers_without_artifact_ids": [
      1231
    ]
  },
  {
    "name": "Philipp Mao",
    "display_name": "Philipp Mao",
    "affiliation": "EPFL",
    "artifact_count": 5,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2025": 2
      },
      "WOOT": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "Exploiting Android's Hardened Memory Allocator",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Spill the TeA: An Empirical Study of Trusted Application Rollback Prevention on Android Smartphones",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GlobalConfusion: TrustZone Trusted Application 0-Days by Design",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hercules Droidot and the murder on the JNI Express",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NASS: Fuzzing All Native Android System Services with Interface Awareness and Coverage",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 193,
    "paper_ids": [
      5,
      7,
      8,
      14,
      15
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiska Classen",
    "display_name": "Jiska Classen",
    "affiliation": "Hasso Plattner Institute",
    "artifact_count": 5,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 1,
      "PETS": 1,
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 3,
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2025": 1
      },
      "WOOT": {
        "2024": 1
      }
    },
    "artifact_rate": 71.4,
    "repro_rate": 20.0,
    "functional_rate": 80.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2020,
      2022,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: On the Effectiveness of Control-Flow Integrity in Practice",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "WatchWitch: Interoperability, Privacy, and Autonomy for the Apple Watch",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Starshields for iOS: Navigating the Security Cosmos in Satellite Communication",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "toothpicker apple picking in the ios bluetooth stack",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "firmware insider bluetooth randomness is mostly random",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 194,
    "paper_ids": [
      411,
      412,
      413,
      415,
      419
    ],
    "papers_without_artifact_ids": [
      425,
      427
    ]
  },
  {
    "name": "Riccardo Paccagnella",
    "display_name": "Riccardo Paccagnella",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 5,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2022": 2,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 80.0,
    "functional_rate": 80.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Bending microarchitectural weird machines towards practicality",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 195,
    "paper_ids": [
      1497,
      1816,
      1817,
      1818,
      1819
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Malte Wessels",
    "display_name": "Malte Wessels",
    "affiliation": "TU Braunschweig",
    "artifact_count": 5,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      },
      "PETS": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 40.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SSRF vs. Developers: A Study of SSRF-Defenses in PHP Applications",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Confusing Value with Enumeration: Studying the Use of CVEs in Academia",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HyTrack: Resurrectable and Persistent Tracking Across Android Apps and the Web",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Keeping Privacy Labels Honest",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Impact of Default Mobile SDK Usage on Privacy and Data Protection",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 196,
    "paper_ids": [
      214,
      108,
      218,
      221,
      223
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinwen Wang",
    "display_name": "Jinwen Wang",
    "affiliation": "University of Texas at Dallas",
    "artifact_count": 5,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1,
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 80.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ARI: Attestation of Real-time Mission Execution Integrity",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure Information Embedding in Forensic 3D Fingerprinting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Software Availability Protection in Cyber-Physical Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 197,
    "paper_ids": [
      169,
      170,
      172,
      174,
      175
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anupam Das 0001",
    "display_name": "Anupam Das",
    "affiliation": "North Carolina State University",
    "artifact_count": 5,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 5,
      "SC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1
      },
      "PETS": {
        "2022": 1,
        "2025": 1,
        "2024": 1,
        "2021": 1,
        "2026": 1
      },
      "SC": {},
      "NDSS": {}
    },
    "artifact_rate": 62.5,
    "repro_rate": 20.0,
    "functional_rate": 20.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2026
    ],
    "year_range": "2022-2026",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Spying through Your Voice Assistants: Realistic Voice Command Fingerprinting",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Connecting the Dots: Tracing Data Endpoints in IoT Devices",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PriVA-C: Defending Voice Assistants from Fingerprinting Attacks",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "what are they gonna do with my data privacy expectations concerns and behaviors in virtual reality",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "did you know this camera tracks your mood understanding privacy expectations and preferences in the age of video analytics",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "how risky are real users ifttt applets",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 198,
    "paper_ids": [
      1820,
      1821,
      1822,
      1823,
      1824
    ],
    "papers_without_artifact_ids": [
      1825,
      1826,
      1827
    ]
  },
  {
    "name": "Katharina Krombholz",
    "display_name": "Katharina Krombholz",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 5,
    "total_papers": 15,
    "total_papers_by_conf": {
      "USENIXSEC": 15,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2020": 2,
        "2023": 2,
        "2022": 4,
        "2025": 2,
        "2021": 2
      },
      "WOOT": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 20.0,
    "functional_rate": 20.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Trust Me If You Can - How Usable Is Trusted Types In Practice?",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"I chose to fight, be brave, and to deal with it\": Threat Experiences and Security Practices of Pakistani Content Creators",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Privacy and Security in Private Clouds: A Representative Survey on the Prevalence of Private Hosting and Administrator Characteristics",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Understanding How Users Prepare for and React to Smartphone Theft",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AirTag-Facilitated Stalking Protection: Evaluating Unwanted Tracking Notifications and Tracker Locating Features",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "to cloud or not to cloud a qualitative study on selfhosters motivation operation and security mindset",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "investigating verification behavior and perceptions of visual digital certificates",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "industrial practitioners mental models of adversarial machine learning",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "comparing user perceptions of antistalkerware apps with the technical reality",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "replication stories as informal lessons about security",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "security at the end of the tunnel the anatomy of vpn mental models among experts and nonexperts in a corporate context",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "on the usability of authenticity checks for hardware security tokens",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "exploring authentication for securitysensitive tasks on smart home voice assistants",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "security availability and multiple information sources exploring update behavior of system administrators",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "user mental models of cryptocurrency systems a grounded theory approach",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 199,
    "paper_ids": [
      1183,
      1828,
      1829,
      1830,
      1831
    ],
    "papers_without_artifact_ids": [
      1832,
      1833,
      405,
      1834,
      1835,
      1836,
      1837,
      1838,
      1839,
      1840
    ]
  },
  {
    "name": "Ruoyu Wang 0001",
    "display_name": "Ruoyu Wang",
    "affiliation": "Arizona State University",
    "artifact_count": 5,
    "total_papers": 12,
    "total_papers_by_conf": {
      "USENIXSEC": 10,
      "ACSAC": 1,
      "NDSS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2020": 1,
        "2023": 2,
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {
        "2019": 1
      },
      "NDSS": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 41.7,
    "repro_rate": 80.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scammagnifier piercing the veil of fraudulent shopping website campaigns",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "take a step further understanding page spray in linux kernel exploitation",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "tygr type inference on stripped binaries using graph neural networks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "mtsan a feasible and practical memory sanitizer for fuzzing cots binaries",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "having your cake and eating it an analysis of concessionabuseasaservice",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "exploiting uses of uninitialized stack variables in linux kernels to leak kernel pointers",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "sleak automating address space layout derandomization",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 200,
    "paper_ids": [
      817,
      818,
      819,
      820,
      822
    ],
    "papers_without_artifact_ids": [
      823,
      826,
      825,
      915,
      828,
      829,
      1148
    ]
  },
  {
    "name": "Vitaly Shmatikov",
    "display_name": "Vitaly Shmatikov",
    "affiliation": "Cornell University",
    "artifact_count": 5,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "PETS": 1,
      "NSDI": 4,
      "NDSS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2,
        "2021": 2
      },
      "PETS": {
        "2024": 1
      },
      "NSDI": {
        "2013": 1,
        "2010": 1,
        "2016": 1,
        "2007": 1
      },
      "NDSS": {},
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 40.0,
    "functional_rate": 40.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Adversarial Illusions in Multi-Modal Embeddings",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Self-interpreting Adversarial Images",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Blind Backdoors in Deep Learning Models",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Data Isotopes for Data Provenance in DNNs",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "you autocomplete me poisoning vulnerabilities in neural code completion",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "earp principled storage sharing and protection for mobile apps",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "πbox a platform for privacypreserving apps",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "airavat security and privacy for mapreduce",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "dfence transparent networkbased denial of service mitigation",
        "conference": "NSDI",
        "year": 2007
      }
    ],
    "author_id": 201,
    "paper_ids": [
      1841,
      1842,
      1843,
      1844,
      1845
    ],
    "papers_without_artifact_ids": [
      1846,
      358,
      1847,
      1848,
      1849
    ]
  },
  {
    "name": "Kai Chen 0012",
    "display_name": "Kai Chen",
    "affiliation": "Chinese Academy of Sciences",
    "artifact_count": 5,
    "total_papers": 24,
    "total_papers_by_conf": {
      "USENIXSEC": 17,
      "ACSAC": 1,
      "NDSS": 6
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2020": 3,
        "2023": 6,
        "2025": 3,
        "2021": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {
        "2024": 2,
        "2025": 4
      }
    },
    "artifact_rate": 20.8,
    "repro_rate": 40.0,
    "functional_rate": 60.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Dormant: Defending against Pose-driven Human Image Animation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Tady: A Neural Disassembler without Structural Constraint Violations",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "generating api parameter security rules with llm for api misuse detection",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "the midas touch triggering the capability of llms for rmapi misuse detection",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "uncovering the iceberg from the tip generating api specifications for bug detection via specification propagation analysis",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "whats done is not whats claimed detecting and interpreting inconsistencies in app behaviors",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "sslwm a blackbox watermarking approach for encoders pretrained by selfsupervised learning",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "degpt optimizing decompiler output with llm",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "making them ask and answer jailbreaking large language models in few queries via disguise and reconstruction",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "aemorpher improve physical robustness of adversarial objects against lidarbased detectors via object reconstruction",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "darkfleece probing the dark side of android subscription apps",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "aurc detecting errors in program code and documentation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "detecting api posthandling bugs using code and description in patches",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "aliasing backdoor attacks on pretrained models",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "a datafree backdoor injection approach in neural networks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "differential testing of cross deep learning framework apis revealing inconsistencies and vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "boosting neural networks to decompile optimized binaries",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "drmi a dataset reduction technology based on mutual information for blackbox attacks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "fuzzguard filtering out unreachable inputs in directed greybox fuzzing through deep learning",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "devils whisper a general approach for physical adversarial attacks against commercial blackbox speech recognition devices",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "skillexplorer understanding the behavior of skills in large scale",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 202,
    "paper_ids": [
      596,
      1850,
      1851,
      1852,
      1853
    ],
    "papers_without_artifact_ids": [
      1854,
      1855,
      1856,
      1857,
      1858,
      1859,
      1860,
      1861,
      1862,
      1863,
      1864,
      1865,
      1866,
      1867,
      1868,
      1869,
      1870,
      614,
      1871
    ]
  },
  {
    "name": "Yueqi Chen 0001",
    "display_name": "Yueqi Chen",
    "affiliation": "University of Colorado Boulder",
    "artifact_count": 5,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2022": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "SeaK: Rethinking the Design of a Secure Allocator for OS Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PET: Prevent Discovered Errors from Being Triggered in the Linux Kernel",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Lancet: A Formalization Framework for Crash and Exploit Pathology",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 203,
    "paper_ids": [
      933,
      934,
      1872,
      821,
      1873
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marcel Maehren",
    "display_name": "Marcel Maehren",
    "affiliation": "Ruhr University Bochum",
    "artifact_count": 5,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 5,
    "badges_reproducible": 5,
    "papers": [
      {
        "title": "With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Internet-Based State Learning of TLS State Machines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 204,
    "paper_ids": [
      583,
      584,
      586,
      588,
      590
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yue Zhang 0025",
    "display_name": "Yue Zhang",
    "affiliation": "Shandong University",
    "artifact_count": 5,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2025": 3
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 62.5,
    "repro_rate": 40.0,
    "functional_rate": 80.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Easy As Child's Play: An Empirical Study on Age Verification of Adult-Oriented Android Apps",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deanonymizing device identities via sidechannel attacks in exclusiveuse iots mitigation",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "understanding miniapp malware identification dissection and characterization",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "breaking secure pairing of bluetooth low energy using downgrade attacks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 205,
    "paper_ids": [
      1874,
      382,
      1875,
      1876,
      1877
    ],
    "papers_without_artifact_ids": [
      388,
      389,
      397
    ]
  },
  {
    "name": "Cas Cremers",
    "display_name": "Cas Cremers",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 5,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 2,
        "2023": 4,
        "2021": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 71.4,
    "repro_rate": 60.0,
    "functional_rate": 60.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Formal Analysis of SPDM: Security Protocol and Data Model version 1.2",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hash gone bad automated discovery of protocol attacks that exploit hash function weaknesses",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "the complexities of healing in secure group messaging why crossgroup effects matter",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 206,
    "paper_ids": [
      1878,
      442,
      1879,
      1880,
      1881
    ],
    "papers_without_artifact_ids": [
      1882,
      1883
    ]
  },
  {
    "name": "Chao Zhang 0008",
    "display_name": "Chao Zhang",
    "affiliation": "Tsinghua University",
    "artifact_count": 5,
    "total_papers": 30,
    "total_papers_by_conf": {
      "USENIXSEC": 19,
      "SOSP": 1,
      "ACSAC": 1,
      "NDSS": 9
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 2,
        "2023": 8,
        "2022": 2,
        "2025": 2,
        "2021": 3
      },
      "SOSP": {
        "2023": 1
      },
      "ACSAC": {
        "2019": 1
      },
      "NDSS": {
        "2024": 5,
        "2025": 4
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 20.0,
    "functional_rate": 60.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FANS: Fuzzing Android Native System Services via Automated Interface Analysis",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AutoDA: Automated Decision-based Iterative Adversarial Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Tady: A Neural Disassembler without Structural Constraint Violations",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "IDFuzz: Intelligent Directed Grey-box Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cctag configurable and combinable tagged architecture",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "eagleye exposing hidden web interfaces in iot devices via routing analysis",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "vulshield protecting vulnerable code before deploying patches",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "truman constructing device behavior models from os drivers to fuzz virtual devices",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "faster and better detecting vulnerabilities in linuxbased iot firmware with optimized reaching definition analysis",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "reqsminer automated discovery of cdn forwarding request inconsistencies and dos attacks with grammarbased fuzzing",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "beyond the surface uncovering the unprotected components of android against overlay attack",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "enclavefuzz finding vulnerabilities in sgx applications",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "shapfuzz efficient fuzzing via shapleyguided byte selection",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "improving mlbased binary function similarity detection by assessing and deprioritizing control flow graph features",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "sdfuzz target states driven directed fuzzing",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "one simple api can cause hundreds of bugs an analysis of refcounting bugs in all modern linux kernels",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "alphaexp an expert system for identifying securitysensitive kernel objects",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "mtsan a feasible and practical memory sanitizer for fuzzing cots binaries",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "aifore smart fuzzing based on automatic input format reverse engineering",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "kextfuzz fuzzing macos kernel extensions on apple silicon via exploiting mitigations",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "ddrace finding concurrency uaf vulnerabilities in linux drivers with directed fuzzing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "efficient 3pc for binary circuits with application to maliciouslysecure dnn inference",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "temporal cdnconvex lens a cdnassisted practical pulsing ddos attack",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "statefuzz system callbased stateaware linux driver fuzzing",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "maze towards automated heap feng shui",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "sharing more and checking less leveraging common input keywords to detect bugs in embedded systems",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "vscape assessing and escaping virtual call protections",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "greyone data flow sensitive fuzzing",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "srfuzzer an automatic fuzzing framework for physical soho router devices to discover multitype vulnerabilities",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 207,
    "paper_ids": [
      1884,
      545,
      1885,
      1852,
      1886
    ],
    "papers_without_artifact_ids": [
      1887,
      1888,
      1889,
      20,
      1890,
      908,
      779,
      1891,
      1576,
      563,
      1892,
      1893,
      1894,
      915,
      23,
      1895,
      787,
      1896,
      916,
      1897,
      1898,
      919,
      1899,
      1900,
      1901
    ]
  },
  {
    "name": "Rahmadi Trimananda",
    "display_name": "Rahmadi Trimananda",
    "affiliation": "University of California, Irvine",
    "artifact_count": 5,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "PETS": {
        "2022": 1,
        "2025": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 60.0,
    "functional_rate": 60.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FingerprinTV: Fingerprinting Smart TV Apps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Understanding Privacy Norms through Web Forms",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BehaVR: User Identification Based on VR Sensor Data",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 208,
    "paper_ids": [
      960,
      961,
      963,
      964,
      965
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexander Heinrich",
    "display_name": "Alexander Heinrich",
    "affiliation": "Secure Mobile Networking Lab, Technical University of Darmstadt",
    "artifact_count": 5,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1,
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2021": 2
      },
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2025": 1,
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 71.4,
    "repro_rate": 20.0,
    "functional_rate": 60.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "WatchWitch: Interoperability, Privacy, and Autonomy for the Apple Watch",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Starshields for iOS: Navigating the Security Cosmos in Satellite Communication",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "please unstalk me understanding stalking with bluetooth trackers and democratizing antistalking protection",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "privatedrop practical privacypreserving authentication for apple airdrop",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 209,
    "paper_ids": [
      413,
      414,
      415,
      417,
      419
    ],
    "papers_without_artifact_ids": [
      420,
      424
    ]
  },
  {
    "name": "Jiaheng Zhang",
    "display_name": "Jiaheng Zhang",
    "affiliation": "National University of Singapore",
    "artifact_count": 5,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 4
      },
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 40.0,
    "functional_rate": 40.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Polynomial Commitment with a One-to-Many Prover and Applications",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "zkGPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Provably Robust Multi-bit Watermarking for AI-generated Text",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof Delegation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 210,
    "paper_ids": [
      1402,
      1902,
      1903,
      1904,
      1905
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Claudia Díaz",
    "display_name": "Claudia Díaz",
    "affiliation": "KU Leuven",
    "artifact_count": 5,
    "total_papers": 9,
    "total_papers_by_conf": {
      "NDSS": 2,
      "PETS": 6,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "PETS": {
        "2022": 2,
        "2024": 3,
        "2021": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 55.6,
    "repro_rate": 40.0,
    "functional_rate": 40.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Mixnet optimization methods",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From \"Onion Not Found\" to Guard Discovery",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MixMatch: Flow Matching for Mixnet Traffic",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LARMix: Latency-Aware Routing in Mix Networks",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LAMP: Lightweight Approaches for Latency Minimization in Mixnets with Practical Deployment Considerations",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "are continuous stopandgo mixnets provably secure",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "blending different latency traffic with beta mixing",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "verloc verifiable localization in decentralized systems",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "less is more a privacyrespecting android malware classifier using federated learning",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 7910,
    "paper_ids": [
      1906,
      1907,
      1908,
      1909,
      1910
    ],
    "papers_without_artifact_ids": [
      1911,
      1912,
      1913,
      1914
    ]
  },
  {
    "name": "Niklas Carlsson",
    "display_name": "Niklas Carlsson",
    "affiliation": "Linköping University",
    "artifact_count": 5,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 5
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 1,
        "2024": 2,
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 20.0,
    "functional_rate": 40.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2024,
      2025,
      2026
    ],
    "year_range": "2023-2026",
    "recent_count": 4,
    "artifact_citations": 0,
    "badges_available": 5,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "StyleID: Identity Disentanglement for Anonymizing Faces",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DiffPrivate: Facial Privacy Protection with Diffusion Models",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "StyleAdv: A Usable Privacy Framework Against Facial Recognition with Adversarial Image Editing",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Raising the Bar: Improved Fingerprinting Attacks and Defenses for Video Streaming Traffic",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ephemeral Network-Layer Fingerprinting Defenses",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 212,
    "paper_ids": [
      1915,
      1916,
      1917,
      1918,
      1919
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xudong Sun 0013",
    "display_name": "Xudong Sun",
    "affiliation": "University of Illinois Urbana-Champaign",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3,
      "EUROSYS": 2,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2022": 1,
        "2024": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      },
      "ATC": {},
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 57.1,
    "repro_rate": 75.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Acto: Automatic End-to-End Testing for Operation Correctness of Cloud System Management",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Multi-Grained Specifications for Distributed System Model Checking and Verification",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Automatic Reliability Testing For Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Anvil: Verifying Liveness of Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sandtable scalable distributed system model checking with specificationlevel state exploration",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "pushbutton reliability testing for cloudbacked applications with rainmaker",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "testing configuration changes in context to prevent production failures",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 213,
    "paper_ids": [
      616,
      618,
      621,
      622
    ],
    "papers_without_artifact_ids": [
      1920,
      627,
      633
    ]
  },
  {
    "name": "Peng Huang 0005",
    "display_name": "Peng Huang",
    "affiliation": "University of Michigan",
    "artifact_count": 4,
    "total_papers": 13,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 5,
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 5
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2022": 3,
        "2020": 2
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {},
      "NSDI": {
        "2013": 1,
        "2024": 1,
        "2025": 1,
        "2020": 2
      }
    },
    "artifact_rate": 30.8,
    "repro_rate": 25.0,
    "functional_rate": 75.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2022,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pushing Performance Isolation Boundaries into Application with pBox",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Effective Performance Issue Diagnosis with Value-Assisted Cost Profiling",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Demystifying and Checking Silent Semantic Violations in Large Distributed Systems",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Automated Reasoning and Detection of Specious Configuration in Large Systems with Symbolic Execution",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "onesizefitsnone understanding and enhancing slowfault tolerance in modern distributed systems",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "efficient exposure of partial failure bugs in distributed systems with inferred abstract states",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "efficient reproduction of faultinduced failures in distributed systems with feedbackdriven fault injection",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "resin a holistic service for dealing with memory leaks in production cloud infrastructure",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "operating system support for safe and efficient auxiliary execution",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "understanding detecting and localizing partial failures in large system software",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "gandalf an intelligent endtoend analytics service for safe deployment in largescale cloud infrastructure",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "predictive and adaptive failure mitigation to avert production cloud vm interruptions",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "edoctor automatically diagnosing abnormal battery drain issues on smartphones",
        "conference": "NSDI",
        "year": 2013
      }
    ],
    "author_id": 100,
    "paper_ids": [
      1921,
      1922,
      1923,
      1924
    ],
    "papers_without_artifact_ids": [
      1925,
      1926,
      1927,
      1928,
      1929,
      1930,
      1931,
      1932,
      1933
    ]
  },
  {
    "name": "Tao Ma 0006",
    "display_name": "Tao Ma",
    "affiliation": "Alibaba Group, Hangzhou, China",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 3,
      "ATC": 3,
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2,
        "2024": 1
      },
      "ATC": {
        "2022": 1,
        "2024": 2
      },
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 57.1,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC",
      "SOSP"
    ],
    "years": [
      2021,
      2022,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Partial Failure Resilient Memory Management System for (CXL-based) Distributed Shared Memory",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TrEnv: Transparently Share Serverless Execution Environments Across Different Functions and Nodes",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Enable simultaneous DNN services based on deterministic operator overlap and precise latency prediction",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Help Rather Than Recycle: Alleviating Cold Startup in Serverless Computing Through Inter-Function Container Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hydrarpc rpc in the cxl era",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "diagnosing applicationnetwork anomalies for millions of ips in production clouds",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "pvm efficient shadow paging for deploying secure containers in cloudnative environment",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 216,
    "paper_ids": [
      637,
      639,
      1084,
      1085
    ],
    "papers_without_artifact_ids": [
      1934,
      1935,
      1936
    ]
  },
  {
    "name": "Vincent Liu 0001",
    "display_name": "Vincent Liu",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 4,
    "total_papers": 13,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 4,
      "ATC": 0,
      "NSDI": 8
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2024": 1,
        "2023": 1,
        "2020": 2
      },
      "ATC": {},
      "NSDI": {
        "2013": 1,
        "2024": 2,
        "2025": 2,
        "2020": 1,
        "2022": 1,
        "2015": 1
      }
    },
    "artifact_rate": 30.8,
    "repro_rate": 75.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Paella: Low-latency Model Serving with Software-defined GPU Scheduling",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Beaver: Practical Partial Snapshots for Distributed Cloud Services",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fault-tolerant and transactional stateful serverless workflows",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Aragog: Scalable Runtime Verification of Shardable Networked Systems",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enabling silent telemetry data transmission with invisiflow",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "accelerating design space exploration for llm training systems with multiexperiment parallel simulation",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "mucache a general framework for caching in microservice graphs",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "cloudcast highthroughput costaware overlay multicast in the cloud",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "alpaserve statistical multiplexing with model parallelism for deep learning serving",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "orbweaver using idle cycles in programmable networks for opportunistic coordination",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "tpprof a network traffic pattern profiler",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "designing distributed systems using approximate synchrony in data center networks",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "f10 a faulttolerant engineered network",
        "conference": "NSDI",
        "year": 2013
      }
    ],
    "author_id": 217,
    "paper_ids": [
      1937,
      1938,
      1080,
      1939
    ],
    "papers_without_artifact_ids": [
      1940,
      1941,
      1082,
      479,
      484,
      1942,
      1943,
      1944,
      1945
    ]
  },
  {
    "name": "Mosharaf Chowdhury",
    "display_name": "Mosharaf Chowdhury",
    "affiliation": "University of Michigan",
    "artifact_count": 4,
    "total_papers": 19,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 3,
      "EUROSYS": 2,
      "ATC": 0,
      "FAST": 1,
      "NSDI": 11
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2021": 1,
        "2024": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2022": 1
      },
      "NSDI": {
        "2021": 1,
        "2017": 1,
        "2024": 1,
        "2019": 1,
        "2023": 2,
        "2012": 1,
        "2016": 1,
        "2020": 2,
        "2022": 1
      }
    },
    "artifact_rate": 21.1,
    "repro_rate": 75.0,
    "functional_rate": 75.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Oobleck: Resilient Distributed Training of Large Models Using Pipeline Templates",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Reducing Energy Bloat in Large Model Training",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Oort: Efficient Federated Learning via Guided Participant Selection",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Managing Memory Tiers with CXL in Virtualized Environments",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dpack efficiencyoriented privacy budget scheduling",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "vulcan automatic query planning for live ml analytics",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "egeria efficient dnn training with knowledgeguided layer freezing",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "zeus understanding and optimizing gpu energy consumption of dnn training",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "modelkeeper accelerating dnn training via automated training warmup",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "adaembed adaptive embedding for largescale recommendation models",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "hydra resilient and highly available remote memory",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "justitia software multitenancy in hardware kernelbypass networks",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "ship compute or ship data why not both",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "sol fast distributed computation over slow networks",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "nearoptimal latency versus cost tradeoffs in geodistributed storage",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "tiresias a gpu cluster manager for distributed deep learning",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "efficient memory disaggregation with infiniswap",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "hug multiresource fairness for correlated and elastic demands",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "resilient distributed datasets a faulttolerant abstraction for inmemory cluster computing",
        "conference": "NSDI",
        "year": 2012
      }
    ],
    "author_id": 218,
    "paper_ids": [
      993,
      1946,
      1947,
      1356
    ],
    "papers_without_artifact_ids": [
      1357,
      1948,
      1949,
      1950,
      1951,
      1952,
      1361,
      1953,
      1011,
      1954,
      1955,
      1956,
      1957,
      502,
      511
    ]
  },
  {
    "name": "Juncheng Yang",
    "display_name": "Juncheng Yang",
    "affiliation": "Harvard University",
    "artifact_count": 4,
    "total_papers": 9,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 2,
      "EUROSYS": 1,
      "FAST": 1,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "OSDI": {
        "2020": 2
      },
      "EUROSYS": {
        "2023": 1
      },
      "FAST": {
        "2023": 1
      },
      "NSDI": {
        "2021": 1,
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 44.4,
    "repro_rate": 75.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "FIFO queues are all you need for cache eviction",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Kangaroo: Caching Billions of Tiny Objects on Flash",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PACEMAKER: Avoiding HeART attacks in storage clusters with disk-adaptive redundancy",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "A large scale analysis of hundreds of in-memory cache clusters at Twitter",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sieve is simpler than lru an efficient turnkey eviction algorithm for web caches",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "frozenhot cache rethinking cache management for modern hardware",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "glcache grouplevel learning for efficient and highperformance caching",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "c2dn how to harness erasure codes at the edge for efficient content delivery",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "segcache a memoryefficient and scalable inmemory keyvalue cache for small objects",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 219,
    "paper_ids": [
      1958,
      1321,
      1324,
      1959
    ],
    "papers_without_artifact_ids": [
      1960,
      1026,
      1961,
      1962,
      1963
    ]
  },
  {
    "name": "Deepak Garg 0001",
    "display_name": "Deepak Garg",
    "affiliation": "Max Planck Society",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 2,
      "EUROSYS": 1,
      "NDSS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "NDSS": {},
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Blueprint: A Toolchain for Highly-Reconfigurable Microservice Applications",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Groundhog: Efficient Request Isolation in FaaS",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CoVault: Secure, Scalable Analytics of Personal Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 220,
    "paper_ids": [
      1964,
      1965,
      1966,
      1967
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonathan Mace",
    "display_name": "Jonathan Mace",
    "affiliation": "Microsoft Research, Redmond, United States of America",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 3,
      "OSDI": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2,
        "2024": 1
      },
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {},
      "NSDI": {
        "2023": 1,
        "2015": 1
      }
    },
    "artifact_rate": 57.1,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Blueprint: A Toolchain for Highly-Reconfigurable Microservice Applications",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Antipode: Enforcing Cross-Service Causal Consistency in Distributed Applications",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Groundhog: Efficient Request Isolation in FaaS",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Serving DNNs like Clockwork: Performance Predictability from the Bottom Up",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "if at first you dont succeed try try again insights and llminformed tooling for detecting retry bugs in software systems",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "the benefit of hindsight tracing edgecases in distributed systems",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "retro targeted resource management in multitenant distributed systems",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 221,
    "paper_ids": [
      1964,
      1968,
      1965,
      1969
    ],
    "papers_without_artifact_ids": [
      1970,
      1971,
      1972
    ]
  },
  {
    "name": "Ningxin Zheng",
    "display_name": "Ningxin Zheng",
    "affiliation": "Microsoft Research, Shanghai, China",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3,
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2022": 1,
        "2024": 1,
        "2023": 1
      },
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 80.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SC",
      "SOSP"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "PIT: Optimization of Dynamic Sparse Deep Learning Models via Permutation Invariant Transformation",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Enable simultaneous DNN services based on deterministic operator overlap and precise latency prediction",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SparTA: Deep-Learning Model Sparsity via Tensor-with-Sparsity-Attribute",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Optimizing Dynamic Neural Networks with Brainstorm",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ladder enabling efficient lowprecision deep learning computing through hardwareaware tensor transformation",
        "conference": "OSDI",
        "year": 2024
      }
    ],
    "author_id": 222,
    "paper_ids": [
      146,
      1084,
      151,
      155
    ],
    "papers_without_artifact_ids": [
      159
    ]
  },
  {
    "name": "Pedro Fonseca 0001",
    "display_name": "Pedro Fonseca",
    "affiliation": "Purdue University",
    "artifact_count": 4,
    "total_papers": 9,
    "total_papers_by_conf": {
      "SOSP": 2,
      "EUROSYS": 4,
      "ATC": 0,
      "USENIXSEC": 1,
      "NSDI": 1,
      "NDSS": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2023": 1,
        "2024": 1,
        "2021": 1
      },
      "ATC": {},
      "USENIXSEC": {
        "2021": 1
      },
      "NSDI": {
        "2009": 1
      },
      "NDSS": {},
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 44.4,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2021,
      2023,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Snowcat: Efficient Kernel Concurrency Testing using a Learned Coverage Predictor",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Snowboard: Finding Kernel Concurrency Bugs through Systematic Inter-thread Communication Analysis",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pegasus: Transparent and Unified Kernel-Bypass Networking for Fast Local and Remote Communication",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pronghorn: Effective Checkpoint Orchestration for Serverless Hot-Starts",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "alwayson recording framework for serverless computations opportunities and challenges",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "an extensible orchestration and protection framework for confidential cloud computing",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "ondemandfork a microsecond fork for memoryintensive and latencysensitive applications",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "shard finegrained kernel specialization with contextaware hardening",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "zeno eventually consistent byzantinefault tolerance",
        "conference": "NSDI",
        "year": 2009
      }
    ],
    "author_id": 151,
    "paper_ids": [
      1973,
      1974,
      1975,
      1976
    ],
    "papers_without_artifact_ids": [
      1977,
      1978,
      1979,
      1980,
      1981
    ]
  },
  {
    "name": "Mathias Lécuyer",
    "display_name": "Mathias Lécuyer",
    "affiliation": "University of British Columbia",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1,
      "USENIXSEC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 80.0,
    "repro_rate": 75.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Turbo: Effective Caching in Differentially-Private Databases",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Cookie Monster: Efficient On-Device Budgeting for Differentially-Private Ad-Measurement Systems",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "NetShaper: A Differentially Private Network Side-Channel Mitigation System",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privacy Budget Scheduling",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dpack efficiencyoriented privacy budget scheduling",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 7911,
    "paper_ids": [
      1352,
      1353,
      1982,
      1354
    ],
    "papers_without_artifact_ids": [
      1357
    ]
  },
  {
    "name": "Rodrigo Rodrigues 0001",
    "display_name": "Rodrigo Rodrigues",
    "affiliation": "Universidade de Lisboa",
    "artifact_count": 4,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 3,
      "USENIXSEC": 1,
      "EUROSYS": 2,
      "ATC": 0,
      "FAST": 1,
      "NSDI": 4,
      "NDSS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 3
      },
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2023": 2
      },
      "ATC": {},
      "FAST": {
        "2012": 1
      },
      "NSDI": {
        "2009": 1,
        "2024": 1,
        "2012": 1,
        "2004": 1
      },
      "NDSS": {},
      "OSDI": {}
    },
    "artifact_rate": 36.4,
    "repro_rate": 25.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Antipode: Enforcing Cross-Service Causal Consistency in Distributed Applications",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "With Great Freedom Comes Great Opportunity: Rethinking Resource Allocation for Serverless Functions",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Mumak: Efficient and Black-Box Bug Detection for Persistent Memory",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CoVault: Secure, Scalable Analytics of Personal Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aleabft practical asynchronous byzantine fault tolerance",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "μ a bolton approach for faster and cheaper serverless computing",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "evicting for the greater good the case for reactive checkpointing in serverless computing",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "shredder gpuaccelerated incremental storage and computation",
        "conference": "FAST",
        "year": 2012
      },
      {
        "title": "orchestrating the deployment of computations in the cloud with conductor",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "zeno eventually consistent byzantinefault tolerance",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "efficient routing for peertopeer overlays",
        "conference": "NSDI",
        "year": 2004
      }
    ],
    "author_id": 225,
    "paper_ids": [
      1968,
      1648,
      1983,
      1967
    ],
    "papers_without_artifact_ids": [
      1984,
      1985,
      1986,
      1987,
      1988,
      1981,
      1989
    ]
  },
  {
    "name": "Natacha Crooks",
    "display_name": "Natacha Crooks",
    "affiliation": "Univ. of California - Berkeley",
    "artifact_count": 4,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 3,
      "EUROSYS": 3,
      "NSDI": 4,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 2,
        "2024": 1
      },
      "EUROSYS": {
        "2023": 2,
        "2024": 1
      },
      "NSDI": {
        "2017": 1,
        "2025": 1,
        "2023": 1,
        "2016": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 36.4,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Basil: Breaking up BFT with ACID (transactions)",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Autobahn: Seamless high speed BFT",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Dissecting BFT Consensus: In Trusted Components we Trust!",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "smart casual verification of the confidential consortium framework",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "bigger not badder safely scaling bft protocols",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "morty scaling concurrency control with reexecution",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "loca a locationoblivious cellular architecture",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "take out the trache maximizing transactional cache hit rate",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "i cant believe its not causal scalable causal consistency with no slowdown cascades",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "scalable and private media consumption with popcorn",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 153,
    "paper_ids": [
      1990,
      668,
      1991,
      1992
    ],
    "papers_without_artifact_ids": [
      1993,
      1994,
      1995,
      1996,
      485,
      1997,
      1998
    ]
  },
  {
    "name": "Jason Nieh",
    "display_name": "Jason Nieh",
    "affiliation": "Columbia University",
    "artifact_count": 4,
    "total_papers": 10,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 6,
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2021": 1,
        "2022": 4,
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {},
      "NSDI": {
        "2004": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Formal Verification of a Multiprocessor Hypervisor on Arm Relaxed Memory Hardware",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Effective Performance Issue Diagnosis with Value-Assisted Cost Profiling",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Design and Verification of the Arm Confidential Compute Architecture",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "spoq scaling machinecheckable systems verification in coq",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "duoai fast automated inference of inductive invariants for verifying distributed protocols",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "upgradvisor early adopting dependency updates using hybrid program analysis and hardware tracing",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "blackbox a container security monitor for protecting containers on untrusted operating systems",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "distai datadriven automated invariant learning for distributed protocols",
        "conference": "OSDI",
        "year": 2021
      },
      {
        "title": "swap a scheduler with automatic process dependency detection",
        "conference": "NSDI",
        "year": 2004
      }
    ],
    "author_id": 155,
    "paper_ids": [
      1999,
      1922,
      2000,
      2001
    ],
    "papers_without_artifact_ids": [
      2002,
      2003,
      2004,
      2005,
      2006,
      2007
    ]
  },
  {
    "name": "Andrea C. Arpaci-Dusseau",
    "display_name": "Andrea C. Arpaci-Dusseau",
    "affiliation": "University of Wisconsin - Madison",
    "artifact_count": 4,
    "total_papers": 50,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1,
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0,
      "FAST": 42,
      "USENIXSEC": 1,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 2
      },
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "SC": {},
      "ATC": {},
      "FAST": {
        "2009": 1,
        "2024": 1,
        "2008": 3,
        "2015": 2,
        "2021": 2,
        "2002": 1,
        "2011": 2,
        "2005": 3,
        "2016": 2,
        "2020": 2,
        "2012": 2,
        "2026": 2,
        "2017": 2,
        "2018": 2,
        "2014": 2,
        "2004": 1,
        "2010": 2,
        "2013": 5,
        "2023": 1,
        "2022": 1,
        "2003": 1,
        "2025": 2
      },
      "USENIXSEC": {
        "2022": 1
      },
      "NSDI": {
        "2025": 1,
        "2004": 1,
        "2011": 1
      }
    },
    "artifact_rate": 8.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Exploiting Nil-Externality for Fast Replicated Storage",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Scale and Performance in a Filesystem Semi-Microkernel",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Revealing the Unstable Foundations of eBPF-Based Kernel Extensions",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "From WiscKey to Bourbon: A Learned Index for Log-Structured Merge Trees",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "getting the most out of your storage hierarchy with mirroroptimized storage tiering",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "cachecentric multiresource allocation for storage services",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "cloudscape a study of storage services in modern cloud architectures",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "fast transparent filesystem microkernel recovery with ananke",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "making serverless payforuse a reality with leopard",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "symbiosis the art of application and kernel cache cooperation",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "madfs perfile virtualization for userspace persistent memory filesystems",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "nyxcache flexible and efficient multitenant persistent memory caching",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "using trātṛ to tame adversarial synchronization",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "the storage hierarchy is not a hierarchy optimizing caching on modern storage devices with orthus",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "scalable persistent memory file system with kerneluserspace collaboration",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "strong and efficient consistency with consistencyaware durability",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "read as needed building wiser a flashoptimized search engine",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "protocolaware recovery for consensusbased storage",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "designing a true directaccess file system with devfs",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "redundancy does not imply fault tolerance analysis of distributed storage reactions to single errors and corruptions",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "application crash consistency and performance with ccfs",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "slacker fast distribution with lazy docker containers",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "wisckey separating keys from values in ssdconscious storage",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "anvil advanced virtualization for modern nonvolatile memory devices",
        "conference": "FAST",
        "year": 2015
      },
      {
        "title": "reducing file system tail latencies with chopper",
        "conference": "FAST",
        "year": 2015
      },
      {
        "title": "analysis of hdfs under hbase a facebook messages case study",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "viewbox integrating local file systems with cloud storage services",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "ffsck the fast file system checker",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "hardfs hardening hdfs with selective and lightweight versioning",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "getting real lessons in transitioning research simulations into hardware systems",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "a study of linux file system evolution",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "warming up storagelevel caches with bonfire",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "deindirection for flashbased ssds with nameless writes",
        "conference": "FAST",
        "year": 2012
      },
      {
        "title": "consistency without ordering",
        "conference": "FAST",
        "year": 2012
      },
      {
        "title": "making the common case the only case with anticipatory memory allocation",
        "conference": "FAST",
        "year": 2011
      },
      {
        "title": "emulating goliath storage systems with david",
        "conference": "FAST",
        "year": 2011
      },
      {
        "title": "fate and destini a framework for cloud recovery testing",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "membrane operating system support for restartable file systems",
        "conference": "FAST",
        "year": 2010
      },
      {
        "title": "endtoend data integrity for file systems a zfs case study",
        "conference": "FAST",
        "year": 2010
      },
      {
        "title": "generating realistic impressions for filesystem benchmarking",
        "conference": "FAST",
        "year": 2009
      },
      {
        "title": "eio error handling is occasionally correct",
        "conference": "FAST",
        "year": 2008
      },
      {
        "title": "parity lost and parity regained",
        "conference": "FAST",
        "year": 2008
      },
      {
        "title": "an analysis of data corruption in the storage stack",
        "conference": "FAST",
        "year": 2008
      },
      {
        "title": "a logic of file systems",
        "conference": "FAST",
        "year": 2005
      },
      {
        "title": "journalguided resynchronization for software raid",
        "conference": "FAST",
        "year": 2005
      },
      {
        "title": "databaseaware semanticallysmart storage",
        "conference": "FAST",
        "year": 2005
      },
      {
        "title": "improving storage system availability with dgraid awarded best student paper",
        "conference": "FAST",
        "year": 2004
      },
      {
        "title": "explicit control in the batchaware distributed file system",
        "conference": "NSDI",
        "year": 2004
      },
      {
        "title": "semanticallysmart disk systems",
        "conference": "FAST",
        "year": 2003
      },
      {
        "title": "storageaware caching revisiting caching for heterogeneous storage systems",
        "conference": "FAST",
        "year": 2002
      }
    ],
    "author_id": 110,
    "paper_ids": [
      1637,
      2008,
      2009,
      1640
    ],
    "papers_without_artifact_ids": [
      2010,
      2011,
      2012,
      2013,
      2014,
      2015,
      2016,
      2017,
      2018,
      1645,
      1070,
      1642,
      2019,
      1643,
      2020,
      1644,
      1646,
      2021,
      2022,
      2023,
      2024,
      2025,
      2026,
      2027,
      2028,
      2029,
      2030,
      2031,
      2032,
      2033,
      2034,
      2035,
      2036,
      2037,
      2038,
      2039,
      2040,
      2041,
      2042,
      2043,
      2044,
      2045,
      2046,
      2047,
      2048,
      2049
    ]
  },
  {
    "name": "Remzi H. Arpaci-Dusseau",
    "display_name": "Remzi H. Arpaci-Dusseau",
    "affiliation": "University of Wisconsin - Madison",
    "artifact_count": 4,
    "total_papers": 50,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1,
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0,
      "FAST": 43,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 2
      },
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "SC": {},
      "ATC": {},
      "FAST": {
        "2009": 1,
        "2024": 1,
        "2008": 3,
        "2015": 2,
        "2021": 2,
        "2002": 1,
        "2011": 2,
        "2005": 3,
        "2016": 2,
        "2020": 2,
        "2012": 2,
        "2026": 2,
        "2017": 2,
        "2018": 2,
        "2014": 2,
        "2004": 1,
        "2010": 2,
        "2013": 5,
        "2023": 1,
        "2022": 2,
        "2003": 1,
        "2025": 2
      },
      "NSDI": {
        "2025": 1,
        "2004": 1,
        "2011": 1
      }
    },
    "artifact_rate": 8.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Exploiting Nil-Externality for Fast Replicated Storage",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Scale and Performance in a Filesystem Semi-Microkernel",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Revealing the Unstable Foundations of eBPF-Based Kernel Extensions",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "From WiscKey to Bourbon: A Learned Index for Log-Structured Merge Trees",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "getting the most out of your storage hierarchy with mirroroptimized storage tiering",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "cachecentric multiresource allocation for storage services",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "cloudscape a study of storage services in modern cloud architectures",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "fast transparent filesystem microkernel recovery with ananke",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "making serverless payforuse a reality with leopard",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "symbiosis the art of application and kernel cache cooperation",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "madfs perfile virtualization for userspace persistent memory filesystems",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "25 years of storage research and education a retrospective",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "nyxcache flexible and efficient multitenant persistent memory caching",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "the storage hierarchy is not a hierarchy optimizing caching on modern storage devices with orthus",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "scalable persistent memory file system with kerneluserspace collaboration",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "strong and efficient consistency with consistencyaware durability",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "read as needed building wiser a flashoptimized search engine",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "protocolaware recovery for consensusbased storage",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "designing a true directaccess file system with devfs",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "redundancy does not imply fault tolerance analysis of distributed storage reactions to single errors and corruptions",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "application crash consistency and performance with ccfs",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "slacker fast distribution with lazy docker containers",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "wisckey separating keys from values in ssdconscious storage",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "anvil advanced virtualization for modern nonvolatile memory devices",
        "conference": "FAST",
        "year": 2015
      },
      {
        "title": "reducing file system tail latencies with chopper",
        "conference": "FAST",
        "year": 2015
      },
      {
        "title": "analysis of hdfs under hbase a facebook messages case study",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "viewbox integrating local file systems with cloud storage services",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "ffsck the fast file system checker",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "hardfs hardening hdfs with selective and lightweight versioning",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "getting real lessons in transitioning research simulations into hardware systems",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "a study of linux file system evolution",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "warming up storagelevel caches with bonfire",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "deindirection for flashbased ssds with nameless writes",
        "conference": "FAST",
        "year": 2012
      },
      {
        "title": "consistency without ordering",
        "conference": "FAST",
        "year": 2012
      },
      {
        "title": "making the common case the only case with anticipatory memory allocation",
        "conference": "FAST",
        "year": 2011
      },
      {
        "title": "emulating goliath storage systems with david",
        "conference": "FAST",
        "year": 2011
      },
      {
        "title": "fate and destini a framework for cloud recovery testing",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "membrane operating system support for restartable file systems",
        "conference": "FAST",
        "year": 2010
      },
      {
        "title": "endtoend data integrity for file systems a zfs case study",
        "conference": "FAST",
        "year": 2010
      },
      {
        "title": "generating realistic impressions for filesystem benchmarking",
        "conference": "FAST",
        "year": 2009
      },
      {
        "title": "eio error handling is occasionally correct",
        "conference": "FAST",
        "year": 2008
      },
      {
        "title": "parity lost and parity regained",
        "conference": "FAST",
        "year": 2008
      },
      {
        "title": "an analysis of data corruption in the storage stack",
        "conference": "FAST",
        "year": 2008
      },
      {
        "title": "a logic of file systems",
        "conference": "FAST",
        "year": 2005
      },
      {
        "title": "journalguided resynchronization for software raid",
        "conference": "FAST",
        "year": 2005
      },
      {
        "title": "databaseaware semanticallysmart storage",
        "conference": "FAST",
        "year": 2005
      },
      {
        "title": "improving storage system availability with dgraid awarded best student paper",
        "conference": "FAST",
        "year": 2004
      },
      {
        "title": "explicit control in the batchaware distributed file system",
        "conference": "NSDI",
        "year": 2004
      },
      {
        "title": "semanticallysmart disk systems",
        "conference": "FAST",
        "year": 2003
      },
      {
        "title": "storageaware caching revisiting caching for heterogeneous storage systems",
        "conference": "FAST",
        "year": 2002
      }
    ],
    "author_id": 111,
    "paper_ids": [
      1637,
      2008,
      2009,
      1640
    ],
    "papers_without_artifact_ids": [
      2010,
      2011,
      2012,
      2013,
      2014,
      2015,
      2016,
      2050,
      2017,
      1645,
      1070,
      1642,
      2019,
      1643,
      2020,
      1644,
      1646,
      2021,
      2022,
      2023,
      2024,
      2025,
      2026,
      2027,
      2028,
      2029,
      2030,
      2031,
      2032,
      2033,
      2034,
      2035,
      2036,
      2037,
      2038,
      2039,
      2040,
      2041,
      2042,
      2043,
      2044,
      2045,
      2046,
      2047,
      2048,
      2049
    ]
  },
  {
    "name": "Emmett Witchel",
    "display_name": "Emmett Witchel",
    "affiliation": "University of Texas at Austin",
    "artifact_count": 4,
    "total_papers": 8,
    "total_papers_by_conf": {
      "SOSP": 3,
      "OSDI": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "USENIXSEC": 0,
      "NSDI": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 2,
        "2024": 1
      },
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {},
      "USENIXSEC": {},
      "NSDI": {
        "2010": 1,
        "2016": 1,
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "LineFS: Efficient SmartNIC Offload of a Distributed File System with Pipeline Parallelism",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Boki: Stateful Serverless Computing with Shared Logs",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Impeller: Stream Processing on Shared Logs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Assise: Performance and Availability via Client-local NVM in a Distributed File System",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lupin tolerating partial failures in a cxl pod",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "telekine secure computing with cloud gpus",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "earp principled storage sharing and protection for mobile apps",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "airavat security and privacy for mapreduce",
        "conference": "NSDI",
        "year": 2010
      }
    ],
    "author_id": 157,
    "paper_ids": [
      344,
      2051,
      2052,
      352
    ],
    "papers_without_artifact_ids": [
      2053,
      2054,
      358,
      1848
    ]
  },
  {
    "name": "Jianyu Jiang",
    "display_name": "Jianyu Jiang",
    "affiliation": "Huawei Technologies Co.",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ACSAC": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "ACSAC": {
        "2017": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 75.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "ATC",
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2017,
      2021,
      2022
    ],
    "year_range": "2017-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Achieving low tail-latency and high scalability for serializable transactions in edge computing",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SOTER: Guarding Black-box Inference for General Neural Networks at the Edge",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 231,
    "paper_ids": [
      1658,
      1604,
      770,
      1660
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Athanasios Xygkis",
    "display_name": "Athanasios Xygkis",
    "affiliation": "Oracle Labs, Zürich, CH",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 2,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1,
        "2020": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 75.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2022,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "SWARM: Replicating Shared Disaggregated-Memory Data in No Time",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "uKharon: A Membership Service for Microsecond Applications",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DSig: Breaking the Barrier of Signatures in Data Centers",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Microsecond Consensus for Microsecond Applications",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 234,
    "paper_ids": [
      1378,
      1380,
      1382,
      1383
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peng Sun 0006",
    "display_name": "Peng Sun",
    "affiliation": "Nanjing University",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 2,
      "ATC": 1,
      "SC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1,
        "2023": 1
      },
      "ATC": {
        "2022": 1
      },
      "SC": {
        "2021": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SC",
      "SOSP"
    ],
    "years": [
      2021,
      2022,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "LoongServe: Efficiently Serving Long-Context Large Language Models with Elastic Sequence Parallelism",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Characterization and prediction of deep learning workloads in large-scale GPU datacenters",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Primo: Practical Learning-Augmented Systems with Interpretable Models",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "dLoRA: Dynamically Orchestrating Requests and Adapters for LoRA LLM Serving",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "characterization of large language model development in the datacenter",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "hydro surrogatebased hyperparameter tuning service in datacenters",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 235,
    "paper_ids": [
      995,
      730,
      731,
      997
    ],
    "papers_without_artifact_ids": [
      741,
      744
    ]
  },
  {
    "name": "Andrea Lattuada 0001",
    "display_name": "Andrea Lattuada",
    "affiliation": "University of Kentucky",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1,
        "2023": 1,
        "2020": 1
      },
      "NSDI": {
        "2018": 1
      }
    },
    "artifact_rate": 80.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Verus: A Practical Foundation for Systems Verification",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Anvil: Verifying Liveness of Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Sharding the State Machine: Automated Modular Reasoning for Complex Concurrent Systems",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Storage Systems are Distributed Systems (So Verify Them That Way!)",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "snailtrail generalizing critical paths for online analysis of distributed dataflows",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 237,
    "paper_ids": [
      715,
      622,
      721,
      722
    ],
    "papers_without_artifact_ids": [
      2055
    ]
  },
  {
    "name": "Jay Bosamiya",
    "display_name": "Jay Bosamiya",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 3,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "USENIXSEC": {
        "2022": 1,
        "2025": 2
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 80.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Verus: A Practical Foundation for Systems Verification",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Provably-Safe Multilingual Software Sandboxing using WebAssembly",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TRex: Practical Type Reconstruction for Binary Code",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Vest: Verified, Secure, High-Performance Parsing and Serialization for Rust",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "caps smoothly transitioning to a more resilient web pki",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 238,
    "paper_ids": [
      715,
      716,
      719,
      720
    ],
    "papers_without_artifact_ids": [
      727
    ]
  },
  {
    "name": "Tej Chajed",
    "display_name": "Tej Chajed",
    "affiliation": "University of Wisconsin - Madison",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 4,
      "ATC": 0,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2021": 1,
        "2022": 1,
        "2024": 2
      },
      "ATC": {},
      "USENIXSEC": {}
    },
    "artifact_rate": 80.0,
    "repro_rate": 75.0,
    "functional_rate": 75.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2022,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Verus: A Practical Foundation for Systems Verification",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "GoJournal: a verified, concurrent, crash-safe journaling system",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Verifying the DaisyNFS concurrent and crash-safe file system with sequential reasoning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Anvil: Verifying Liveness of Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "inductive invariants that spark joy using invariant taxonomies to streamline distributed protocol proofs",
        "conference": "OSDI",
        "year": 2024
      }
    ],
    "author_id": 160,
    "paper_ids": [
      715,
      983,
      984,
      622
    ],
    "papers_without_artifact_ids": [
      723
    ]
  },
  {
    "name": "Chris Hawblitzel",
    "display_name": "Chris Hawblitzel",
    "affiliation": "Microsoft Research, Redmond, WA, USA",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3,
      "SC": 0,
      "EUROSYS": 0,
      "ATC": 0,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1,
        "2023": 1,
        "2020": 1
      },
      "SC": {},
      "EUROSYS": {},
      "ATC": {},
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 75.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Verus: A Practical Foundation for Systems Verification",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "VeriSMo: A Verified Security Module for Confidential VMs",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Sharding the State Machine: Automated Modular Reasoning for Complex Concurrent Systems",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Storage Systems are Distributed Systems (So Verify Them That Way!)",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 161,
    "paper_ids": [
      715,
      2056,
      721,
      722
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jon Howell",
    "display_name": "Jon Howell",
    "affiliation": "VMware Research, Bellevue, WA, US",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1,
        "2023": 1,
        "2020": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2013": 1,
        "2010": 2
      }
    },
    "artifact_rate": 57.1,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Verus: A Practical Foundation for Systems Verification",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Anvil: Verifying Liveness of Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Sharding the State Machine: Automated Modular Reasoning for Complex Concurrent Systems",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Storage Systems are Distributed Systems (So Verify Them That Way!)",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "embassies radically refactoring the web",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "mugshot deterministic capture and replay for javascript applications",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "crom faster web browsing using speculative execution",
        "conference": "NSDI",
        "year": 2010
      }
    ],
    "author_id": 239,
    "paper_ids": [
      715,
      622,
      721,
      722
    ],
    "papers_without_artifact_ids": [
      729,
      2057,
      2058
    ]
  },
  {
    "name": "Boyuan Feng",
    "display_name": "Boyuan Feng",
    "affiliation": "University of California, Santa Barbara",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SC": 1,
      "OSDI": 2,
      "ATC": 3
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "OSDI": {
        "2021": 1,
        "2023": 1
      },
      "ATC": {
        "2022": 1,
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SC"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "APNN-TC: accelerating arbitrary precision neural networks on ampere GPU tensor cores",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Faith: An Efficient Framework for Transformer Verification on GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TC-GNN: Bridging Sparse GNN Computation and Dense Tensor Cores on GPUs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "GNNAdvisor: An Adaptive and Efficient Runtime System for GNN Acceleration on GPUs",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oper optimalityguided embedding table parallelization for largescale recommendation model",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "mgg accelerating graph neural networks with finegrained intrakernel communicationcomputation pipelining on multigpu platforms",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 240,
    "paper_ids": [
      1674,
      1675,
      1676,
      1677
    ],
    "papers_without_artifact_ids": [
      1678,
      1679
    ]
  },
  {
    "name": "Yuke Wang",
    "display_name": "Yuke Wang",
    "affiliation": "Rice University",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SC": 1,
      "OSDI": 2,
      "ATC": 3,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "OSDI": {
        "2021": 1,
        "2023": 1
      },
      "ATC": {
        "2022": 1,
        "2024": 1,
        "2023": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SC"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "APNN-TC: accelerating arbitrary precision neural networks on ampere GPU tensor cores",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Faith: An Efficient Framework for Transformer Verification on GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TC-GNN: Bridging Sparse GNN Computation and Dense Tensor Cores on GPUs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "GNNAdvisor: An Adaptive and Efficient Runtime System for GNN Acceleration on GPUs",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oper optimalityguided embedding table parallelization for largescale recommendation model",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "mgg accelerating graph neural networks with finegrained intrakernel communicationcomputation pipelining on multigpu platforms",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 241,
    "paper_ids": [
      1674,
      1675,
      1676,
      1677
    ],
    "papers_without_artifact_ids": [
      1678,
      1679
    ]
  },
  {
    "name": "Wen Xia",
    "display_name": "Wen Xia",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 4,
    "total_papers": 9,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 2,
      "FAST": 5,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 2
      },
      "ATC": {
        "2022": 1,
        "2023": 1
      },
      "FAST": {
        "2015": 1,
        "2021": 1,
        "2026": 1,
        "2019": 1,
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 44.4,
    "repro_rate": 25.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Garbage Collection Does Not Only Collect Garbage: Piggybacking-Style Defragmentation for Deduplicated Backup Storage",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Overcoming the Last Mile between Log-Structured File Systems and Persistent Memory via Scatter Logging",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Building a High-performance Fine-grained Deduplication Framework for Backup Storage with High Deduplication Ratio",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Light-Dedup: A Light-weight Inline Deduplication Framework for Non-Volatile Memory File Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards condensed and efficient readonly file system via sortenhanced compression",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "dont maintain twice its alright merged metadata management in deduplication file system with gogetafs",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "the dilemma between deduplication and locality can both be achieved",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "finesse finegrained feature locality based fast resemblance detection for postdeduplication delta compression",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "design tradeoffs for data deduplication performance in backup workloads",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 114,
    "paper_ids": [
      2059,
      2060,
      2061,
      2062
    ],
    "papers_without_artifact_ids": [
      2063,
      2064,
      2065,
      2066,
      2067
    ]
  },
  {
    "name": "Gennady Pekhimenko",
    "display_name": "Gennady Pekhimenko",
    "affiliation": "University of Toronto",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 2,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      },
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Mist: Efficient Distributed Training of Large Language Models via Memory-Parallelism Co-Optimization",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Minuet: Accelerating 3D Sparse Convolutions on GPUs",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Arbitor: A Numerically Accurate Hardware Emulation Tool for DNN Accelerators",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ROLLER: Fast and Efficient Tensor Compilation for Deep Learning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 243,
    "paper_ids": [
      2068,
      2069,
      2070,
      150
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sungjin Lee 0001",
    "display_name": "Sungjin Lee",
    "affiliation": "POSTECH",
    "artifact_count": 4,
    "total_papers": 14,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 3,
      "ATC": 1,
      "FAST": 9
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2023": 1,
        "2024": 1
      },
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2024": 1,
        "2016": 1,
        "2012": 1,
        "2026": 1,
        "2018": 1,
        "2014": 1,
        "2023": 1,
        "2022": 1,
        "2019": 1
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2023,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Solid State Drive Targeted Memory-Efficient Indexing for Universal I/O Patterns and Fragmentation Degrees",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "All-Flash Array Key-Value Cache for Large Objects",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Overcoming the Memory Wall with CXL-Enabled SSDs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Modernizing File System through In-Storage Indexing",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dogi data placement with oracleguided insights for logstructured systems",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "scalecache a scalable page cache for multiple solidstate drives",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "midas minimizing write amplification in logstructured systems through adaptive group number and size configuration",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "integrated hostssd mapping table management for improving user experience of smartphones",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "deepsketch a new machine learningbased reference search technique for postdeduplication delta compression",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "fully automatic stream management for multistreamed ssds using program contexts",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "rflush rethink the flush",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "applicationmanaged flash",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "lifetime improvement of nand flashbased storage systems using dynamic program and erase scaling",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "lifetime management of flashbased ssds using recoveryaware dynamic throttling",
        "conference": "FAST",
        "year": 2012
      }
    ],
    "author_id": 166,
    "paper_ids": [
      2071,
      2072,
      2073,
      2074
    ],
    "papers_without_artifact_ids": [
      2075,
      2076,
      2077,
      2078,
      2079,
      2080,
      2081,
      2082,
      2083,
      2084
    ]
  },
  {
    "name": "Jiesheng Wu",
    "display_name": "Jiesheng Wu",
    "affiliation": "Alibaba Group",
    "artifact_count": 4,
    "total_papers": 16,
    "total_papers_by_conf": {
      "OSDI": 3,
      "EUROSYS": 2,
      "ATC": 2,
      "SOSP": 1,
      "SC": 0,
      "FAST": 7,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 2,
        "2023": 1
      },
      "EUROSYS": {
        "2023": 1,
        "2024": 1
      },
      "ATC": {
        "2022": 1,
        "2023": 1
      },
      "SOSP": {
        "2023": 1
      },
      "SC": {},
      "FAST": {
        "2024": 1,
        "2026": 2,
        "2023": 4
      },
      "NSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "LogGrep: Fast and Cheap Cloud Log Storage by Exploiting both Static and Runtime Patterns",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CSAL: the Next-Gen Local Disks for the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "NVMe SSD Failures in the Field: the Fail-Stop and the Fail-Slow",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DRust: Language-Guided Distributed Shared Memory with Fine Granularity, Full Transparency, and Ultra Efficiency",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "here there and everywhere the past the present and the future of local storage in cloud",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "how soon is now preloading images for virtual disks with thinkahead",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "whats the story in ebs glory evolutions and lessons in building cloud block store",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "ransom access memories achieving practical ransomware protection in cloud with deftpunk",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "deploying userspace tcp at cloud scale with luna",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "perseus a failslow detection framework for cloud storage systems",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "more than capacity performanceoriented evolution of pangu in alibaba",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "fisc a largescale cloudnativeoriented file system",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "smrstore a storage engine for cloud object storage on hmsmr drives",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "flor an open high performance rdma framework over heterogeneous rnics",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "understanding silent data corruptions in a large production cpu population",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "when cloud storage meets rdma",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 244,
    "paper_ids": [
      2085,
      2086,
      2087,
      2088
    ],
    "papers_without_artifact_ids": [
      2089,
      2090,
      2091,
      2092,
      2093,
      1062,
      1063,
      1064,
      2094,
      1065,
      2095,
      2096
    ]
  },
  {
    "name": "Jidong Zhai",
    "display_name": "Jidong Zhai",
    "affiliation": "Tsinghua University",
    "artifact_count": 4,
    "total_papers": 9,
    "total_papers_by_conf": {
      "OSDI": 3,
      "EUROSYS": 1,
      "ATC": 3,
      "SOSP": 0,
      "SC": 0,
      "FAST": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2023": 2
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2024": 2,
        "2023": 1
      },
      "SOSP": {},
      "SC": {},
      "FAST": {
        "2019": 1
      },
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 44.4,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "WiseGraph: Optimizing GNN with Joint Workload Partition of Graph and Operations",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PUZZLE: Efficiently Aligning Large Language Models through Light-Weight Context Switch",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PET: Optimizing Tensor Programs with Partially Equivalent Transformations and Automated Corrections",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "EINNET: Optimizing Tensor Programs with Derivation-Based Transformations",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "magpy compiling eager mode dnn programs by monitoring execution states",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "smartmoe efficiently training sparselyactivated models through combining offline and online parallelization",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "cocktailer analyzing and optimizing dynamic control flow in deep learning",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "automatic applicationaware io forwarding resource allocation",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "endtoend io monitoring on a leading supercomputer",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 246,
    "paper_ids": [
      2097,
      2098,
      1616,
      1619
    ],
    "papers_without_artifact_ids": [
      2099,
      2100,
      162,
      2101,
      2102
    ]
  },
  {
    "name": "Hong Jiang 0001",
    "display_name": "Hong Jiang",
    "affiliation": "University of Texas at Arlington",
    "artifact_count": 4,
    "total_papers": 14,
    "total_papers_by_conf": {
      "EUROSYS": 5,
      "ATC": 2,
      "SC": 0,
      "FAST": 7
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2021": 1,
        "2022": 3
      },
      "ATC": {
        "2022": 1,
        "2023": 1
      },
      "SC": {},
      "FAST": {
        "2009": 1,
        "2021": 1,
        "2020": 1,
        "2026": 1,
        "2007": 1,
        "2019": 1,
        "2025": 1
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "FLOWS: Balanced MRC Profiling for Heterogeneous Object-Size Cache",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Improving scalability of database systems by reshaping user parallel I/O",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Characterizing the performance of intel optane persistent memory: a close look at its on-DIMM buffering",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "StRAID: Stripe-threaded Architecture for Parity-based RAIDs with Ultra-fast SSDs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rearchitecting buffered io in the era of highbandwidth ssds",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "rethinking the requesttoio transformation process of file systems for full utilization of highbandwidth ssds",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "loopdelta embedding localityaware opportunistic delta compression in inline deduplication for highly efficient data reduction",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "p",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "chameleondb a keyvalue store for optane persistent memory",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "remapssd safely and efficiently exploiting ssd address remapping to eliminate duplicate writes",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "bcw buffercontrolled writes to hdds for ssdhdd hybrid storage server",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "finesse finegrained feature locality based fast resemblance detection for postdeduplication delta compression",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "workout io workload outsourcing for boosting raid reconstruction performance",
        "conference": "FAST",
        "year": 2009
      },
      {
        "title": "pro a popularitybased multithreaded reconstruction optimization for raidstructured storage systems",
        "conference": "FAST",
        "year": 2007
      }
    ],
    "author_id": 169,
    "paper_ids": [
      2103,
      2104,
      2105,
      2106
    ],
    "papers_without_artifact_ids": [
      2107,
      2108,
      2109,
      2110,
      2111,
      2112,
      2113,
      2066,
      2114,
      2115
    ]
  },
  {
    "name": "Danyang Zhuo",
    "display_name": "Danyang Zhuo",
    "affiliation": "Duke University",
    "artifact_count": 4,
    "total_papers": 15,
    "total_papers_by_conf": {
      "OSDI": 3,
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "FAST": 1,
      "NSDI": 9
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2024": 1,
        "2020": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "FAST": {
        "2021": 1
      },
      "NSDI": {
        "2017": 1,
        "2024": 1,
        "2019": 1,
        "2025": 1,
        "2023": 2,
        "2020": 1,
        "2022": 2
      }
    },
    "artifact_rate": 26.7,
    "repro_rate": 25.0,
    "functional_rate": 75.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enoki: High Velocity Linux Kernel Scheduler Development",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Remote Direct Memory Introspection",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fairness in Serving Large Language Models",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Ansor: Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "highlevel programming for application networks",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "harmonic hardwareassisted rdma performance isolation for public clouds",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "understanding rdma microarchitecture resources for performance isolation",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "remote procedure call as a managed system service",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "nethint whitebox networking for multitenant data centers",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "collie finding performance anomalies in rdma subsystems",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "alpa automating inter and intraoperator parallelism for distributed deep learning",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "high velocity kernel file systems with bento",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "automated verification of customizable middlebox properties with gravel",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "slim os kernel support for a lowoverhead container overlay network",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "rail a case for redundant arrays of inexpensive links in data center networks",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 248,
    "paper_ids": [
      695,
      699,
      469,
      472
    ],
    "papers_without_artifact_ids": [
      2116,
      2117,
      2118,
      2119,
      486,
      2120,
      488,
      707,
      2121,
      2122,
      2123
    ]
  },
  {
    "name": "Siddhartha Sen 0001",
    "display_name": "Siddhartha Sen",
    "affiliation": "IIT Bombay",
    "artifact_count": 4,
    "total_papers": 11,
    "total_papers_by_conf": {
      "OSDI": 3,
      "EUROSYS": 4,
      "ATC": 0,
      "NSDI": 4
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1,
        "2020": 2
      },
      "EUROSYS": {
        "2024": 1,
        "2021": 2,
        "2022": 1
      },
      "ATC": {},
      "NSDI": {
        "2021": 1,
        "2014": 1,
        "2010": 1,
        "2012": 1
      }
    },
    "artifact_rate": 36.4,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2020,
      2021,
      2022,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "TraceUpscaler: Upscaling Traces to Evaluate Systems at High Load",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TraceSplitter: a new paradigm for downscaling traces",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rolis: a software approach to efficiently replicating multi-core transactions",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Performance-Optimal Read-Only Transactions",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ncc natural concurrency control for strictly serializable datastores by avoiding the timestampinversion pitfall",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "smartharvest harvesting idle cpus safely and efficiently in the cloud",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "sensei aligning video streaming quality with dynamic user sensitivity",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "tolerating slowdowns in replicated state machines using copilots",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "aggregation and degradation in jetstream streaming analytics in the wide area",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "dont lose sleep over availability the greenup decentralized wakeup service",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "prophecy using history for highthroughput fault tolerance",
        "conference": "NSDI",
        "year": 2010
      }
    ],
    "author_id": 249,
    "paper_ids": [
      2124,
      2125,
      1075,
      2126
    ],
    "papers_without_artifact_ids": [
      2127,
      2128,
      2129,
      2130,
      2131,
      2132,
      2133
    ]
  },
  {
    "name": "Pramod Bhatotia",
    "display_name": "Pramod Bhatotia",
    "affiliation": "TU Munich",
    "artifact_count": 4,
    "total_papers": 8,
    "total_papers_by_conf": {
      "EUROSYS": 3,
      "ATC": 1,
      "SC": 0,
      "FAST": 3,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1,
        "2022": 2
      },
      "ATC": {
        "2024": 1
      },
      "SC": {},
      "FAST": {
        "2012": 1,
        "2026": 1,
        "2019": 1
      },
      "NSDI": {
        "2012": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2021,
      2022,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "rkt-io: a direct I/O stack for shielded execution",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "VMSH: hypervisor-agnostic guest overlays for VMs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SafePM: a sanitizer for persistent memory",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "vFPIO: A Virtual I/O Abstraction for FPGA-accelerated I/O Devices",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ucache a customizable unikernelbased io cache",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "speicher securing lsmbased keyvalue stores using shielded execution",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "shredder gpuaccelerated incremental storage and computation",
        "conference": "FAST",
        "year": 2012
      },
      {
        "title": "orchestrating the deployment of computations in the cloud with conductor",
        "conference": "NSDI",
        "year": 2012
      }
    ],
    "author_id": 170,
    "paper_ids": [
      1386,
      2134,
      2135,
      2136
    ],
    "papers_without_artifact_ids": [
      2137,
      2138,
      1987,
      1988
    ]
  },
  {
    "name": "Hani Jamjoom",
    "display_name": "Hani Jamjoom",
    "affiliation": "IBM Research",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "EUROSYS": 2,
      "ATC": 1,
      "SOSP": 0,
      "NSDI": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1,
        "2021": 1
      },
      "ATC": {
        "2024": 1
      },
      "SOSP": {},
      "NSDI": {
        "2013": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 57.1,
    "repro_rate": 25.0,
    "functional_rate": 75.0,
    "category": "both",
    "conferences": [
      "ATC",
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fast (Trapless) Kernel Probes Everywhere",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SeaK: Rethinking the Design of a Secure Allocator for OS Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deta minimizing data leaks in federated learning via decentralized and trustworthy aggregation",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "gnnic finding longlost sibling functions with abstract similarity",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "splitmerge system support for elastic execution in virtual middleboxes",
        "conference": "NSDI",
        "year": 2013
      }
    ],
    "author_id": 250,
    "paper_ids": [
      2139,
      620,
      933,
      1191
    ],
    "papers_without_artifact_ids": [
      2140,
      2141,
      2142
    ]
  },
  {
    "name": "Wenbo Shen",
    "display_name": "Wenbo Shen",
    "affiliation": "Zhejiang University",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "EUROSYS": 1,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 3,
        "2025": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 57.1,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "OPEC: operation-based security isolation for bare-metal embedded systems",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "attacks are forwarded breaking the isolation of microvmbased containers through operation forwarding",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "demystifying pointer authentication on apple m1",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "a hybrid alias analysis and its application to global variable protection in the linux kernel",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 251,
    "paper_ids": [
      295,
      296,
      686,
      689
    ],
    "papers_without_artifact_ids": [
      2143,
      320,
      2144
    ]
  },
  {
    "name": "Wenyuan Yu",
    "display_name": "Wenyuan Yu",
    "affiliation": "Alibaba Group",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "EUROSYS": 3,
      "ATC": 3,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2021": 1,
        "2022": 1
      },
      "ATC": {
        "2023": 3
      },
      "SOSP": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "GNNLab: a factored system for sample-based GNN training over GPUs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Bridging the Gap between Relational OLTP and Graph-based OLAP",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Legion: Automatically Pushing the Envelope of Multi-GPU System for Billion-Scale GNN Training",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "GLogS: Interactive Graph Pattern Matching Query At Large Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "moko marrying python with big data systems",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "flexgraph a flexible and efficient distributed framework for gnn training",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 252,
    "paper_ids": [
      1316,
      37,
      2145,
      2146
    ],
    "papers_without_artifact_ids": [
      2147,
      1318
    ]
  },
  {
    "name": "Jingren Zhou 0001",
    "display_name": "Jingren Zhou",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 4,
    "total_papers": 10,
    "total_papers_by_conf": {
      "EUROSYS": 3,
      "ATC": 3,
      "SOSP": 0,
      "NSDI": 4,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2021": 1,
        "2022": 1
      },
      "ATC": {
        "2023": 3
      },
      "SOSP": {},
      "NSDI": {
        "2021": 1,
        "2012": 2,
        "2016": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "GNNLab: a factored system for sample-based GNN training over GPUs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Bridging the Gap between Relational OLTP and Graph-based OLAP",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Legion: Automatically Pushing the Envelope of Multi-GPU System for Billion-Scale GNN Training",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "GLogS: Interactive Graph Pattern Matching Query At Large Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "moko marrying python with big data systems",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "flexgraph a flexible and efficient distributed framework for gnn training",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "gaia a system for interactive analysis on distributed graphs using a highlevel language",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "streamscope continuous reliable distributed processing of big data streams",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "reoptimizing data parallel computing",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "optimizing data shuffling in dataparallel computation by understanding userdefined functions",
        "conference": "NSDI",
        "year": 2012
      }
    ],
    "author_id": 253,
    "paper_ids": [
      1316,
      37,
      2145,
      2146
    ],
    "papers_without_artifact_ids": [
      2147,
      1318,
      2148,
      292,
      512,
      293
    ]
  },
  {
    "name": "Adrian Dabrowski",
    "display_name": "Adrian Dabrowski",
    "affiliation": "University of California",
    "artifact_count": 4,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "EUROSYS": 1,
      "ACSAC": 1,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 3,
        "2025": 1,
        "2021": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "ACSAC": {
        "2017": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 25.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PKRU-safe: automatically locking down the heap between safe and unsafe languages",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi Deployments",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AirTag-Facilitated Stalking Protection: Evaluating Unwanted Tracking Notifications and Tracker Locating Features",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "to cloud or not to cloud a qualitative study on selfhosters motivation operation and security mindset",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "investigating verification behavior and perceptions of visual digital certificates",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "on the usability of authenticity checks for hardware security tokens",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "grid shock coordinated loadchanging attacks on power grids the nonsmart power grid is vulnerable to cyber attacks as well",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 255,
    "paper_ids": [
      2149,
      2150,
      2151,
      1831
    ],
    "papers_without_artifact_ids": [
      1832,
      1833,
      1837,
      2152
    ]
  },
  {
    "name": "Qing Wang 0031",
    "display_name": "Qing Wang",
    "affiliation": "Nanjing University",
    "artifact_count": 4,
    "total_papers": 14,
    "total_papers_by_conf": {
      "OSDI": 2,
      "ATC": 3,
      "EUROSYS": 2,
      "FAST": 6,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2023": 1
      },
      "ATC": {
        "2022": 2,
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2022": 1
      },
      "FAST": {
        "2024": 1,
        "2021": 1,
        "2026": 1,
        "2023": 2,
        "2025": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "AlNiCo: SmartNIC-accelerated Contention-aware Request Scheduling for Transaction Processing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pacman: An Efficient Compaction Approach for Log-Structured Key-Value Store on Persistent Memory",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Revisiting Secondary Indexing in LSM-based Storage Systems with Persistent Memory",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Nap: A Black-Box Approach to NUMA-Aware Persistent Memory Indexes",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "costefficient archive cloud storage with tape design and deployment",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "deft a scalable tree index for disaggregated memory",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "shiftlock mitigate onesided rdma lock contention via handover",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "achieving wirelatency storage systems by exploiting hardware acks",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "term extending rdmaattached memory with ssd",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "patronus highperformance and protective remote memory",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "citron distributed range lock management with onesided rdma",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "replicating persistent memory keyvalue stores with efficient rdma abstraction",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "fleche an efficient gpu embedding cache for personalized recommendations",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "concordia distributed shared memory with innetwork cache coherence",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 116,
    "paper_ids": [
      1037,
      1038,
      1041,
      1042
    ],
    "papers_without_artifact_ids": [
      1048,
      1052,
      1053,
      1054,
      1056,
      1059,
      1060,
      1066,
      1067,
      1069
    ]
  },
  {
    "name": "Fengwei Zhang",
    "display_name": "Fengwei Zhang",
    "affiliation": "SUSTech",
    "artifact_count": 4,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 2,
      "ATC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "ACSAC": {
        "2019": 1,
        "2017": 1
      },
      "ATC": {
        "2022": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 25.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2022,
      2024,
      2025
    ],
    "year_range": "2019-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SOTER: Guarding Black-box Inference for General Neural Networks at the Edge",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MOAT: Towards Safe BPF Kernel Extension",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TETD: Trusted Execution in Trust Domains",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scrutinizer towards secure forensics on compromised trustzone",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "cage complementing arm cca with gpu extensions",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "shelter extending arm cca with isolation in user space",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "supporting transparent snapshot for baremetal malware analysis on mobile devices",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 257,
    "paper_ids": [
      770,
      1659,
      944,
      2153
    ],
    "papers_without_artifact_ids": [
      776,
      2154,
      784,
      943
    ]
  },
  {
    "name": "Taejoong Chung",
    "display_name": "Taejoong Chung",
    "affiliation": "Virginia Tech",
    "artifact_count": 4,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 1,
      "ATC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2023": 1
      },
      "ATC": {
        "2024": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 75.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "mmTLS: Scaling the Performance of Encrypted Network Traffic Inspection",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SPF Beyond the Standard: Management and Operational Challenges in Practice and Practical Recommendations",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improv measurement and practical mitigation of collateral damage in rpki route origin validation",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "irredicator pruning irr with rpkivalid bgp insights",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "youve got report measurement and security implications of dmarc reporting",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "under the hood of dane mismanagement in smtp",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 258,
    "paper_ids": [
      2155,
      2156,
      2157,
      2158
    ],
    "papers_without_artifact_ids": [
      2159,
      2160,
      2161,
      2162
    ]
  },
  {
    "name": "Gang Tan",
    "display_name": "Gang Tan",
    "affiliation": "Pennsylvania State University",
    "artifact_count": 4,
    "total_papers": 9,
    "total_papers_by_conf": {
      "PETS": 1,
      "OSDI": 1,
      "ACSAC": 4,
      "EUROSYS": 1,
      "ATC": 0,
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "OSDI": {
        "2022": 1
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1,
        "2019": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {},
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 44.4,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "OSDI",
      "PETS"
    ],
    "years": [
      2021,
      2022,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ReCFA: Resilient Control-Flow Attestation",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Building a Privacy-Preserving Smart Camera System",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "KSplit: Automating Device Driver Isolation",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oranalyst systematic testing framework for open ran implementations",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "libscan towards more precise thirdparty library identification for android applications",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "finegrained program partitioning for security",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "ρfem efficient backwardedge protection using reversed forwardedge mappings",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "analyzing control flow integrity with llvmcfi",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 260,
    "paper_ids": [
      2163,
      2164,
      2165,
      2166
    ],
    "papers_without_artifact_ids": [
      2167,
      2168,
      2169,
      395,
      400
    ]
  },
  {
    "name": "Ivan De Oliveira Nunes",
    "display_name": "Ivan De Oliveira Nunes",
    "affiliation": "University of Zurich",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 1
      },
      "ACSAC": {
        "2024": 2
      }
    },
    "artifact_rate": 80.0,
    "repro_rate": 50.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SpecCFA: Enhancing Control Flow Attestation/Auditing via Application-Aware Sub-Path Speculation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "garota generalized active rootoftrust architecture for tiny embedded devices",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 261,
    "paper_ids": [
      2170,
      2171,
      1174,
      2172
    ],
    "papers_without_artifact_ids": [
      1181
    ]
  },
  {
    "name": "Thorsten Strufe",
    "display_name": "Thorsten Strufe",
    "affiliation": "Karlsruhe Inst. of Technology",
    "artifact_count": 4,
    "total_papers": 10,
    "total_papers_by_conf": {
      "PETS": 8,
      "ACSAC": 1,
      "ATC": 0,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 3,
        "2025": 1,
        "2024": 4
      },
      "ACSAC": {
        "2024": 1
      },
      "ATC": {},
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "R+R: Understanding Hyperparameter Effects in DP-SGD",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Understanding Person Identification Through Gait",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Aimless Onions: Mixing without Topology Information",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fantômas: Understanding Face Anonymization Reversibility",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a framework for provably secure onion routing against a global adversary",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "provable security for the onion routing and mix network packet format sphinx",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "a false sense of privacy towards a reliable evaluation methodology for the anonymization of biometric data",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "sok differentially private publication of trajectory data",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "surprised shocked worried user reactions to facebook data collection from third parties",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "inexpensive brainwave authentication new techniques and insights on user acceptance",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 531,
    "paper_ids": [
      2173,
      2174,
      2175,
      2176
    ],
    "papers_without_artifact_ids": [
      2177,
      2178,
      2179,
      2180,
      2181,
      2182
    ]
  },
  {
    "name": "Christina Garman",
    "display_name": "Christina Garman",
    "affiliation": "Purdue University",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 2,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Achieving Keyless CDNs with Conclaves",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Improving the Performance and Security of Tor's Onion Services",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 262,
    "paper_ids": [
      2183,
      2184,
      1502,
      2185
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matheus E. Garbelini",
    "display_name": "Matheus E. Garbelini",
    "affiliation": "SUTD",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2024": 2
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "VaktBLE: A Benevolent Man-in-the-Middle Bridge to Guard against Malevolent BLE Connections",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AirBugCatcher: Automated Wireless Reproduction of IoT Bugs",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SNI5GECT: A Practical Approach to Inject aNRchy into 5G NR",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 263,
    "paper_ids": [
      2186,
      2187,
      2188,
      837
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sudipta Chattopadhyay 0001",
    "display_name": "Sudipta Chattopadhyay",
    "affiliation": "SUTD",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2024": 2
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "VaktBLE: A Benevolent Man-in-the-Middle Bridge to Guard against Malevolent BLE Connections",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AirBugCatcher: Automated Wireless Reproduction of IoT Bugs",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SNI5GECT: A Practical Approach to Inject aNRchy into 5G NR",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 264,
    "paper_ids": [
      2186,
      2187,
      2188,
      837
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seyit Camtepe",
    "display_name": "Seyit Camtepe",
    "affiliation": "CSIRO,Data61,Australia",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      },
      "ACSAC": {
        "2024": 1,
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 25.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Transformer-Based Language Models for Software Vulnerability Detection",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AudioMarkNet: Audio Watermarking for Deepfake Speech Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "provably unlearnable data examples",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "eatvul chatgptbased evasion attack against software vulnerability detection",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 265,
    "paper_ids": [
      2189,
      762,
      1568,
      2190
    ],
    "papers_without_artifact_ids": [
      1574,
      2191
    ]
  },
  {
    "name": "Jelena Mirkovic",
    "display_name": "Jelena Mirkovic",
    "affiliation": "University of Southern California",
    "artifact_count": 4,
    "total_papers": 10,
    "total_papers_by_conf": {
      "PETS": 2,
      "ACSAC": 4,
      "USENIXSEC": 2,
      "NSDI": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2024": 1,
        "2018": 1,
        "2017": 2
      },
      "USENIXSEC": {
        "2022": 1,
        "2021": 1
      },
      "NSDI": {
        "2023": 1,
        "2011": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2018,
      2022,
      2024,
      2025
    ],
    "year_range": "2018-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "BinHunter: A Fine-Grained Graph Representation for Localizing Vulnerabilities in Binary Executables",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SENSS Against Volumetric DDoS Attacks",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "I know what you did on Venmo: Discovering privacy leaks in mobile social payments",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Navigating Social Media Privacy: Awareness, Preferences, and Discoverability",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "practical intentdriven routing configuration synthesis",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "toward findable accessible interoperable and reusable cybersecurity artifacts",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "user experiences on network testbeds",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "commoner privacy and a study on network traces",
        "conference": "ACSAC",
        "year": 2017
      },
      {
        "title": "resect selflearning traffic filters for ip spoofing defense",
        "conference": "ACSAC",
        "year": 2017
      },
      {
        "title": "a semantic framework for data analysis in networked systems",
        "conference": "NSDI",
        "year": 2011
      }
    ],
    "author_id": 266,
    "paper_ids": [
      2192,
      2193,
      2194,
      2195
    ],
    "papers_without_artifact_ids": [
      2196,
      2197,
      2198,
      2199,
      2200,
      2201
    ]
  },
  {
    "name": "Christian Wressnegger",
    "display_name": "Christian Wressnegger",
    "affiliation": "Karlsruhe Inst. of Technology",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 1,
      "ACSAC": 2,
      "EUROSYS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 75.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "PETS"
    ],
    "years": [
      2021,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Model-Manipulation Attacks Against Black-Box Explanations",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Large-Scale Study of Cookie Banner Interaction Tools and their Impact on Users' Privacy",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dos and donts of machine learning in computer security",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "tagvet vetting malware tags using explainable machine learning",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 267,
    "paper_ids": [
      2202,
      535,
      2203,
      18
    ],
    "papers_without_artifact_ids": [
      541,
      542
    ]
  },
  {
    "name": "Ivan Martinovic",
    "display_name": "Ivan Martinovic",
    "affiliation": "University of Oxford",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 3,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 2,
        "2021": 1
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1,
        "2017": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 57.1,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Current Affairs: A Security Measurement Study of CCS EV Charging Deployments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "glados locationaware denialofservice of cellular networks",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "99 false positives a qualitative study of soc analysts perspectives on security alarms",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "holopair securing shared augmented reality using microsoft hololens",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 268,
    "paper_ids": [
      1757,
      2204,
      2205,
      1760
    ],
    "papers_without_artifact_ids": [
      1228,
      2206,
      2207
    ]
  },
  {
    "name": "Kevin R. B. Butler",
    "display_name": "Kevin R. B. Butler",
    "affiliation": "University of Florida",
    "artifact_count": 4,
    "total_papers": 11,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "NDSS": 2,
      "ACSAC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 2,
        "2022": 1,
        "2025": 2
      },
      "NDSS": {
        "2025": 2
      },
      "ACSAC": {
        "2024": 1
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 36.4,
    "repro_rate": 75.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Analyzing the AI Nudification Application Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "characterizing the impact of audio deepfakes in the presence of cochlear implant",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "sok towards a unified approach to applied replicability for computer security",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "sok the good the bad and the unbalanced measuring structural limitations of deepfake media datasets",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "fuzz the power dualrole state guided blackbox fuzzing for usb power delivery",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "analyzing the monetization ecosystem of stalkerware",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "who are you i really wanna know detecting audio deepfakes through vocal tract reconstruction",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "bigmac finegrained policy analysis of android firmware",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 269,
    "paper_ids": [
      2208,
      2209,
      2210,
      1227
    ],
    "papers_without_artifact_ids": [
      2211,
      2212,
      2213,
      1778,
      2214,
      2215,
      2216
    ]
  },
  {
    "name": "Eleonora Losiouk",
    "display_name": "Eleonora Losiouk",
    "affiliation": "University of Padova",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 2,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1
      },
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hercules Droidot and the murder on the JNI Express",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 270,
    "paper_ids": [
      2217,
      1129,
      4,
      14
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Umar Iqbal 0002",
    "display_name": "Umar Iqbal",
    "affiliation": "Washington University in St. Louis",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "PETS": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 2
      },
      "ACSAC": {
        "2021": 1
      },
      "PETS": {
        "2022": 1,
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 57.1,
    "repro_rate": 25.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Eluding ML-based Adblockers With Actionable Adversarial Examples",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PURL: Safe and Effective Sanitization of Link Decoration",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Khaleesi: Breaker of Advertising and Tracking Request Chains",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "isolategpt an execution isolation architecture for llmbased agentic systems",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "opted out yet tracked are regulations enough to protect your privacy",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "fpradar longitudinal measurement and early detection of browser fingerprinting",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 271,
    "paper_ids": [
      802,
      803,
      805,
      806
    ],
    "papers_without_artifact_ids": [
      177,
      2218,
      812
    ]
  },
  {
    "name": "Zhiyun Qian",
    "display_name": "Zhiyun Qian",
    "affiliation": "Univ. of California - Riverside",
    "artifact_count": 4,
    "total_papers": 18,
    "total_papers_by_conf": {
      "USENIXSEC": 13,
      "ACSAC": 1,
      "EUROSYS": 0,
      "FAST": 1,
      "WOOT": 0,
      "PETS": 0,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2020": 2,
        "2023": 1,
        "2022": 3,
        "2021": 4
      },
      "ACSAC": {
        "2021": 1
      },
      "EUROSYS": {},
      "FAST": {
        "2023": 1
      },
      "WOOT": {},
      "PETS": {},
      "NDSS": {
        "2024": 2,
        "2025": 1
      }
    },
    "artifact_rate": 22.2,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Eluding ML-based Adblockers With Actionable Adversarial Examples",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Undo Workarounds for Kernel Bugs",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "statically discover crossentry useafterfree vulnerabilities in the linux kernel",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "kleak towards automating the generation of multistep infoleak exploits against the linux kernel",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "syzbridge bridging the gap in exploitability assessment of linux kernel bugs in the linux ecosystem",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "symbisect accurate bisection for fuzzerexposed vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "dont waste my efforts pruning redundant sanitizer checks by developerimplemented type checks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "unsafe at any copy name collisions from mixing case sensitivities",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "a hybrid alias analysis and its application to global variable protection in the linux kernel",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "offpath network traffic manipulation via revitalized icmp redirect attacks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "linkrid vetting imbalance reference counting in linux kernel with symbolic execution",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "syzvegas beating kernel fuzzing odds with reinforcement learning",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "an investigation of the android kernel patch ecosystem",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "polyscope multipolicy access control analysis to compute authorized attack operations in android systems",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "poison over troubled forwarders a cache poisoning attack targeting dns forwarding devices",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "koobe towards facilitating exploit generation of kernel outofbounds write vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 272,
    "paper_ids": [
      802,
      2219,
      2220,
      2221
    ],
    "papers_without_artifact_ids": [
      658,
      2222,
      2223,
      2224,
      2225,
      2226,
      2144,
      574,
      2227,
      2228,
      2229,
      2230,
      920,
      2231
    ]
  },
  {
    "name": "Matthew Hicks",
    "display_name": "Matthew Hicks",
    "affiliation": "Virginia Tech",
    "artifact_count": 4,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 2,
      "WOOT": 1,
      "ATC": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2022": 1,
        "2021": 1
      },
      "ACSAC": {
        "2021": 1,
        "2022": 1
      },
      "WOOT": {
        "2024": 1
      },
      "ATC": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 25.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2021,
      2022,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RingRAM: A Unified Hardware SecurityPrimitive for IoT Devices that Gets Better with Age",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RIPencapsulation: Defeating IP Encapsulation on TI MSP Devices",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a difference world highperformance nvminvariant softwareonly intermittent computation",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "no linux no problem fast and correct windows binary fuzzing via targetembedded snapshotting",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "fuzzing hardware like software",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "breaking through binaries compilerquality instrumentation for better binaryonly fuzzing",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 273,
    "paper_ids": [
      2232,
      2,
      2233,
      1191
    ],
    "papers_without_artifact_ids": [
      2234,
      2235,
      2236,
      2237
    ]
  },
  {
    "name": "Bo Luo",
    "display_name": "Bo Luo",
    "affiliation": "University of Kansas",
    "artifact_count": 4,
    "total_papers": 13,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 4,
      "ACSAC": 7,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 3,
        "2020": 1
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1,
        "2018": 1,
        "2019": 2,
        "2017": 1,
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 30.8,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "eunomia a realtime privacy compliance firewall for alexa skills",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "fakebehalf imperceptible email spoofing attacks against the delegation mechanism in email systems",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "you can obfuscate but you cannot hide crosspoint attacks against network topology obfuscation",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "guardspark finegrained purposeaware access control for secure data sharing and analysis in spark",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "you are what you broadcast identification of mobile and iot devices from public wifi",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "d2nn a finegrained dual modular redundancy framework for deep neural networks",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "tfbiv transparent and finegrained binary integrity verification in the cloud",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "i know what you see power sidechannel attack on convolutional neural network accelerators",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "supporting transparent snapshot for baremetal malware analysis on mobile devices",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 274,
    "paper_ids": [
      2238,
      2239,
      2240,
      2241
    ],
    "papers_without_artifact_ids": [
      2242,
      2243,
      2244,
      2245,
      2246,
      2247,
      2248,
      2249,
      943
    ]
  },
  {
    "name": "Billy Bob Brumley",
    "display_name": "Billy Bob Brumley",
    "affiliation": "Rochester Inst. of Technology",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 2,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 2
      },
      "ACSAC": {
        "2018": 1,
        "2020": 1
      },
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 25.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2020,
      2022
    ],
    "year_range": "2018-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Certified Side Channels",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OpenSSLNTRU: Faster post-quantum TLS key exchange",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HyperDegrade: From GHz to MHz Effective CPU Frequencies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "online template attacks revisited",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "set it and forget it turnkey ecc for instant integration",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 275,
    "paper_ids": [
      2250,
      2251,
      1808,
      2252
    ],
    "papers_without_artifact_ids": [
      2253,
      2254
    ]
  },
  {
    "name": "Erik van der Kouwe",
    "display_name": "Erik van der Kouwe",
    "affiliation": "VU Amsterdam",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 4,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {
        "2018": 1,
        "2022": 1,
        "2019": 1,
        "2023": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 80.0,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2022,
      2023
    ],
    "year_range": "2018-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Type-After-Type: Practical and Complete Type-Safe Memory Reuse",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Triereme: Speeding up hybrid fuzzing through efficient query scheduling",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FloatZone: Accelerating Memory Error Detection using the Floating Point Unit",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vps excavating highlevel c constructs from lowlevel binaries to protect dynamic dispatching",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 276,
    "paper_ids": [
      77,
      79,
      80,
      85
    ],
    "papers_without_artifact_ids": [
      98
    ]
  },
  {
    "name": "Jiang Ming 0002",
    "display_name": "Jiang Ming",
    "affiliation": "Tulane University",
    "artifact_count": 4,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 2,
      "ATC": 0,
      "NSDI": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 2
      },
      "ACSAC": {
        "2018": 1,
        "2020": 1
      },
      "ATC": {},
      "NSDI": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 44.4,
    "repro_rate": 0.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2021,
      2022,
      2025
    ],
    "year_range": "2018-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 3,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PolyCruise: A Cross-Language Dynamic Information Flow Analysis",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VAPD: An Anomaly Detection Model for PDF Malware Forensics with Adversarial Robustness",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "retrofitting xom for stripped binaries without embedded data relocation",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "towards intelligent automobile cockpit via a new container architecture",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "on the feasibility of malware unpacking via hardwareassisted loop profiling",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "obfuscationresilient executable payload extraction from packed malware",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "deviceagnostic firmware execution is possible a concolic execution approach for peripheral emulation",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 277,
    "paper_ids": [
      2255,
      772,
      2256,
      2257
    ],
    "papers_without_artifact_ids": [
      2258,
      2259,
      2260,
      2261,
      2262
    ]
  },
  {
    "name": "William Enck",
    "display_name": "William Enck",
    "affiliation": "North Carolina State University",
    "artifact_count": 4,
    "total_papers": 11,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "NDSS": 1,
      "ACSAC": 3,
      "ATC": 0,
      "PETS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 2,
        "2023": 1,
        "2022": 2,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      },
      "ACSAC": {
        "2022": 1,
        "2017": 1,
        "2020": 1
      },
      "ATC": {},
      "PETS": {},
      "OSDI": {}
    },
    "artifact_rate": 36.4,
    "repro_rate": 25.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Analysis of Payment Service Provider SDKs in Android",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Context Matters: Qualitative Insights into Developers' Approaches and Challenges with Software Composition Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "UntrustIDE: Exploiting Weaknesses in VS Code Extensions",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fred identifying file redelegation in android system services",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "alastor reconstructing the provenance of serverless intrusions",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "polyscope multipolicy access control analysis to compute authorized attack operations in android systems",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "leakypick iot audio spy detector",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "actions speak louder than words entitysensitive privacy policy and data flow analysis with policheck",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "cardpliance pci dss compliance of android applications",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "analysis of seandroid policies combining mac and dac in android",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 278,
    "paper_ids": [
      2263,
      1773,
      2264,
      2265
    ],
    "papers_without_artifact_ids": [
      2266,
      2267,
      2230,
      2268,
      2269,
      2270,
      2271
    ]
  },
  {
    "name": "Alsharif Abuadbba",
    "display_name": "Alsharif Abuadbba",
    "affiliation": "CSIRO's Data61/Cyber Security CRC",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 2,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "ACSAC": {
        "2022": 1,
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 80.0,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Reconstruction Attack on Differential Private Trajectory Protection Mechanisms",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Can Trajectory Generation Combine Privacy and Utility?",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oblivgnn oblivious inference on transductive and inductive graph neural network",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 279,
    "paper_ids": [
      763,
      765,
      2272,
      767
    ],
    "papers_without_artifact_ids": [
      1567
    ]
  },
  {
    "name": "Heng Yin 0001",
    "display_name": "Heng Yin",
    "affiliation": "Univ. of California - Riverside",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1,
      "ACSAC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 2,
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "ATC": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "symfit making the common concrete case fast for binarycode concolic execution",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "android smarttvs vulnerability discovery via logguided fuzzing",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 280,
    "paper_ids": [
      1694,
      2273,
      2274,
      2275
    ],
    "papers_without_artifact_ids": [
      2276,
      2277
    ]
  },
  {
    "name": "Daniel Votipka",
    "display_name": "Daniel Votipka",
    "affiliation": "Tufts University",
    "artifact_count": 4,
    "total_papers": 12,
    "total_papers_by_conf": {
      "USENIXSEC": 11,
      "ACSAC": 1,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2020": 2,
        "2023": 1,
        "2022": 1,
        "2025": 3,
        "2021": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Qualitative Evaluation of Reverse Engineering Tool Usability",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"Threat modeling is very formal, it's very technical, and also very hard to do correctly\": Investigating Threat Modeling Practices in Open-Source Software Projects",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "im trying to learnand im shooting myself in the foot beginners struggles when solving binary exploitation exercises",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "a survey of cybersecurity professionals perceptions and experiences of safety and belonging in the community",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "there are rabbit holes i want to go down that im not allowed to go down an investigation of security expert threat modeling practices for medical devices",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "i can say im john travoltabut im not john travolta investigating the impact of changes to social media verification policies on user perceptions of verified accounts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "bug hunters perspectives on the challenges and benefits of the bug bounty ecosystem",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "benefits and drawbacks of adopting a secure programming language rust as a case study",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "an observational investigation of reverse engineers processes",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "understanding security mistakes developers make qualitative analysis from build it break it fix it",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 281,
    "paper_ids": [
      2278,
      1241,
      2279,
      1244
    ],
    "papers_without_artifact_ids": [
      2280,
      1270,
      2281,
      1145,
      1271,
      1277,
      1279,
      1280
    ]
  },
  {
    "name": "Chen Gong 0005",
    "display_name": "Chen Gong",
    "affiliation": "Rice University",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 2
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Curiosity-Driven and Victim-Aware Adversarial Policies",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware Pretraining",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Delay-allowed Differentially Private Data Stream Release",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TrajDeleter: Enabling Trajectory Forgetting in Offline Reinforcement Learning Agents",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 282,
    "paper_ids": [
      2282,
      895,
      303,
      898
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hyungjoon Koo",
    "display_name": "Hyungjoon Koo",
    "affiliation": "Sungkyunkwan University",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 4,
      "WOOT": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2021": 2,
        "2022": 2
      },
      "WOOT": {
        "2025": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 25.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 4,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeView: Confining Progressive Web Applications by Debloating Web APIs",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BOOTKITTY: A Stealthy Bootkit-Rootkit Against Modern Operating Systems",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a look back on a function identification problem",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "softmark software watermarking via a binary function relocation",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 283,
    "paper_ids": [
      2283,
      1408,
      1122,
      2284
    ],
    "papers_without_artifact_ids": [
      665,
      2285
    ]
  },
  {
    "name": "Kaitai Liang",
    "display_name": "Kaitai Liang",
    "affiliation": "TU Delft",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 4,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2023": 1,
        "2021": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 57.1,
    "repro_rate": 25.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Query Recovery from Easy to Hard: Jigsaw Attack against SSE",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ladder multiobjective backdoor attack via evolutionary algorithm",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "high recovery with fewer injections practical binary volumetric injection attacks against dynamic searchable encryption",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "incrementally updateable honey password vaults",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 284,
    "paper_ids": [
      2286,
      2287,
      2239,
      2241
    ],
    "papers_without_artifact_ids": [
      2288,
      2289,
      2290
    ]
  },
  {
    "name": "Yang Xiao 0010",
    "display_name": "Yang Xiao",
    "affiliation": "University of Kentucky",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 2,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "ACSAC": {
        "2022": 1,
        "2020": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 25.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 4,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ARI: Attestation of Real-time Mission Execution Integrity",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aaka an antitracking cellular authentication scheme leveraging anonymous credentials",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "ucblocker unwanted call blocking using anonymous authentication",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 285,
    "paper_ids": [
      164,
      165,
      172,
      2291
    ],
    "papers_without_artifact_ids": [
      2292,
      2293
    ]
  },
  {
    "name": "Wenjing Lou",
    "display_name": "Wenjing Lou",
    "affiliation": "Virginia Tech",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 2,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "ACSAC": {
        "2022": 1,
        "2020": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 25.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 4,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ARI: Attestation of Real-time Mission Execution Integrity",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aaka an antitracking cellular authentication scheme leveraging anonymous credentials",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "ucblocker unwanted call blocking using anonymous authentication",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 286,
    "paper_ids": [
      164,
      165,
      172,
      2291
    ],
    "papers_without_artifact_ids": [
      2292,
      2293
    ]
  },
  {
    "name": "Y. Thomas Hou 0001",
    "display_name": "Y. Thomas Hou",
    "affiliation": "IISc Bangalore",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 2,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "ACSAC": {
        "2022": 1,
        "2020": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 25.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 4,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ARI: Attestation of Real-time Mission Execution Integrity",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aaka an antitracking cellular authentication scheme leveraging anonymous credentials",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "ucblocker unwanted call blocking using anonymous authentication",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 287,
    "paper_ids": [
      164,
      165,
      172,
      2291
    ],
    "papers_without_artifact_ids": [
      2292,
      2293
    ]
  },
  {
    "name": "Imtiaz Karim",
    "display_name": "Imtiaz Karim",
    "affiliation": "University of Texas at Dallas",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      },
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2024,
      2025
    ],
    "year_range": "2019-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Gotta Detect 'Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 288,
    "paper_ids": [
      1165,
      1166,
      1168,
      445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Syed Rafiul Hussain",
    "display_name": "Syed Rafiul Hussain",
    "affiliation": "Pennsylvania State University",
    "artifact_count": 4,
    "total_papers": 9,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 6,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 5,
        "2025": 1
      },
      "ACSAC": {
        "2019": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 44.4,
    "repro_rate": 25.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2022,
      2024,
      2025
    ],
    "year_range": "2019-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Building a Privacy-Preserving Smart Camera System",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "athena analyzing and quantifying side channels of transport layer protocols",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "oranalyst systematic testing framework for open ran implementations",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "in wallet we trust bypassing the digital wallets payment security for free shopping",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "hermes unlocking security analysis of cellular network protocols by synthesizing finite state machines from natural language specifications",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "protecting the 4g and 5g cellular paging protocols against security and privacy attacks",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 289,
    "paper_ids": [
      1165,
      2294,
      2295,
      2165
    ],
    "papers_without_artifact_ids": [
      2296,
      2167,
      2297,
      2298,
      1172
    ]
  },
  {
    "name": "Virat Shejwalkar",
    "display_name": "Virat Shejwalkar",
    "affiliation": "University of Massachusetts Amherst, E-mail: {milad, vshejwalkar",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 2,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "ACSAC": {
        "2019": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 80.0,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2022,
      2023
    ],
    "year_range": "2019-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Revisiting utility metrics for location privacy-preserving mechanisms",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Machine Learning with Differentially Private Labels: Mechanisms and Frameworks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "recycling scraps improving private learning by leveraging checkpointsrecycling scraps improving private learning by leveraging checkpoints",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 290,
    "paper_ids": [
      882,
      883,
      130,
      133
    ],
    "papers_without_artifact_ids": [
      2299
    ]
  },
  {
    "name": "Derui Wang",
    "display_name": "Derui Wang",
    "affiliation": "Swinburne University of Technology and Data, Australia",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 3
      },
      "ACSAC": {
        "2019": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 75.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2025
    ],
    "year_range": "2019-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "STRIP: a defence against trojan attacks on deep neural networks",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reinforcement unlearning",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "provably unlearnable data examples",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 291,
    "paper_ids": [
      764,
      1568,
      1569,
      2300
    ],
    "papers_without_artifact_ids": [
      1573,
      1574
    ]
  },
  {
    "name": "Ahmad-Reza Sadeghi",
    "display_name": "Ahmad-Reza Sadeghi",
    "affiliation": "TU Darmstadt",
    "artifact_count": 4,
    "total_papers": 25,
    "total_papers_by_conf": {
      "USENIXSEC": 16,
      "ACSAC": 4,
      "EUROSYS": 0,
      "ATC": 0,
      "CHES": 0,
      "WOOT": 0,
      "PETS": 0,
      "NDSS": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2020": 2,
        "2023": 3,
        "2022": 4,
        "2025": 2,
        "2021": 1
      },
      "ACSAC": {
        "2019": 1,
        "2023": 2,
        "2020": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "CHES": {},
      "WOOT": {},
      "PETS": {},
      "NDSS": {
        "2024": 3,
        "2025": 2
      }
    },
    "artifact_rate": 16.0,
    "repro_rate": 0.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LightShed: Defeating Perturbation-based Image Copyright Protections",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GenHuzz: An Efficient Generative Hardware Fuzzer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "safesplit a novel defense against clientside backdoor attacks in split learning",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "voiceradar voice deepfake detection using microfrequency and compositional analysis",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "demasq unmasking the chatgpt wordsmith",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "crowdguard federated backdoor detection in federated learning",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "freqfed a frequency analysisbased approach for mitigating poisoning attacks in federated learning",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "whisperfuzz whitebox fuzzing for detecting and locating timing vulnerabilities in processors",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "deepeclipse how to break whitebox dnnwatermarking schemes",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "orbital trust and privacy sok on pki and location privacy challenges in space networks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "xplain analyzing invisible correlations in model explanation",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "unleashing iot security assessing the effectiveness of best practices in protecting against threats",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "hypfuzz formalassisted processor fuzzing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "oops i glitched it again how to multiglitch the glitchingprotections on arm trustzonem",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "thehuzz instruction fuzzing of processors using goldenreference models for finding softwareexploitable vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "flame taming backdoors in federated learning",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "ghosttouch targeted attacks on touchscreens without physical touch",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "vcer efficient certificate validation in constrained networks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "cure a security architecture with customizable and resilient enclaves",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "leakypick iot audio spy detector",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "v0ltpwn attacking x86 processor integrity from software",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "hybcache hybrid sidechannelresilient caches for trusted execution environments",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "drsgx automated and adjustable sidechannel protection for sgx using data location randomization",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 292,
    "paper_ids": [
      2301,
      2302,
      2303,
      2304
    ],
    "papers_without_artifact_ids": [
      2305,
      2306,
      2307,
      2308,
      2309,
      2310,
      2311,
      2312,
      2313,
      2314,
      2315,
      2316,
      2317,
      2318,
      2319,
      1180,
      2320,
      2268,
      2321,
      2322,
      1237
    ]
  },
  {
    "name": "Giancarlo Pellegrino",
    "display_name": "Giancarlo Pellegrino",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 2,
      "ACSAC": 1,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2021": 1
      },
      "NDSS": {
        "2025": 2
      },
      "ACSAC": {
        "2023": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SSRF vs. Developers: A Study of SSRF-Defenses in PHP Applications",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: State of the Krawlers - Evaluating the Effectiveness of Crawling Algorithms for Web Security Measurements",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "YuraScanner: Leveraging LLMs for Task-driven Web App Scanning",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "do not follow the white rabbit challenging the myth of harmless open redirection",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "jaw studying clientside csrf with hybrid property graphs and declarative traversals",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 293,
    "paper_ids": [
      2323,
      214,
      2324,
      2325
    ],
    "papers_without_artifact_ids": [
      2326,
      2327
    ]
  },
  {
    "name": "Erwin Quiring",
    "display_name": "Erwin Quiring",
    "affiliation": "Ruhr University Bochum",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 3,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 1
      },
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 80.0,
    "repro_rate": 25.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the Detection of Image-Scaling Attacks in Machine Learning",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "I still know it's you! On Challenges in Anonymizing Source Code",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dos and donts of machine learning in computer security",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 294,
    "paper_ids": [
      537,
      216,
      103,
      539
    ],
    "papers_without_artifact_ids": [
      541
    ]
  },
  {
    "name": "Martin Schwarzl",
    "display_name": "Martin Schwarzl",
    "affiliation": "Independent Researcher, Austria",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 2,
        "2022": 2
      },
      "ACSAC": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 57.1,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "DOPE: DOmain Protection Enforcement with PKS",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Side-Channel Attacks on Optane Persistent Memory",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tmebox scalable inprocess isolation through intel tmemk memory encryption",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "rapid prototyping for microarchitectural attacks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "æpic leak architecturally leaking uninitialized data from the microarchitecture",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 295,
    "paper_ids": [
      265,
      271,
      336,
      272
    ],
    "papers_without_artifact_ids": [
      278,
      331,
      333
    ]
  },
  {
    "name": "Zhikun Zhang 0001",
    "display_name": "Zhikun Zhang",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 4,
    "total_papers": 12,
    "total_papers_by_conf": {
      "USENIXSEC": 9,
      "NDSS": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 3,
        "2022": 2,
        "2025": 2,
        "2021": 1
      },
      "NDSS": {
        "2024": 2
      },
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Differentially Private Resource Allocation",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sharpness-Aware Initialization: Improving Differentially Private Machine Learning from First Principles",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lmsanitator defending prompttuning against taskagnostic backdoors",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "dpadapter improving differentially private deep learning through noise tolerance pretraining",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "privgraph differentially private graph data publication by exploiting community information",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "privtrace differentially private trajectory synthesis by adaptive markov models",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "faceauditor data auditing in facial recognition systems",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "mldoctor holistic risk assessment of inference attacks against machine learning models",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "inference attacks against graph neural networks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "privsyn differentially private data synthesis",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 296,
    "paper_ids": [
      180,
      2328,
      600,
      1542
    ],
    "papers_without_artifact_ids": [
      2329,
      606,
      2330,
      202,
      203,
      206,
      208,
      210
    ]
  },
  {
    "name": "Yongdae Kim",
    "display_name": "Yongdae Kim",
    "affiliation": "KAIST",
    "artifact_count": 4,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 3,
      "CHES": 0,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 2,
        "2025": 2
      },
      "ACSAC": {
        "2022": 1,
        "2023": 1,
        "2020": 1
      },
      "CHES": {},
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "are there wireless hidden cameras spying on me",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "watching the watchers practical video identification attack in lte networks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "doltest indepth downlink negative testing framework for lte devices",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "firmae towards largescale emulation of iot firmware for dynamic analysis",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 297,
    "paper_ids": [
      2156,
      2331,
      1123,
      2332
    ],
    "papers_without_artifact_ids": [
      2333,
      1718,
      2334,
      2335
    ]
  },
  {
    "name": "Carter Yagemann",
    "display_name": "Carter Yagemann",
    "affiliation": "Ohio State University",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2021": 1
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 80.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 4,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Feasibility of Automating Stock Market Manipulation",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PUMM: Preventing Use-After-Free Using Execution Unit Partitioning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VulChecker: Graph-based Vulnerability Localization in Source Code",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "arcus symbolic root cause analysis of exploits in production systems",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 298,
    "paper_ids": [
      1409,
      1448,
      1410,
      1411
    ],
    "papers_without_artifact_ids": [
      1420
    ]
  },
  {
    "name": "Song Liao",
    "display_name": "Song Liao",
    "affiliation": "Texas Tech University",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 4,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "No Way to Sign Out? Unpacking Non-Compliance with Google Play's App Account Deletion Requirements",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SKILLPoV: Towards Accessible and Effective Privacy Notice for Amazon Alexa Skills",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 299,
    "paper_ids": [
      1198,
      1201,
      1455,
      1456
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yi He 0020",
    "display_name": "Yi He",
    "affiliation": "University of Oklahoma",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1,
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      },
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 25.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "CHES",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "demystifying the security implications in iot device rental services",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "cross container attacks the bewildered ebpf on clouds",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 300,
    "paper_ids": [
      543,
      170,
      547,
      550
    ],
    "papers_without_artifact_ids": [
      561,
      572
    ]
  },
  {
    "name": "Junhao Huang 0001",
    "display_name": "Junhao Huang",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 3,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "CHES": {
        "2024": 1,
        "2022": 1,
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Revisiting Keccak and Dilithium Implementations on ARMv7-M",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Improved Plantard Arithmetic for Lattice-based Cryptography",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 301,
    "paper_ids": [
      2336,
      2337,
      2338,
      2339
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jipeng Zhang 0001",
    "display_name": "Jipeng Zhang",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 3,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "CHES": {
        "2024": 1,
        "2022": 1,
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Revisiting Keccak and Dilithium Implementations on ARMv7-M",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Improved Plantard Arithmetic for Lattice-based Cryptography",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 302,
    "paper_ids": [
      2336,
      2337,
      2338,
      2339
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Çetin Kaya Koç",
    "display_name": "Çetin Kaya Koç",
    "affiliation": "University of California, Santa Barbara",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 4,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "CHES": {
        "2024": 2,
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 80.0,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Revisiting Keccak and Dilithium Implementations on ARMv7-M",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Improved Plantard Arithmetic for Lattice-based Cryptography",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "casa a compact and scalable accelerator for approximate homomorphic encryption",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 7912,
    "paper_ids": [
      2336,
      2337,
      2338,
      2339
    ],
    "papers_without_artifact_ids": [
      2340
    ]
  },
  {
    "name": "Amir Moradi 0001",
    "display_name": "Amir Moradi",
    "affiliation": "TU Darmstadt",
    "artifact_count": 4,
    "total_papers": 32,
    "total_papers_by_conf": {
      "CHES": 31,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 7,
        "2022": 8,
        "2021": 10,
        "2025": 3,
        "2023": 3
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 12.5,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Robust but Relaxed Probing Model",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PROLEAD A Probing-Based Hardware Leakage Detection Tool",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PROLEAD_SW Probing-Based Software Leakage Detection for ARM Binaries",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "constantcycle hardware private circuits",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "design and implementation of a physically secure opensource fpga and toolchain",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "fault injection evaluation with statistical analysis how to deal with nearly fabricated large circuits",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "a deep analysis of two glitchfree hardware masking schemes sesym and lmdpl",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "another evidence to not employ customized masked hardware identifying and fixing flaws in scarv",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "pommes prevention of microarchitectural leakages in masked embedded software",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "automated generation of faultresistant circuits",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "static leakage in dualrail precharge logics",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "deep learning sidechannel collision attack",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "lowlatency and lowrandomness secondorder masked cubic functions",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "transitional leakage in theory and practice unveiling security flaws in masked circuits",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "beware of insufficient redundancy an experimental evaluation of codebased fi countermeasures",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "randomness optimization for gadget compositions in higherorder masking",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "cryptanalysis of efficient masked ciphers applications to low latency",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "generic hardware private circuits towards automated generation of composable secure gadgets",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "automated generation of masked hardware",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "composable gadgets with reused fresh masks firstorder probingsecure hardware circuits with only 6 fresh masks",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "reconsolidating firstorder masking schemes nullifying fresh randomness",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "inconsistency of simulation and practice in delaybased strong pufs",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "countermeasures against static power attacks comparing exhaustive logic balancing and other protection schemes in 28 nm cmos",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "new firstorder secure aes performance records",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "the speedy family of block ciphers engineering an ultra lowlatency cipher from gate level for secure processor architectures",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "fiver robust verification of countermeasures against fault injections",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "dlla deep learning leakage assessment a modern roadmap for sca evaluations",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "secondorder sca security with almost no fresh randomness",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "lowlatency keccak at any arbitrary order",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "lets take it offline boosting bruteforce attacks on iphones user authentication through sca",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "the unpatchable silicon a full break of the bitstream encryption of xilinx 7series fpgas",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 304,
    "paper_ids": [
      2341,
      2342,
      2343,
      2344
    ],
    "papers_without_artifact_ids": [
      2345,
      2346,
      2347,
      2348,
      2349,
      2350,
      2351,
      2352,
      2353,
      2354,
      2355,
      2356,
      1478,
      2357,
      2358,
      2359,
      2360,
      2361,
      2362,
      2363,
      2364,
      2365,
      1479,
      2366,
      2367,
      2368,
      2369,
      2370
    ]
  },
  {
    "name": "Gaëtan Cassiers",
    "display_name": "Gaëtan Cassiers",
    "affiliation": "Graz University of Technology",
    "artifact_count": 4,
    "total_papers": 11,
    "total_papers_by_conf": {
      "CHES": 11
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 3,
        "2022": 2,
        "2021": 1,
        "2023": 5
      }
    },
    "artifact_rate": 36.4,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Compress: Generate Small and Fast Masked Pipelined Circuits",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations Towards Analytical Attacks against 32-bit Implementations",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "quantile quantifying information leakage",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "information bounds and convergence rates for sidechannel security evaluators",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "protecting dilithium against leakage revisited sensitivity analysis and improved implementations",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "primefield masking in hardware and its soundness against lownoise sca attacks",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "triplex an efficient and onepass leakageresistant mode of operation",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "bitslicing arithmeticboolean masking conversions for fun and profit with application to latticebased kems",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "provably secure hardware masking in the transition and glitchrobust probing model better safe than sorry",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 7913,
    "paper_ids": [
      267,
      2371,
      2372,
      2373
    ],
    "papers_without_artifact_ids": [
      280,
      2374,
      2375,
      2376,
      2377,
      2378,
      2379
    ]
  },
  {
    "name": "Debdeep Mukhopadhyay",
    "display_name": "Debdeep Mukhopadhyay",
    "affiliation": "IIT Kharagpur",
    "artifact_count": 4,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1,
      "CHES": 5,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "PETS": {
        "2023": 1
      },
      "CHES": {
        "2024": 3,
        "2021": 1,
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 44.4,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "CHES",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"Whispering MLaaS\" Exploiting Timing Channels to Compromise User Privacy in Deep Neural Networks",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Shesha : Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "systematic evaluation of randomized cache designs against cache occupancy",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "estranet an efficient shiftinvariant transformer network for sidechannel analysis",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "carry your fault a fault propagation attack on sidechannel protected lwebased kem",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "faults in our bus novel bus fault attack to break arm trustzone",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "rassle return address stack based sidechannel leakage",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 306,
    "paper_ids": [
      2380,
      2381,
      2382,
      2383
    ],
    "papers_without_artifact_ids": [
      2384,
      2385,
      1798,
      2386,
      2387
    ]
  },
  {
    "name": "François-Xavier Standaert",
    "display_name": "François-Xavier Standaert",
    "affiliation": "Université Catholique de Louvain",
    "artifact_count": 4,
    "total_papers": 19,
    "total_papers_by_conf": {
      "CHES": 19
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 2,
        "2022": 4,
        "2021": 5,
        "2025": 2,
        "2023": 6
      }
    },
    "artifact_rate": 21.1,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Security Order Does Not Matter",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations Towards Analytical Attacks against 32-bit Implementations",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "midpsquare leveraging the strong sidechannel security of primefield masking in software",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "primitivelevel vs implementationlevel dpa security a certified case study pleading for standardized leakageresilient cryptography",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "prime masking vs faults exponential security amplification against selected classes of attacks",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "dont learn what you already know schemeaware modeling for profiling sidechannel analysis against masking",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "information bounds and convergence rates for sidechannel security evaluators",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "protecting dilithium against leakage revisited sensitivity analysis and improved implementations",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "primefield masking in hardware and its soundness against lownoise sca attacks",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "bitslice masking and improved shuffling how and when to mix them in software",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "when bad news become good news towards usable instances of learning with physical errors",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "a finergrain analysis of the leakage non resilience of ocb",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "triplex an efficient and onepass leakageresistant mode of operation",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "exploring cryptophysical dark matter and learning with physical rounding towards secure and efficient fresh rekeying",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "learning parity with physical noise imperfections reductions and fpga prototype",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "improved leakageresistant authenticated encryption based on hardware aes coprocessors",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "provably secure hardware masking in the transition and glitchrobust probing model better safe than sorry",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 7914,
    "paper_ids": [
      2371,
      2388,
      2372,
      1815
    ],
    "papers_without_artifact_ids": [
      2389,
      2390,
      2391,
      2392,
      2374,
      2375,
      2376,
      2393,
      2394,
      1492,
      2377,
      2395,
      2396,
      2397,
      2379
    ]
  },
  {
    "name": "Fabio Campos",
    "display_name": "Fabio Campos",
    "affiliation": "Radboud University & RheinMain University of Applied Sciences",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2021": 1,
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021,
      2023,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CTIDH: faster constant-time CSIDH",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "dCTIDH: Fast & Deterministic CTIDH",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Separating Oil and Vinegar with a Single Trace Side-Channel Assisted Kipnis-Shamir Attack on UOV",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 308,
    "paper_ids": [
      579,
      1806,
      2398,
      2399
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ming-Shing Chen",
    "display_name": "Ming-Shing Chen",
    "affiliation": "Academia Sinica",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "CHES": {
        "2022": 1,
        "2021": 2,
        "2023": 1
      }
    },
    "artifact_rate": 80.0,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Optimizing BIKE for the Intel Haswell and ARM Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Oil and Vinegar: Modern Parameters and Implementations",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OpenSSLNTRU: Faster post-quantum TLS key exchange",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "classic mceliece on the arm cortexm4",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 309,
    "paper_ids": [
      1466,
      2400,
      436,
      1808
    ],
    "papers_without_artifact_ids": [
      2401
    ]
  },
  {
    "name": "Gilles Barthe",
    "display_name": "Gilles Barthe",
    "affiliation": "Max Planck Society",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "CHES": {
        "2024": 1,
        "2021": 1,
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Let's DOIT: Using Intel's Extended HW/SW Contract for Secure Compilation of Crypto Code",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Formally verifying Kyber Episode IV: Implementation correctness",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"These results must be false\": A usability evaluation of constant-time analysis tools",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "highassurance zeroization",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "ultimate slh taking speculative load hardening to the next level",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 310,
    "paper_ids": [
      2402,
      1810,
      1812,
      1784
    ],
    "papers_without_artifact_ids": [
      1814,
      1525
    ]
  },
  {
    "name": "Le Guan",
    "display_name": "Le Guan",
    "affiliation": "University of Georgia",
    "artifact_count": 4,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 2,
      "WOOT": 1,
      "ACSAC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2021": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "WOOT": {
        "2024": 1
      },
      "ACSAC": {
        "2021": 1,
        "2019": 1,
        "2017": 1,
        "2020": 1
      }
    },
    "artifact_rate": 44.4,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SoK: Where's the \"up\"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Unveiling IoT Security in Reality: A Firmware-Centric Journey",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based Compartmentalization",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ics3fuzzer a framework for discovering protocol implementation bugs in ics supervisory software by fuzzing",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "automatic firmware emulation through invalidityguided knowledge inference",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "deviceagnostic firmware execution is possible a concolic execution approach for peripheral emulation",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "tfbiv transparent and finegrained binary integrity verification in the cloud",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "supporting transparent snapshot for baremetal malware analysis on mobile devices",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 311,
    "paper_ids": [
      167,
      1423,
      2403,
      176
    ],
    "papers_without_artifact_ids": [
      2404,
      2405,
      2262,
      2248,
      943
    ]
  },
  {
    "name": "Stefano Calzavara",
    "display_name": "Stefano Calzavara",
    "affiliation": "Ca' Foscari University of Venice, Italy",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2022": 1,
        "2021": 1
      },
      "PETS": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 80.0,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Web Platform Threats: Automated Detection of Web Security Issues With WPT",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Security Lottery: Measuring Client-Side Web Security Inconsistencies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Stochastic Models for Remote Timing Attacks",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "can i take your subdomain exploring samesite attacks in the modern web",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 312,
    "paper_ids": [
      2406,
      403,
      1184,
      2407
    ],
    "papers_without_artifact_ids": [
      2408
    ]
  },
  {
    "name": "Matteo Maffei",
    "display_name": "Matteo Maffei",
    "affiliation": "TU Wien",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "NDSS": 1,
      "ACSAC": 0,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2025": 1,
        "2021": 2
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {},
      "PETS": {}
    },
    "artifact_rate": 57.1,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Web Platform Threats: Automated Detection of Web Security Issues With WPT",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cookie Crumbles: Breaking and Fixing Web Session Integrity",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Let's Move2EVM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Alba: The Dawn of Scalable Bridges for Blockchains",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "glimpse ondemand pow light client with constantsize storage for defi",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "can i take your subdomain exploring samesite attacks in the modern web",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "blitz secure multihop payments without twophase commits",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 313,
    "paper_ids": [
      2406,
      2409,
      2410,
      2411
    ],
    "papers_without_artifact_ids": [
      2412,
      2408,
      2413
    ]
  },
  {
    "name": "Dimitrios Papadopoulos 0001",
    "display_name": "Dimitrios Papadopoulos",
    "affiliation": "HKUST",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "SC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 2,
        "2022": 1,
        "2025": 2
      },
      "SC": {},
      "NDSS": {}
    },
    "artifact_rate": 57.1,
    "repro_rate": 25.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hobbit: Space-Efficient zkSNARK with Optimal Prover Time",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OBLIVIATOR: OBLIVIous Parallel Joins and other OperATORs in Shared Memory Environments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dynamic searchable encryption with optimal search in the presence of deletions",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "seal attack mitigation for encrypted databases via adjustable leakage",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "mirage succinct arguments for randomized algorithms with applications to universal zksnarks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 314,
    "paper_ids": [
      2414,
      2415,
      2416,
      2417
    ],
    "papers_without_artifact_ids": [
      2418,
      2419,
      2420
    ]
  },
  {
    "name": "Gianluca Stringhini",
    "display_name": "Gianluca Stringhini",
    "affiliation": "Boston University",
    "artifact_count": 4,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "ACSAC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2023": 1,
        "2022": 1,
        "2021": 1
      },
      "ACSAC": {
        "2018": 1,
        "2017": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 44.4,
    "repro_rate": 75.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Enabling Contextual Soft Moderation on Social Media through Contrastive Textual Deviation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PIXELMOD: Improving Soft Moderation of Visual Misleading Information on Twitter",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Pandawan: Quantifying Progress in Linux-based Firmware Rehosting",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a largescale temporal measurement of android malicious apps persistence migration and lessons learned",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "socialheisting understanding stolen facebook accounts",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "lobo evaluation of generalization deficiencies in twitter bot classifiers",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "exray detection of historyleaking browser extensions",
        "conference": "ACSAC",
        "year": 2017
      },
      {
        "title": "marmite spreading malicious file reputation through download graphs",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 315,
    "paper_ids": [
      2421,
      2422,
      795,
      797
    ],
    "papers_without_artifact_ids": [
      2423,
      2424,
      2425,
      2426,
      2427
    ]
  },
  {
    "name": "Flavien Solt",
    "display_name": "Flavien Solt",
    "affiliation": "ETH Zurich",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 6
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2022": 1,
        "2025": 3
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Cascade: CPU Fuzzing via Intricate Program Generation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "McSee: Evaluating Advanced Rowhammer Attacks and Defenses via Automated DRAM Traffic Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lost in translation enabling confused deputy attacks on eda software with transfuzz",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "zenhammer rowhammer attacks on amd zenbased platforms",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 316,
    "paper_ids": [
      921,
      924,
      926,
      928
    ],
    "papers_without_artifact_ids": [
      929,
      930
    ]
  },
  {
    "name": "Alexandros Kapravelos",
    "display_name": "Alexandros Kapravelos",
    "affiliation": "North Carolina State University",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 80.0,
    "repro_rate": 0.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FV8: A Forced Execution JavaScript Engine for Detecting Evasive Techniques",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "UntrustIDE: Exploiting Weaknesses in VS Code Extensions",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "characterizing the security of github ci workflows",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 318,
    "paper_ids": [
      2428,
      1773,
      1116,
      2265
    ],
    "papers_without_artifact_ids": [
      2429
    ]
  },
  {
    "name": "Yasemin Acar",
    "display_name": "Yasemin Acar",
    "affiliation": "Paderborn University",
    "artifact_count": 4,
    "total_papers": 23,
    "total_papers_by_conf": {
      "USENIXSEC": 21,
      "ACSAC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 7,
        "2020": 1,
        "2023": 4,
        "2022": 2,
        "2025": 1,
        "2021": 6
      },
      "ACSAC": {
        "2018": 1
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 17.4,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"These results must be false\": A usability evaluation of constant-time analysis tools",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Security and Privacy Advice for UPI Users in India",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "those things are written by lawyers and programmers are reading that mapping the communication gap between software developers and privacy experts",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "but they have overlooked a few things in afghanistan an analysis of the integration of biometric voter verification in the 2019 afghan presidential elections",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "security and privacy software creators perspectives on unintended consequences",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "exploring digital security and privacy in relative poverty in germany through qualitative interviews",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "the challenges of bringing cryptography from research papers to products results from an interview study with experts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "you have to read 50 different rfcs that contradict each other an interview study on the experiences of implementing cryptographic standards",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a mixedmethods study on user experiences and challenges of recovery codes for an endtoend encrypted service",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "security is not my field im a stats guy a qualitative root cause analysis of barriers to adversarial machine learning defenses in industry",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "ethical frameworks and computer security trolley problems foundations for conversations",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "i wouldnt want my unsafe code to run my pacemaker an interview study on the use comprehension and perceived risks of unsafe rust",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "if you cant get them to the lab evaluating a virtual study environment with security information workers",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "its the company the government you and i user perceptions of responsibility for smart home privacy and security",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "on the limited impact of visualizing encryption perceptions of e2e messaging security",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "never ever or no matter what investigating adoption intentions and misconceptions about the coronawarnapp in germany",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "investigating web service account remediation advice",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "a largescale interview study on information security in and attacks against small and mediumsized enterprises",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "why eve and mallory still love android revisiting tls insecurity in android applications",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "cloudy with a chance of misconceptions exploring users perceptions and expectations of security and privacy in cloud office suites",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "a large scale investigation of obfuscation use in google play",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 319,
    "paper_ids": [
      1784,
      1240,
      1241,
      2430
    ],
    "papers_without_artifact_ids": [
      2431,
      2432,
      2433,
      2434,
      1250,
      1249,
      1248,
      1251,
      2435,
      1252,
      1253,
      2436,
      1254,
      1255,
      2437,
      1256,
      408,
      1257,
      1258
    ]
  },
  {
    "name": "Sebastian Roth",
    "display_name": "Sebastian Roth",
    "affiliation": "University of Bayreuth",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2022": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 25.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Trust Me If You Can - How Usable Is Trusted Types In Practice?",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Security Lottery: Measuring Client-Side Web Security Inconsistencies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TapTrap: Animation-Driven Tapjacking on Android",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 320,
    "paper_ids": [
      1183,
      403,
      1184,
      2438
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yisroel Mirsky",
    "display_name": "Yisroel Mirsky",
    "affiliation": "Ben-Gurion University of the Negev",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 80.0,
    "repro_rate": 25.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "What Was Your Prompt? A Remote Keylogging Attack on AI Assistants",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VulChecker: Graph-based Vulnerability Localization in Source Code",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cloak, Honey, Trap: Proactive Defenses Against LLM Agents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Transpose Attack: Stealing Datasets with Bidirectional Training",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deepreflect discovering malicious functionality through binary reconstruction",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 321,
    "paper_ids": [
      2439,
      1411,
      2440,
      2441
    ],
    "papers_without_artifact_ids": [
      1419
    ]
  },
  {
    "name": "Mayank Varia",
    "display_name": "Mayank Varia",
    "affiliation": "Boston University",
    "artifact_count": 4,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "PETS": 2,
      "SOSP": 0,
      "EUROSYS": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 2,
        "2021": 1
      },
      "PETS": {
        "2022": 1,
        "2026": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2026
    ],
    "year_range": "2022-2026",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Secure Account Recovery for a Privacy-Preserving Web Service",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TVA: A multi-party computation system for secure and expressive time series analytics",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Batched Differentially Private Information Retrieval",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Making Sense of Private Advertising: A Principled Approach to a Complex Ecosystem",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secrecy secure collaborative analytics in untrusted clouds",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "δindistinguishable mixing for cryptocurrencies",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "hecate abuse reporting in secure messengers with sealed sender",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "protecting cryptography against compelled selfincrimination",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 322,
    "paper_ids": [
      2442,
      2443,
      2444,
      2445
    ],
    "papers_without_artifact_ids": [
      2446,
      2447,
      2448,
      2449
    ]
  },
  {
    "name": "Nurullah Erinola",
    "display_name": "Nurullah Erinola",
    "affiliation": "",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Internet-Based State Learning of TLS State Machines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 323,
    "paper_ids": [
      583,
      584,
      586,
      590
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Luyi Xing",
    "display_name": "Luyi Xing",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 4,
    "total_papers": 15,
    "total_papers_by_conf": {
      "USENIXSEC": 11,
      "NDSS": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2020": 1,
        "2023": 3,
        "2022": 1,
        "2025": 1,
        "2021": 2
      },
      "NDSS": {
        "2024": 1,
        "2025": 3
      }
    },
    "artifact_rate": 26.7,
    "repro_rate": 75.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Towards Privacy-Preserving Social-Media SDKs on Android",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "X.509DoS: Exploiting and Detecting Denial-of-Service Vulnerabilities in Cryptographic Libraries using Crafted X.509 Certificates",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SKILLPoV: Towards Accessible and Effective Privacy Notice for Amazon Alexa Skills",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hidden and lost control on security design risks in iot userfacing matter controller",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "leaking the privacy of groups and more understanding privacy risks of crossapp content sharing in mobile ecosystem",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "navigating the privacy compliance maze understanding risks with privacyconfigurable mobile sdks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "ihunter hunting privacy violations at scale in the software supply chain on ios",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "lalaine measuring and characterizing noncompliance of apple privacy labels",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "union under duress understanding hazards of duplicate resource mismediation in android software supply chain",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "are you spying on me largescale analysis on iot data exposure through companion apps",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "how are your zombie accounts understanding users practices and expectations on mobile app account deletion",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "understanding malicious crosslibrary data harvesting on android",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "evil under the sun understanding and discovering attacks on ethereum decentralized applications",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "shattered chain of trust understanding security risks in crosscloud iot access delegation",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 324,
    "paper_ids": [
      2450,
      2451,
      2452,
      1456
    ],
    "papers_without_artifact_ids": [
      2453,
      248,
      605,
      2454,
      2455,
      607,
      608,
      2456,
      612,
      613,
      615
    ]
  },
  {
    "name": "Anwar Hithnawi",
    "display_name": "Anwar Hithnawi",
    "affiliation": "University of Toronto",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 4,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2025": 1
      },
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Holding Secrets Accountable: Auditing Privacy-Preserving Machine Learning",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HECO: Fully Homomorphic Encryption Compiler",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CoVault: Secure, Scalable Analytics of Personal Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Zeph: Cryptographic Enforcement of End-to-End Data Privacy",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "timecrypt encrypted data stream processing at scale with cryptographic access control",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "droplet decentralized authorization and access control for encrypted data streams",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 325,
    "paper_ids": [
      2457,
      2458,
      1967,
      2459
    ],
    "papers_without_artifact_ids": [
      2460,
      2461
    ]
  },
  {
    "name": "Eran Tromer",
    "display_name": "Eran Tromer",
    "affiliation": "Boston University",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "CHES": 0,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 2,
        "2022": 1,
        "2021": 1
      },
      "CHES": {},
      "PETS": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 57.1,
    "repro_rate": 75.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lend me your ear passive remote physical side channels on pcs",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "gage mpc bypassing residual function leakage for noninteractive mpc",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "you autocomplete me poisoning vulnerabilities in neural code completion",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 326,
    "paper_ids": [
      2462,
      2463,
      2464,
      460
    ],
    "papers_without_artifact_ids": [
      1508,
      2465,
      1846
    ]
  },
  {
    "name": "Shweta Shinde",
    "display_name": "Shweta Shinde",
    "affiliation": "ETH Zurich",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "EUROSYS": 0,
      "ACSAC": 1,
      "CHES": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "EUROSYS": {},
      "ACSAC": {
        "2024": 1
      },
      "CHES": {},
      "NDSS": {}
    },
    "artifact_rate": 57.1,
    "repro_rate": 25.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Elasticlave: An Efficient Memory Model for Enclaves",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Dorami: Privilege Separating Security Monitor on RISC-V TEEs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "confidential computing with heterogeneous devices at cloudscale",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "heckler breaking confidential vms with malicious interrupts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "besfs a posix filesystem for enclaves with a mechanized safety proof",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 327,
    "paper_ids": [
      2466,
      2467,
      1769,
      2468
    ],
    "papers_without_artifact_ids": [
      1230,
      2469,
      1771
    ]
  },
  {
    "name": "Qinge Xie",
    "display_name": "Qinge Xie",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Building an Open, Robust, and Stable Voting-Based Domain Top List",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Evaluating Privacy Policies under Modern Privacy Laws At Scale: An LLM-Based Automated Approach",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 328,
    "paper_ids": [
      2470,
      901,
      1539,
      2471
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Karel Kubicek 0001",
    "display_name": "Karel Kubicek",
    "affiliation": "BITS Pilani",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      },
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 80.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Automated Large-Scale Analysis of Cookie Notice Compliance",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automating Cookie Consent and GDPR Violation Detection",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Block Cookies, Not Websites: Analysing Mental Models and Usability of the Privacy-Preserving Browser Extension CookieBlock",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "checking websites gdpr consent compliance for marketing emails",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 329,
    "paper_ids": [
      441,
      443,
      447,
      2472
    ],
    "papers_without_artifact_ids": [
      456
    ]
  },
  {
    "name": "Ali Abbasi 0002",
    "display_name": "Ali Abbasi",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 4,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 2,
      "EUROSYS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2022": 2,
        "2021": 1
      },
      "NDSS": {
        "2025": 2
      },
      "EUROSYS": {
        "2022": 1
      },
      "ACSAC": {
        "2017": 1
      }
    },
    "artifact_rate": 44.4,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SoK: Security of Programmable Logic Controllers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Loki: Hardening Code Obfuscation Against Automated Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a comprehensive memory safety analysis of bootloaders",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "nyxnet network fuzzing with incremental snapshots",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "nyx greybox hypervisor fuzzing using fast snapshots and affine types",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "aurora statistical crash analysis for automated root cause explanation",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "ecfi asynchronous control flow integrity for programmable logic controllers",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 330,
    "paper_ids": [
      2473,
      105,
      106,
      111
    ],
    "papers_without_artifact_ids": [
      112,
      117,
      118,
      122,
      124
    ]
  },
  {
    "name": "Zhen Ling 0001",
    "display_name": "Zhen Ling",
    "affiliation": "Southeast University",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 3
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Distributed Private Aggregation in Graph Neural Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ldr secure and efficient linux driver runtime for embedded tee systems",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "relation mining under local differential privacy",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 331,
    "paper_ids": [
      1874,
      1875,
      1877,
      2474
    ],
    "papers_without_artifact_ids": [
      2475,
      2476
    ]
  },
  {
    "name": "Junzhou Luo",
    "display_name": "Junzhou Luo",
    "affiliation": "",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ATC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 3
      },
      "ATC": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Distributed Private Aggregation in Graph Neural Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ldr secure and efficient linux driver runtime for embedded tee systems",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "relation mining under local differential privacy",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 332,
    "paper_ids": [
      1874,
      1875,
      1877,
      2474
    ],
    "papers_without_artifact_ids": [
      2475,
      2476
    ]
  },
  {
    "name": "Xinwen Fu",
    "display_name": "Xinwen Fu",
    "affiliation": "University of Massachusetts Lowell",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "PETS": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2025": 3
      },
      "PETS": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 57.1,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Distributed Private Aggregation in Graph Neural Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ldr secure and efficient linux driver runtime for embedded tee systems",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "relation mining under local differential privacy",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "breaking secure pairing of bluetooth low energy using downgrade attacks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 333,
    "paper_ids": [
      1874,
      1875,
      1877,
      2474
    ],
    "papers_without_artifact_ids": [
      2475,
      2476,
      397
    ]
  },
  {
    "name": "Jonas Juffinger",
    "display_name": "Jonas Juffinger",
    "affiliation": "Graz University of Technology",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 57.1,
    "repro_rate": 75.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Half-Double: Hammering From the Next Row Over",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "KernelSnitch: Side Channel-Attacks on Kernel Data Structures",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secret spilling drive leaking user behavior through ssd contention",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "teecorrelate an informationpreserving defense against performancecounter attacks on tees",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "idleleak exploiting idle state side effects for information leakage",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 334,
    "paper_ids": [
      335,
      272,
      337,
      276
    ],
    "papers_without_artifact_ids": [
      340,
      342,
      343
    ]
  },
  {
    "name": "Sang Kil Cha",
    "display_name": "Sang Kil Cha",
    "affiliation": "KAIST",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 3
      },
      "NSDI": {
        "2010": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 80.0,
    "repro_rate": 75.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Reassembly is Hard: A Reflection on Challenges and Strategies",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BotScreen: Trust Everybody, but Cut the Aimbots Yourself",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DAFL: Directed Grey-box Fuzzing guided by Data Dependency",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "splitscreen enabling efficient distributed malware detection",
        "conference": "NSDI",
        "year": 2010
      }
    ],
    "author_id": 335,
    "paper_ids": [
      1714,
      2477,
      2478,
      2479
    ],
    "papers_without_artifact_ids": [
      2480
    ]
  },
  {
    "name": "Dave Levin",
    "display_name": "Dave Levin",
    "affiliation": "Univ. of Maryland - College Park",
    "artifact_count": 4,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "PETS": 1,
      "EUROSYS": 0,
      "WOOT": 0,
      "NSDI": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 2,
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "PETS": {
        "2025": 1
      },
      "EUROSYS": {},
      "WOOT": {},
      "NSDI": {
        "2009": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 44.4,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Achieving Keyless CDNs with Conclaves",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Buy it Now, Track Me Later: Attacking User Privacy via Wi-Fi AP Online Auctions",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "as advertised understanding the impact of influencer vpn ads",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "weaponizing middleboxes for tcp reflected amplification",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "detecting and evading censorshipindepth a case study of irans protocol whitelister",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "symbiotic relationships in internet routing overlays",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "trinc small trusted hardware for large distributed systems",
        "conference": "NSDI",
        "year": 2009
      }
    ],
    "author_id": 336,
    "paper_ids": [
      2184,
      884,
      2481,
      2482
    ],
    "papers_without_artifact_ids": [
      1264,
      2483,
      2484,
      2485,
      2486
    ]
  },
  {
    "name": "Insu Yun",
    "display_name": "Insu Yun",
    "affiliation": "KAIST",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "ATC": 0,
      "ACSAC": 0,
      "NDSS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 2,
        "2021": 1
      },
      "ATC": {},
      "ACSAC": {},
      "NDSS": {},
      "OSDI": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Automatic Techniques to Systematically Discover New Heap Exploitation Primitives",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "doltest indepth downlink negative testing framework for lte devices",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "preventing useafterfree attacks with fast forward allocation",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 337,
    "paper_ids": [
      655,
      2331,
      1123,
      2332
    ],
    "papers_without_artifact_ids": [
      2334,
      534
    ]
  },
  {
    "name": "Saeed Mahloujifar",
    "display_name": "Saeed Mahloujifar",
    "affiliation": "Princeton University, E-mail: {sfar, liweis",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 2
      },
      "PETS": {
        "2022": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 80.0,
    "repro_rate": 75.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Towards A Proactive ML Approach for Detecting Backdoor Poison Samples",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Machine Learning with Differentially Private Labels: Mechanisms and Frameworks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "horus granular innetwork task scheduler for cloud datacenters",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 338,
    "paper_ids": [
      127,
      130,
      131,
      133
    ],
    "papers_without_artifact_ids": [
      2487
    ]
  },
  {
    "name": "Jan H. Klemmer",
    "display_name": "Jan H. Klemmer",
    "affiliation": "",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2025": 2
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 25.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "How Transparent is Usable Privacy and Security Research? A Meta-Study on Current Research Transparency Practices",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"That's my perspective from 30 years of doing this\": An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "you have to read 50 different rfcs that contradict each other an interview study on the experiences of implementing cryptographic standards",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "if you cant get them to the lab evaluating a virtual study environment with security information workers",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 339,
    "paper_ids": [
      1240,
      1242,
      1243,
      1245
    ],
    "papers_without_artifact_ids": [
      1249,
      1253
    ]
  },
  {
    "name": "Chaoshun Zuo",
    "display_name": "Chaoshun Zuo",
    "affiliation": "",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 3
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AUTOVR: Automated UI Exploration for Detecting Sensitive Data Flow Exposures in Virtual Reality Apps",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a thorough security analysis of ble proximity tracking protocols",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "firmscope automatic uncovering of privilegeescalation vulnerabilities in preinstalled apps in android firmware",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 340,
    "paper_ids": [
      381,
      383,
      384,
      2488
    ],
    "papers_without_artifact_ids": [
      2489,
      399
    ]
  },
  {
    "name": "Elaine Shi",
    "display_name": "Elaine Shi",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 2,
      "SOSP": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "PETS": {
        "2024": 2
      },
      "SOSP": {},
      "NDSS": {}
    },
    "artifact_rate": 80.0,
    "repro_rate": 75.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "EnigMap: External-Memory Oblivious Map for Secure Enclaves",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Polynomial Commitment with a One-to-Many Prover and Applications",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "microsecagg streamlined singleserver secure aggregation",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 341,
    "paper_ids": [
      2490,
      1402,
      2491,
      1404
    ],
    "papers_without_artifact_ids": [
      2492
    ]
  },
  {
    "name": "Liang Wang 0054",
    "display_name": "Liang Wang",
    "affiliation": "Princeton University",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2021": 1
      },
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2026": 1
      }
    },
    "artifact_rate": 57.1,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "How Effective is Multiple-Vantage-Point Domain Control Validation?",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Creating a Secure Underlay for the Internet",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Leveraging strategic connection migration-powered traffic splitting for privacy",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "quicstep evaluating connection migration based quic censorship circumvention",
        "conference": "PETS",
        "year": 2026
      },
      {
        "title": "experiences deploying multivantagepoint domain validation at lets encrypt",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "mimiq masking ips with migration in quic",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 342,
    "paper_ids": [
      128,
      129,
      134,
      136
    ],
    "papers_without_artifact_ids": [
      140,
      142,
      2493
    ]
  },
  {
    "name": "Yuanyuan Yuan 0001",
    "display_name": "Yuanyuan Yuan",
    "affiliation": "IISc Bangalore",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 3,
        "2022": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 57.1,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Precise and Generalized Robustness Certification for Neural Networks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Decompiling x86 Deep Neural Network Executables",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automated Side Channel Analysis of Media Software with Manifold Learning",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "compiled models builtin exploits uncovering pervasive bitflip attack surfaces in dnn executables",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "bitshield defending against bitflip attacks on dnn executables",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "mpcdiff testing and repairing mpchardened deep learning models",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 343,
    "paper_ids": [
      945,
      946,
      947,
      948
    ],
    "papers_without_artifact_ids": [
      953,
      954,
      955
    ]
  },
  {
    "name": "Zhuotao Liu",
    "display_name": "Zhuotao Liu",
    "affiliation": "Tsinghua University",
    "artifact_count": 4,
    "total_papers": 13,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "ATC": 1,
      "ACSAC": 1,
      "NSDI": 2,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 2,
        "2022": 2,
        "2025": 1
      },
      "ATC": {
        "2023": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "NSDI": {
        "2024": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 2
      }
    },
    "artifact_rate": 30.8,
    "repro_rate": 25.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "An Efficient Design of Intelligent Network Data Plane",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Back-Propagating System Dependency Impact for Attack Investigation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CertTA: Certified Robustness Made Practical for Learning-Based Traffic Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pred performanceoriented random early detection for consistently stable performance in datacenters",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "lowquality training data only a robust framework for detecting encrypted malicious network traffic",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "pencil private and extensible collaborative learning without the noncolluding assumption",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "brainonswitch towards advanced intelligent network data plane via nndriven traffic analysis at linespeed",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "defending against data reconstruction attacks in federated learning an information theory approach",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "learning with semantics towards a semanticsaware routing anomaly detection system",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "change management in physical network lifecycle automation",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "cross container attacks the bewildered ebpf on clouds",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "on detecting growingup behaviors of malicious accounts in privacycentric mobile social networks",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 344,
    "paper_ids": [
      546,
      2494,
      547,
      2495
    ],
    "papers_without_artifact_ids": [
      2496,
      559,
      554,
      560,
      567,
      566,
      2497,
      572,
      575
    ]
  },
  {
    "name": "Ke Xu 0002",
    "display_name": "Ke Xu",
    "affiliation": "Tsinghua University",
    "artifact_count": 4,
    "total_papers": 18,
    "total_papers_by_conf": {
      "USENIXSEC": 9,
      "NDSS": 6,
      "EUROSYS": 0,
      "ACSAC": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2023": 3,
        "2022": 2,
        "2025": 1
      },
      "NDSS": {
        "2024": 4,
        "2025": 2
      },
      "EUROSYS": {},
      "ACSAC": {
        "2021": 1
      },
      "NSDI": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 22.2,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "An Efficient Design of Intelligent Network Data Plane",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CertTA: Certified Robustness Made Practical for Learning-Based Traffic Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "offpath tcp hijacking in wifi networks a packetsize side channel attack",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "redan an empirical study on remote dos attacks against nat networks",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "pred performanceoriented random early detection for consistently stable performance in datacenters",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "lowquality training data only a robust framework for detecting encrypted malicious network traffic",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "pencil private and extensible collaborative learning without the noncolluding assumption",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "exploiting sequence number leakage tcp hijacking in natenabled wifi networks",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "brainonswitch towards advanced intelligent network data plane via nndriven traffic analysis at linespeed",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "defending against data reconstruction attacks in federated learning an information theory approach",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "transferability of whitebox perturbations queryefficient adversarial attacks against commercial dnn services",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "learning with semantics towards a semanticsaware routing anomaly detection system",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "cross container attacks the bewildered ebpf on clouds",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "subverting website fingerprinting defenses with robust traffic representation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "offpath network traffic manipulation via revitalized icmp redirect attacks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "try before you buy privacypreserving data evaluation on cloudbased machine learning data marketplace",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 345,
    "paper_ids": [
      546,
      547,
      2495,
      550
    ],
    "papers_without_artifact_ids": [
      551,
      552,
      2496,
      559,
      554,
      553,
      560,
      567,
      564,
      566,
      572,
      573,
      574,
      576
    ]
  },
  {
    "name": "Lorrie Faith Cranor",
    "display_name": "Lorrie Faith Cranor",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 4,
    "total_papers": 19,
    "total_papers_by_conf": {
      "USENIXSEC": 8,
      "NDSS": 1,
      "PETS": 9,
      "ATC": 0,
      "ACSAC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 1,
        "2022": 3,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2022": 3,
        "2023": 1,
        "2025": 1,
        "2024": 2,
        "2021": 2
      },
      "ATC": {},
      "ACSAC": {},
      "FAST": {
        "2009": 1
      }
    },
    "artifact_rate": 21.1,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Are Consumers Willing to Pay for Security and Privacy of IoT Devices?",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "User-friendly yet rarely read: A case study on the redesign of an online HIPAA authorization",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Increasing Adoption of Tor Browser Using Informational and Planning Nudges",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Kids Are All Right: Investigating the Susceptibility of Teens and Adults to YouTube Giveaway Scams",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rethinking fingerprinting an assessment of behaviorbased methods at scale and implications for web tracking",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "privacy solution or menace investigating perceptions of radiofrequency sensing",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "exploring the privacy experiences of closeted users of online dating services in the us",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "data safety vs app privacy comparing the usability of android and ios privacy labels",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "it was honestly just gambling investigating the experiences of teenage cryptocurrency users on reddit",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "exploring expandablegrid designs to make ios app privacy labels more usable",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "is there a reverse privacy paradox an exploratory analysis of gaps between privacy perspectives and privacyseeking behaviors",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "how usable are ios app privacy labels",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "evaluating the usability of privacy choice mechanisms",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "is it a concern or a preference an investigation into the ability of privacy scales to capture and distinguish granular privacy constructs",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "detecting iphone security compromise in simulated stalking scenarios strategies and obstacles",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "awareness adoption and misconceptions of web privacy tools",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "did you know this camera tracks your mood understanding privacy expectations and preferences in the age of video analytics",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "from intent to action nudging users towards secure mobile payments",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "perspective semantic data management for the home",
        "conference": "FAST",
        "year": 2009
      }
    ],
    "author_id": 346,
    "paper_ids": [
      2498,
      2499,
      2500,
      2501
    ],
    "papers_without_artifact_ids": [
      2502,
      2503,
      2504,
      2505,
      2506,
      2507,
      2508,
      2509,
      2510,
      2511,
      2512,
      2513,
      1826,
      2514,
      1337
    ]
  },
  {
    "name": "Michail Maniatakos",
    "display_name": "Michail Maniatakos",
    "affiliation": "New York University Abu Dhabi, UAE",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 80.0,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GlitchFHE: Attacking Fully Homomorphic Encryption Using Fault Injection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Recurrent Private Set Intersection for Unbalanced Databases with Cuckoo Hashing and Leveled FHE",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ICSQuartz: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial Control Systems",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "icsfuzz manipulating ios and repurposing binary code to enable instrumented fuzzing in ics control applications",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 347,
    "paper_ids": [
      2515,
      2516,
      2517,
      2518
    ],
    "papers_without_artifact_ids": [
      2519
    ]
  },
  {
    "name": "Charlie Jacomme",
    "display_name": "Charlie Jacomme",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 6
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 4,
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A comprehensive, formal and automated analysis of the EDHOC protocol",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SAPIC+: protocol verifiers of the world, unite!",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "formal verification of the pqxdh postquantum key agreement protocol for endtoend secure messaging",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "hash gone bad automated discovery of protocol attacks that exploit hash function weaknesses",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 348,
    "paper_ids": [
      1880,
      1881,
      2520,
      2521
    ],
    "papers_without_artifact_ids": [
      2522,
      1882
    ]
  },
  {
    "name": "Cong Wang 0001",
    "display_name": "Cong Wang",
    "affiliation": "City University of Hong Kong",
    "artifact_count": 4,
    "total_papers": 13,
    "total_papers_by_conf": {
      "USENIXSEC": 8,
      "EUROSYS": 1,
      "ATC": 1,
      "NSDI": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1,
        "2022": 2,
        "2025": 3
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {
        "2023": 1
      },
      "NSDI": {
        "2023": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 30.8,
    "repro_rate": 75.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ALERT: Machine Learning-Enhanced Risk Estimation for Databases Supporting Encrypted Queries",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "H2O2RAM: A High-Performance Hierarchical Doubly Oblivious RAM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ring of gyges accountable anonymous broadcast via secretshared shuffle",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "nonintrusive and unconstrained keystroke inference in vr platforms via infrared side channel",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "more simplicity for trainers more opportunity for attackers blackbox attacks on speaker recognition systems by inferring feature extractor",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "hijacking attacks against neural network by analyzing training data",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "accelerating distributed moe training and inference with lina",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "lyra elastic scheduling for deep learning clusters",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "boomerang metadataprivate messaging under hardware trust",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "sgxlock towards efficiently establishing mutual distrust between host application and enclave for sgx",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "teacher model fingerprinting attacks against transfer learning",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 349,
    "paper_ids": [
      687,
      1202,
      2523,
      2524
    ],
    "papers_without_artifact_ids": [
      2525,
      2526,
      565,
      562,
      2527,
      2528,
      319,
      322,
      207
    ]
  },
  {
    "name": "Kyle Zeng",
    "display_name": "Kyle Zeng",
    "affiliation": "Arizona State University",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 2,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 80.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "take a step further understanding page spray in linux kernel exploitation",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 350,
    "paper_ids": [
      819,
      820,
      821,
      822
    ],
    "papers_without_artifact_ids": [
      826
    ]
  },
  {
    "name": "Anastasia Shuba",
    "display_name": "Anastasia Shuba",
    "affiliation": "Independent Researcher",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2020": 2,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The TV is Smart and Full of Trackers: Measuring Smart TV Advertising and Tracking",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NoMoATS: Towards Automatic Detection of Mobile Tracking",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 351,
    "paper_ids": [
      961,
      808,
      962,
      2529
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shagufta Mehnaz",
    "display_name": "Shagufta Mehnaz",
    "affiliation": "Pennsylvania State University",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "PETS": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Disparate Privacy Vulnerability: Targeted Attribute Inference Attacks and Defenses",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Sentence Level Inference Attack Against Pre-trained Language Models",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GNNBleed: Inference Attacks to Unveil Private Edges in Graphs with Realistic Access to GNN Models",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 352,
    "paper_ids": [
      1167,
      2530,
      2531,
      2532
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ehsanul Kabir",
    "display_name": "Ehsanul Kabir",
    "affiliation": "Penn State University",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "PETS": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Disparate Privacy Vulnerability: Targeted Attribute Inference Attacks and Defenses",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Sentence Level Inference Attack Against Pre-trained Language Models",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GNNBleed: Inference Attacks to Unveil Private Edges in Graphs with Realistic Access to GNN Models",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 353,
    "paper_ids": [
      1167,
      2530,
      2531,
      2532
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nishanth Chandran",
    "display_name": "Nishanth Chandran",
    "affiliation": "Microsoft Research",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 5,
      "NDSS": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2022": 2,
        "2023": 1,
        "2025": 1,
        "2024": 1
      },
      "NDSS": {},
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 57.1,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LLAMA: A Low Latency Math Library for Secure Inference",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SIGMA: Secure GPT Inference with Function Secret Sharing",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "communication efficient secure and private multiparty deep learning",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "endtoend privacy preserving training and inference for air pollution forecasting with data from rival fleets",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "blockene a highthroughput blockchain over mobile devices",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 354,
    "paper_ids": [
      2533,
      2534,
      2535,
      2536
    ],
    "papers_without_artifact_ids": [
      2537,
      2538,
      2539
    ]
  },
  {
    "name": "Divya Gupta 0001",
    "display_name": "Divya Gupta",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 4,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 5,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "PETS": {
        "2022": 2,
        "2023": 1,
        "2025": 1,
        "2024": 1
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LLAMA: A Low Latency Math Library for Secure Inference",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SIGMA: Secure GPT Inference with Function Secret Sharing",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "communication efficient secure and private multiparty deep learning",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "endtoend privacy preserving training and inference for air pollution forecasting with data from rival fleets",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "secure floatingpoint training",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "blockene a highthroughput blockchain over mobile devices",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 355,
    "paper_ids": [
      2533,
      2534,
      2535,
      2536
    ],
    "papers_without_artifact_ids": [
      2537,
      2538,
      2540,
      2539
    ]
  },
  {
    "name": "Rahul Chatterjee 0001",
    "display_name": "Rahul Chatterjee",
    "affiliation": "University of Wisconsin - Madison",
    "artifact_count": 4,
    "total_papers": 16,
    "total_papers_by_conf": {
      "USENIXSEC": 12,
      "PETS": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 4,
        "2022": 4,
        "2025": 3
      },
      "PETS": {
        "2022": 1,
        "2025": 1,
        "2024": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Data Access Minimization in Trigger-Action Platforms",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Might I Get Pwned: A Second Generation Compromised Credential Checking Service",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Detecting Compromise of Passkey Storage on the Cloud",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "can social media privacy and safety features protect targets of interpersonal attacks a systematic analysis",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "a framework for abusability analysis the case of passkeys in interpersonal threat models",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "abusability of automation apps in intimate partner violence",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "compact approximating complex activation functions for secure computation",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "scalable metadatahiding for privacypreserving iot systems",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "i really just leaned on my community for support barriers challenges and coping mechanisms used by survivors of technologyfacilitated abuse to seek social support",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "abuse vectors a framework for conceptualizing iotenabled interpersonal abuse",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "araña discovering and characterizing password guessing attacks in practice",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "its the equivalent of feeling like youre in jail lessons from firsthand and secondhand accounts of iotenabled intimate partner abuse",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "sneaky spy devices and defective detectors the ecosystem of intimate partner surveillance with covert devices",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "gossamer securely measuring passwordbased logins",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "experimental security analysis of the app model in business collaboration platforms",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 356,
    "paper_ids": [
      2541,
      2542,
      2543,
      2544
    ],
    "papers_without_artifact_ids": [
      2545,
      2546,
      2547,
      2548,
      2549,
      2550,
      2551,
      2552,
      2553,
      2554,
      2555,
      2556
    ]
  },
  {
    "name": "Erman Ayday",
    "display_name": "Erman Ayday",
    "affiliation": "Case Western Reserve University",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 5,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2024": 2,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Back-Propagating System Dependency Impact for Attack Investigation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Robust Fingerprint of Privacy-Preserving Location Trajectories",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AUTOLYCUS: Exploiting Explainable Artificial Intelligence (XAI) for Model Extraction Attacks against Interpretable Models",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacypreserving fingerprinting against collusion and correlation threats in genomic data",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "genome reconstruction attacks against genomic datasharing beacons",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 357,
    "paper_ids": [
      2494,
      2557,
      2558,
      2559
    ],
    "papers_without_artifact_ids": [
      2560,
      2561
    ]
  },
  {
    "name": "Sameer Wagh",
    "display_name": "Sameer Wagh",
    "affiliation": "SecretBit Ventures LLC",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2022": 2,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 80.0,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Piranha: A GPU Platform for Secure Computation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Athena: Probabilistic Verification of Machine Unlearning",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pika secure computation using function secret sharing over rings",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 358,
    "paper_ids": [
      669,
      135,
      2562,
      138
    ],
    "papers_without_artifact_ids": [
      2563
    ]
  },
  {
    "name": "Baojun Liu 0002",
    "display_name": "Baojun Liu",
    "affiliation": "VU Amsterdam",
    "artifact_count": 4,
    "total_papers": 17,
    "total_papers_by_conf": {
      "USENIXSEC": 13,
      "ACSAC": 1,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2020": 1,
        "2023": 2,
        "2022": 2,
        "2025": 3,
        "2021": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 23.5,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building an Open, Robust, and Stable Voting-Based Domain Top List",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Misty Registry: An Empirical Study of Flawed Domain Registry Operation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hades attack understanding and evaluating manipulation risks of email blocklists",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "revealing the black box of device search engine scanning assets strategies and ethical consideration",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "understanding the implementation and security implications of protective dns services",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "tickets or privacy understand the ecosystem of chinese ticket grabbing apps",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "cross the zone toward a covert domain hijacking via shared dns infrastructure",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "into the dark unveiling internal site search abused for black hat seo",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "rethinking the security threats of stale dns glue records",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "the maginot line attacking the boundary of dns caching protection",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "temporal cdnconvex lens a cdnassisted practical pulsing ddos attack",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "a largescale and longitudinal measurement study of dkim deployment",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "detecting and characterizing sms spearphishing attacks",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "weak links in authentication chains a largescale analysis of email sender spoofing attacks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "poison over troubled forwarders a cache poisoning attack targeting dns forwarding devices",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 359,
    "paper_ids": [
      901,
      232,
      902,
      242
    ],
    "papers_without_artifact_ids": [
      247,
      245,
      909,
      911,
      913,
      914,
      912,
      569,
      916,
      917,
      918,
      259,
      920
    ]
  },
  {
    "name": "Qian Wang 0002",
    "display_name": "Qian Wang",
    "affiliation": "Wuhan University",
    "artifact_count": 4,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "NDSS": 3,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1,
        "2022": 1,
        "2025": 2
      },
      "NDSS": {
        "2024": 2,
        "2025": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ring of gyges accountable anonymous broadcast via secretshared shuffle",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "printlistener uncovering the vulnerability of fingerprint authentication via the finger friction sound",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "more simplicity for trainers more opportunity for attackers blackbox attacks on speaker recognition systems by inferring feature extractor",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "hijacking attacks against neural network by analyzing training data",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "boomerang metadataprivate messaging under hardware trust",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "kenku towards efficient and stealthy blackbox adversarial attacks against asr systems",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 360,
    "paper_ids": [
      547,
      1202,
      2564,
      550
    ],
    "papers_without_artifact_ids": [
      2525,
      558,
      565,
      562,
      319,
      570
    ]
  },
  {
    "name": "Song Bian 0001",
    "display_name": "Song Bian",
    "affiliation": "IIT Bombay",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2,
        "2021": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 80.0,
    "repro_rate": 75.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Aion: Robust and Efficient Multi-Round Single-Mask Secure Aggregation Against Malicious Participants",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "virtual secure platform a fivestage pipeline processor over tfhe",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 361,
    "paper_ids": [
      2565,
      2566,
      2567,
      1134
    ],
    "papers_without_artifact_ids": [
      2568
    ]
  },
  {
    "name": "Chun Chen 0001",
    "display_name": "Chun Chen",
    "affiliation": "Zhejiang University",
    "artifact_count": 4,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 6
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 6
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Membership Inference Attacks Against Vision-Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: On Gradient Leakage in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the atomicity and efficiency of blockchain payment channels",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "efficient 2pc for constant round secure equality testing and comparison",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 362,
    "paper_ids": [
      300,
      301,
      187,
      302
    ],
    "papers_without_artifact_ids": [
      310,
      311
    ]
  },
  {
    "name": "Zhan Qin",
    "display_name": "Zhan Qin",
    "affiliation": "Zhejiang University",
    "artifact_count": 4,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 3
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 57.1,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Membership Inference Attacks Against Vision-Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Purity to Peril: Backdooring Merged Models From \"Harmless\" Benign Components",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Delay-allowed Differentially Private Data Stream Release",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "explanation as a watermark towards harmless and multibit model ownership verification via watermarking feature attribution",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "micguard a comprehensive detection system against outofband injection attacks for different level microphonebased devices",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "property existence inference against generative models",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 363,
    "paper_ids": [
      301,
      187,
      2569,
      303
    ],
    "papers_without_artifact_ids": [
      308,
      315,
      2570
    ]
  },
  {
    "name": "Manuel Rigger",
    "display_name": "Manuel Rigger",
    "affiliation": "National University of Singapore",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 3,
      "USENIXSEC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2023": 1,
        "2020": 1
      },
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 80.0,
    "repro_rate": 25.0,
    "functional_rate": 75.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Fuzzing the PHP Interpreter via Dataflow Fusion",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SANRAZOR: Reducing Redundant Sanitizer Checks in C/C++ Programs",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Detecting Transactional Bugs in Database Engines via Graph-Based Oracle Construction",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Testing Database Engines via Pivoted Query Synthesis",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "validating database system isolation level implementations with version certificate recovery",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 364,
    "paper_ids": [
      2571,
      951,
      1030,
      1031
    ],
    "papers_without_artifact_ids": [
      2572
    ]
  },
  {
    "name": "Aniket Kate",
    "display_name": "Aniket Kate",
    "affiliation": "Purdue University",
    "artifact_count": 4,
    "total_papers": 11,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 6,
      "EUROSYS": 0,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "PETS": {
        "2020": 3,
        "2022": 2,
        "2023": 1
      },
      "EUROSYS": {},
      "ACSAC": {
        "2018": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 36.4,
    "repro_rate": 0.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Recover from Excessive Faults in Partially-Synchronous BFT SMR",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OrgAn: Organizational Anonymity with Low Latency",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RPM: Robust Anonymity at Scale",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "frontrunning attack in sharded blockchains and fair crossshard consensus",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "empirical understanding of deletion privacy experiences expectations and measures",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "blitz secure multihop payments without twophase commits",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "a tale of two trees one writes and other reads",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "moneymorph censorship resistant rendezvous using permissionless cryptocurrencies",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "comprehensive anonymity trilemma user coordination is not enough",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "why johnny cant make money with his contents pitfalls of designing and implementing content delivery apps",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 365,
    "paper_ids": [
      2573,
      2574,
      2575,
      2576
    ],
    "papers_without_artifact_ids": [
      2577,
      2578,
      2413,
      2579,
      2580,
      2581,
      2582
    ]
  },
  {
    "name": "Gururaj Saileshwar",
    "display_name": "Gururaj Saileshwar",
    "affiliation": "University of Toronto",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2,
        "2021": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Relocate-Vote: Using Sparsity Information to Exploit Ciphertext Side-Channels",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GPUHammer: Rowhammer Attacks on GPU Memories are Practical",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Teaching an Old Dog New Tricks: Verifiable FHE Using Commodity Hardware",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 366,
    "paper_ids": [
      1687,
      2583,
      2584,
      2585
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lujo Bauer",
    "display_name": "Lujo Bauer",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 4,
    "total_papers": 13,
    "total_papers_by_conf": {
      "NDSS": 3,
      "PETS": 5,
      "ATC": 0,
      "ACSAC": 0,
      "FAST": 1,
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 2,
        "2025": 1
      },
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2021": 2,
        "2026": 1
      },
      "ATC": {},
      "ACSAC": {},
      "FAST": {
        "2014": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 30.8,
    "repro_rate": 25.0,
    "functional_rate": 75.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2022,
      2024,
      2026
    ],
    "year_range": "2022-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Location-Enhanced Information Flow for Home Automations",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Group-based Robustness: A General Framework for Customized Robustness in the Real World",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Attributions for ML-based ICS Anomaly Detection: From Theory to Practice",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "transparency or information overload evaluating users comprehension and perceptions of the ios app privacy report",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "the impact of exposed passwords on honeyword efficacy",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "speculative privacy concerns about ar glasses data collection",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "adversarial training for rawbinary malware classifiers",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "detecting iphone security compromise in simulated stalking scenarios strategies and obstacles",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "i would have to evaluate their objections privacy tensions between smart home device owners and incidental users",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "did you know this camera tracks your mood understanding privacy expectations and preferences in the age of video analytics",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "how risky are real users ifttt applets",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "toward strong usable access control for shared distributed data",
        "conference": "FAST",
        "year": 2014
      }
    ],
    "author_id": 367,
    "paper_ids": [
      2586,
      2587,
      2588,
      2589
    ],
    "papers_without_artifact_ids": [
      2590,
      2591,
      2592,
      2593,
      2512,
      2594,
      1826,
      1827,
      1281
    ]
  },
  {
    "name": "Dimitris Mouris",
    "display_name": "Dimitris Mouris",
    "affiliation": "Nillion & University of Delaware",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 5,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 2,
        "2024": 2
      },
      "SC": {}
    },
    "artifact_rate": 80.0,
    "repro_rate": 25.0,
    "functional_rate": 25.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Delegated Private Matching For Compute",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secureed secure multiparty edit distance for genomic sequences",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 368,
    "paper_ids": [
      2595,
      2596,
      2597,
      2598
    ],
    "papers_without_artifact_ids": [
      2599
    ]
  },
  {
    "name": "Murali Annavaram",
    "display_name": "Murali Annavaram",
    "affiliation": "University of Southern California",
    "artifact_count": 4,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 4,
      "SC": 0,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 3,
        "2024": 1
      },
      "SC": {},
      "ATC": {},
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 80.0,
    "repro_rate": 25.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PIGEON: A High Throughput Framework for Private Inference of Neural Networks using Secure Multiparty Computation",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Meta-Learn to Unlearn: Enhanced Exact Machine Unlearning in Recommendation Systems with Meta-Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Edge Private Graph Neural Networks with Singular Value Perturbation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "checknrun a checkpointing system for training deep learning recommendation models",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 369,
    "paper_ids": [
      2600,
      2601,
      2602,
      2603
    ],
    "papers_without_artifact_ids": [
      2604
    ]
  },
  {
    "name": "Sébastien Gambs",
    "display_name": "Sébastien Gambs",
    "affiliation": "Université du Québec à Montréal",
    "artifact_count": 4,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 4,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2,
        "2024": 1,
        "2021": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "WaKA: Data Attribution using K-Nearest Neighbors and Membership Privacy Principles",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Privacy-preserving and Fairness-aware Federated Learning Framework",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Revealing the True Cost of Locally Differentially Private Protocols: An Auditing Perspective",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Growing synthetic data through differentially-private vine copulas",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7915,
    "paper_ids": [
      2605,
      2606,
      2607,
      2608
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ravi Netravali",
    "display_name": "Ravi Netravali",
    "affiliation": "Princeton University",
    "artifact_count": 4,
    "total_papers": 25,
    "total_papers_by_conf": {
      "OSDI": 4,
      "SOSP": 2,
      "ATC": 0,
      "NSDI": 19
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 2,
        "2022": 1,
        "2020": 1
      },
      "SOSP": {
        "2024": 2
      },
      "ATC": {},
      "NSDI": {
        "2021": 2,
        "2024": 4,
        "2025": 1,
        "2023": 6,
        "2016": 1,
        "2020": 2,
        "2022": 1,
        "2018": 2
      }
    },
    "artifact_rate": 16.0,
    "repro_rate": 50.0,
    "functional_rate": 75.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2021,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Horcrux: Automatic JavaScript Parallelism for Resource-Efficient Web Computation",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Jawa: Web Archival in the Era of JavaScript",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Semeru: A Memory-Disaggregated Managed Runtime",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mowgli passively learned rate control for realtime video",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "adrx annassisted wireless link rate adaptation for computeconstrained embedded gaming devices",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "netvigil robust and lowcost anomaly detection for eastwest data center security",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "madeye boosting live video analytics accuracy with adaptive camera configurations",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "sprinter speeding up highfidelity crawling of the modern web",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "apparate rethinking early exits to tame latencythroughput tensions in ml serving",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "improving dnn inference throughput using practical perinput compute adaptation",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "canvas isolated and adaptive swapping for multiapplications on remote memory",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "boggart towards generalpurpose acceleration of retrospective video analytics",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "gemel model merging for memoryefficient realtime video analytics at the edge",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "bamboo making preemptible instances resilient for affordable training of large dnns",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "dashlet taming swipe uncertainty for robust short video streaming",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "recl responsive resourceefficient continuous learning for video analytics",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "privid practical privacypreserving video analytics queries",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "alohamora reviving http2 push and preload by adapting policies on the fly",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "oblique accelerating page loads using symbolic execution",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "fawkes faster mobile page loads via appinspired static templating",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "abc a simple explicit congestion controller for wireless networks",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "vesper measuring timetointeractivity for web pages",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "prophecy accelerating mobile page loads using finalstate write logs",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "polaris faster page loads using finegrained dependency tracking",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 371,
    "paper_ids": [
      2609,
      1617,
      2610,
      2611
    ],
    "papers_without_artifact_ids": [
      2612,
      2613,
      2614,
      2615,
      2616,
      2617,
      2618,
      2619,
      2620,
      2621,
      1621,
      2622,
      2623,
      2624,
      2625,
      2626,
      2627,
      2628,
      2629,
      2630,
      2631
    ]
  },
  {
    "name": "Adam Belay",
    "display_name": "Adam Belay",
    "affiliation": "Massachusetts Inst. of Technology",
    "artifact_count": 4,
    "total_papers": 15,
    "total_papers_by_conf": {
      "OSDI": 4,
      "SOSP": 1,
      "EUROSYS": 1,
      "NSDI": 9
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 4
      },
      "SOSP": {
        "2024": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "NSDI": {
        "2024": 3,
        "2019": 2,
        "2025": 1,
        "2023": 3
      }
    },
    "artifact_rate": 26.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 4,
    "badges_functional": 4,
    "badges_reproducible": 4,
    "papers": [
      {
        "title": "AIFM: High-Performance, Application-Integrated Far Memory",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Caladan: Mitigating Interference at Microsecond Timescales",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Overload Control for µs-scale RPCs with Breakwater",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "quicksand harnessing stranded datacenter resources with granular computing",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "making kernel bypass practical for the cloud with junction",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "ldb an efficient latency profiling tool for multithreaded applications",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "harvesting idle memory for applicationmanaged soft state with midas",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "unifying serverless and microservice workloads with sigmaos",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "nu achieving microsecondscale resource fungibility with logical processes",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "protego overload control for applications with unpredictable lock contention",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "hermit lowlatency highthroughput and transparent remote memory via feedbackdirected asynchrony",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "performance evolution of mitigating transient execution attacks",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "shinjuku preemptive scheduling for μsecondscale tail latency",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "shenango achieving high cpu efficiency for latencysensitive datacenter workloads",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 754,
    "paper_ids": [
      2632,
      2633,
      985,
      2634
    ],
    "papers_without_artifact_ids": [
      2635,
      2636,
      2637,
      2638,
      1293,
      2639,
      2640,
      2641,
      1294,
      2642,
      2643
    ]
  },
  {
    "name": "Rishabh R. Iyer",
    "display_name": "Rishabh R. Iyer",
    "affiliation": "Univ. of California - Berkeley",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 2,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2024": 2
      },
      "NSDI": {
        "2019": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Achieving Microsecond-Scale Tail Latency Efficiently with Approximate Optimal Scheduling",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fast, Flexible, and Practical Kernel Extensions",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Performance Interfaces for Hardware Accelerators",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automatically reasoning about how systems code uses the cpu cache",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "performance interfaces for network functions",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "performance contracts for software network functions",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 372,
    "paper_ids": [
      1593,
      525,
      1594
    ],
    "papers_without_artifact_ids": [
      1596,
      1598,
      1599
    ]
  },
  {
    "name": "Jiawei Tyler Gu",
    "display_name": "Jiawei Tyler Gu",
    "affiliation": "University of Illinois at Urbana-Champaign, Champaign, Illinois, USA",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Acto: Automatic End-to-End Testing for Operation Correctness of Cloud System Management",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Automatic Reliability Testing For Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Anvil: Verifying Liveness of Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 373,
    "paper_ids": [
      616,
      621,
      622
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chen Wang 0039",
    "display_name": "Chen Wang",
    "affiliation": "IBM Thomas J. Watson Research Center, Yorktown Heights, NY, USA",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 2,
      "EUROSYS": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Acto: Automatic End-to-End Testing for Operation Correctness of Cloud System Management",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Power-aware Deep Learning Model Serving with μ-Serve",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AWARE: Automate Workload Autoscaling with Reinforcement Learning in Production Cloud Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a house united within itself sloawareness for onpremises containerized ml inference clusters via faro",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "towards pareto optimal throughput in small language model serving",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "reinforcement learning for resource management in multitenant serverless platforms",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 374,
    "paper_ids": [
      616,
      2644,
      2645
    ],
    "papers_without_artifact_ids": [
      2646,
      2647,
      2648
    ]
  },
  {
    "name": "Xinwei Fu",
    "display_name": "Xinwei Fu",
    "affiliation": "Amazon Web Services, Santa Clara, California, United States of America",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 3,
      "ATC": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 2
      },
      "ATC": {},
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GEMINI: Fast Failure Recovery in Distributed Training with In-Memory Checkpoints",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Witcher: Systematic Crash Consistency Testing for Non-Volatile Memory Key-Value Stores",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PACTree: A High Performance Persistent Range Index Using PAC Guidelines",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "durinn adversarial memory and thread interleaving for detecting durable linearizability bugs",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 375,
    "paper_ids": [
      2649,
      1584,
      524
    ],
    "papers_without_artifact_ids": [
      1589
    ]
  },
  {
    "name": "Yida Wang 0003",
    "display_name": "Yida Wang",
    "affiliation": "Amazon Web Services, Inc., East Palo Alto, CA, USA",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 2,
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2022": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "SC": {},
      "ATC": {},
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "GEMINI: Fast Failure Recovery in Distributed Training with In-Memory Checkpoints",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DynaPipe: Optimizing Multi-task Training through Dynamic Pipelines",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Ansor: Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "distmm accelerating distributed multimodal model training",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "alpa automating inter and intraoperator parallelism for distributed deep learning",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 376,
    "paper_ids": [
      2649,
      2650,
      472
    ],
    "papers_without_artifact_ids": [
      2651,
      488
    ]
  },
  {
    "name": "Yigong Hu",
    "display_name": "Yigong Hu",
    "affiliation": "Purdue University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pushing Performance Isolation Boundaries into Application with pBox",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Effective Performance Issue Diagnosis with Value-Assisted Cost Profiling",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Automated Reasoning and Detection of Specious Configuration in Large Systems with Symbolic Execution",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 377,
    "paper_ids": [
      1921,
      1922,
      1924
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matei Zaharia",
    "display_name": "Matei Zaharia",
    "affiliation": "Univ. of California - Berkeley",
    "artifact_count": 3,
    "total_papers": 13,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1,
      "SC": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "USENIXSEC": 1,
      "NSDI": 7
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "OSDI": {
        "2020": 1
      },
      "SC": {
        "2021": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {},
      "USENIXSEC": {
        "2021": 1
      },
      "NSDI": {
        "2021": 1,
        "2017": 1,
        "2012": 1,
        "2016": 1,
        "2022": 1,
        "2011": 2
      }
    },
    "artifact_rate": 23.1,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Cornflakes: Zero-Copy Serialization for Microsecond-Scale Networking",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Solving Large-Scale Granular Resource Allocation Problems Efficiently with POP",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Heterogeneity-Aware Cluster Scheduling Policies for Deep Learning Workloads",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "alto an efficient network orchestrator for compound ai systems",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "dataparallel actors a programming model for scalable query serving systems",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "contracting widearea network topologies to solve flow problems quickly",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "efficient largescale language model training on gpu clusters using megatronlm",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "express lowering the cost of metadatahiding communication with cryptographic privacy",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "splinter practical private queries on public data",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "fairride nearoptimal fair cache sharing",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "resilient distributed datasets a faulttolerant abstraction for inmemory cluster computing",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "mesos a platform for finegrained resource sharing in the data center",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "dominant resource fairness fair allocation of multiple resource types",
        "conference": "NSDI",
        "year": 2011
      }
    ],
    "author_id": 214,
    "paper_ids": [
      2652,
      2653,
      2654
    ],
    "papers_without_artifact_ids": [
      2655,
      2656,
      2657,
      2658,
      1021,
      2659,
      501,
      511,
      514,
      515
    ]
  },
  {
    "name": "Mingxing Zhang",
    "display_name": "Mingxing Zhang",
    "affiliation": "Tsinghua University, Beijing, CN",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 3,
      "EUROSYS": 0,
      "ATC": 1,
      "FAST": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2,
        "2024": 1
      },
      "EUROSYS": {},
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Falcon: Fast OLTP Engine for Persistent Cache and Non-Volatile Memory",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Partial Failure Resilient Memory Management System for (CXL-based) Distributed Shared Memory",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TrEnv: Transparently Share Serverless Execution Environments Across Different Functions and Nodes",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mooncake trading more storage for less computation a kvcachecentric architecture for serving llm chatbot",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "hydrarpc rpc in the cxl era",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 215,
    "paper_ids": [
      636,
      637,
      639
    ],
    "papers_without_artifact_ids": [
      1600,
      1934
    ]
  },
  {
    "name": "Teng Ma 0006",
    "display_name": "Teng Ma",
    "affiliation": "Alibaba Group, Hangzhou, China",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 2,
      "ATC": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "ATC": {
        "2022": 1,
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Partial Failure Resilient Memory Management System for (CXL-based) Distributed Shared Memory",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TrEnv: Transparently Share Serverless Execution Environments Across Different Functions and Nodes",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Zero Overhead Monitoring for Cloud-native Infrastructure using RDMA",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hydrarpc rpc in the cxl era",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 378,
    "paper_ids": [
      637,
      639,
      2660
    ],
    "papers_without_artifact_ids": [
      1934
    ]
  },
  {
    "name": "Zhenkun Cai",
    "display_name": "Zhenkun Cai",
    "affiliation": "AWS Shanghai AI Lab, Shanghai, China",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2021": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "gSampler: General and Efficient GPU-based Graph Sampling for Graph Learning",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Seastar: vertex-centric programming for graph neural networks",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DGCL: an efficient communication library for distributed GNN training",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 380,
    "paper_ids": [
      1601,
      2661,
      2662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Insu Jang",
    "display_name": "Insu Jang",
    "affiliation": "University of Michigan, Ann Arbor, MI, USA",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Oobleck: Resilient Distributed Training of Large Models Using Pipeline Templates",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "LineFS: Efficient SmartNIC Offload of a Distributed File System with Pipeline Parallelism",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Reducing Energy Bloat in Large Model Training",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 381,
    "paper_ids": [
      993,
      344,
      1946
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lefteris Kokoris-Kogias",
    "display_name": "Lefteris Kokoris-Kogias",
    "affiliation": "IST Austria",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "QuePaxa: Escaping the tyranny of timeouts in consensus",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Narwhal and Tusk: a DAG-based mempool and efficient BFT consensus",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mysticeti reaching the latency limits with uncertified dags",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 382,
    "paper_ids": [
      2663,
      2664,
      2665
    ],
    "papers_without_artifact_ids": [
      2666
    ]
  },
  {
    "name": "Bryan Ford",
    "display_name": "Bryan Ford",
    "affiliation": "EPFL",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 1,
      "PETS": 2,
      "EUROSYS": 0,
      "ATC": 0,
      "FAST": 1,
      "NSDI": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "PETS": {
        "2020": 1,
        "2022": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "FAST": {
        "2005": 1
      },
      "NSDI": {
        "2012": 1,
        "2016": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 42.9,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "PETS",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "QuePaxa: Escaping the tyranny of timeouts in consensus",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Authenticated private information retrieval",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PriFi: Low-Latency Anonymity for Organizational Networks",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "moby a blackoutresistant anonymity network for mobile devices",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "anonrep towards trackingresistant anonymous reputation",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "fitting square pegs through round pipes unordered delivery wirecompatible with tcp and tls",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "vxa a virtual architecture for durable compressed archives",
        "conference": "FAST",
        "year": 2005
      }
    ],
    "author_id": 383,
    "paper_ids": [
      2663,
      1016,
      2667
    ],
    "papers_without_artifact_ids": [
      2668,
      2669,
      2670,
      2671
    ]
  },
  {
    "name": "Alexandra Henzinger",
    "display_name": "Alexandra Henzinger",
    "affiliation": "MIT, Cambridge, United States of America",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Private Web Search with Tiptoe",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Distributional Private Information Retrieval",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 384,
    "paper_ids": [
      980,
      1015,
      1017
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qi Chen 0009",
    "display_name": "Qi Chen",
    "affiliation": "NWPU",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 2,
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2023": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "SPFresh: Incremental In-Place Update for Billion-Scale Vector Search",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "VBASE: Unifying Online Vector Similarity Search and Relational Queries via Relaxed Monotonicity",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Byzantine Ordered Consensus without Byzantine Oligarchy",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "frozenhot cache rethinking cache management for modern hardware",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 385,
    "paper_ids": [
      145,
      154,
      289
    ],
    "papers_without_artifact_ids": [
      1026
    ]
  },
  {
    "name": "Jiacheng Shen",
    "display_name": "Jiacheng Shen",
    "affiliation": "Duke Kunshan University, Kunshan, China",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2023": 1
      },
      "FAST": {
        "2023": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Ditto: An Elastic and Adaptive Memory-Disaggregated Caching System",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CHIME: A Cache-Efficient and High-Performance Hybrid Index on Disaggregated Memory",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SMART: A High-Performance Adaptive Radix Tree for Disaggregated Memory",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fusee a fully memorydisaggregated keyvalue store",
        "conference": "FAST",
        "year": 2023
      }
    ],
    "author_id": 386,
    "paper_ids": [
      1608,
      1609,
      1611
    ],
    "papers_without_artifact_ids": [
      1613
    ]
  },
  {
    "name": "Xuchuan Luo",
    "display_name": "Xuchuan Luo",
    "affiliation": "School of Computer Science, Fudan University, Shanghai, China",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2023": 1
      },
      "FAST": {
        "2023": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Ditto: An Elastic and Adaptive Memory-Disaggregated Caching System",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CHIME: A Cache-Efficient and High-Performance Hybrid Index on Disaggregated Memory",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SMART: A High-Performance Adaptive Radix Tree for Disaggregated Memory",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fusee a fully memorydisaggregated keyvalue store",
        "conference": "FAST",
        "year": 2023
      }
    ],
    "author_id": 387,
    "paper_ids": [
      1608,
      1609,
      1611
    ],
    "papers_without_artifact_ids": [
      1613
    ]
  },
  {
    "name": "Yangfan Zhou 0002",
    "display_name": "Yangfan Zhou",
    "affiliation": "Fudan University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2023": 1
      },
      "FAST": {
        "2023": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Ditto: An Elastic and Adaptive Memory-Disaggregated Caching System",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CHIME: A Cache-Efficient and High-Performance Hybrid Index on Disaggregated Memory",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SMART: A High-Performance Adaptive Radix Tree for Disaggregated Memory",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fusee a fully memorydisaggregated keyvalue store",
        "conference": "FAST",
        "year": 2023
      }
    ],
    "author_id": 388,
    "paper_ids": [
      1608,
      1609,
      1611
    ],
    "papers_without_artifact_ids": [
      1613
    ]
  },
  {
    "name": "Michael R. Lyu",
    "display_name": "Michael R. Lyu",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2023": 1
      },
      "FAST": {
        "2023": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Ditto: An Elastic and Adaptive Memory-Disaggregated Caching System",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CHIME: A Cache-Efficient and High-Performance Hybrid Index on Disaggregated Memory",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SMART: A High-Performance Adaptive Radix Tree for Disaggregated Memory",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fusee a fully memorydisaggregated keyvalue store",
        "conference": "FAST",
        "year": 2023
      }
    ],
    "author_id": 389,
    "paper_ids": [
      1608,
      1609,
      1611
    ],
    "papers_without_artifact_ids": [
      1613
    ]
  },
  {
    "name": "Suhas Jayaram Subramanya",
    "display_name": "Suhas Jayaram Subramanya",
    "affiliation": "Computer Science Department, Carnegie Mellon University, Pittsburgh, PA, USA",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2021": 1,
        "2020": 1
      },
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Sia: Heterogeneity-aware, goodput-optimized ML-cluster scheduling",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pollux: Co-adaptive Cluster Scheduling for Goodput-Optimized Deep Learning",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PACEMAKER: Avoiding HeART attacks in storage clusters with disk-adaptive redundancy",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "blasonflash an efficient alternative for large scale ml training and inference",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 390,
    "paper_ids": [
      1319,
      1323,
      1324
    ],
    "papers_without_artifact_ids": [
      2672
    ]
  },
  {
    "name": "Xuanzhe Liu",
    "display_name": "Xuanzhe Liu",
    "affiliation": "Peking University",
    "artifact_count": 3,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 3,
      "OSDI": 3,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 5
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2,
        "2024": 1
      },
      "OSDI": {
        "2024": 3
      },
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2024": 1,
        "2025": 1,
        "2023": 3
      }
    },
    "artifact_rate": 27.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Halfmoon: Log-Optimal Fault-Tolerant Stateful Serverless Computing",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "LoongServe: Efficiently Serving Long-Context Large Language Models with Elastic Sequence Parallelism",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "dLoRA: Dynamically Orchestrating Requests and Adapters for LoRA LLM Serving",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "meshtest endtoend testing for service mesh traffic management",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "fast vector query processing for large datasets beyond gpu memory with reordered pipelining",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "burstable cloud block storage with data processing units",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "distserve disaggregating prefill and decoding for goodputoptimized large language model serving",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "fast approximate vector queries on very large unstructured datasets",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "polycorn datadriven crosslayer multipath networking for highspeed railway through composable schedulerlets",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "transparent gpu sharing in container clouds for deep learning workloads",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "automated verification of an inproduction dns authoritative engine",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 391,
    "paper_ids": [
      994,
      995,
      997
    ],
    "papers_without_artifact_ids": [
      1000,
      1002,
      1004,
      1005,
      1006,
      2673,
      1007,
      1008
    ]
  },
  {
    "name": "Quanlu Zhang",
    "display_name": "Quanlu Zhang",
    "affiliation": "Microsoft Research",
    "artifact_count": 3,
    "total_papers": 8,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 5,
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2022": 1,
        "2024": 2,
        "2020": 2
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2018": 1
      }
    },
    "artifact_rate": 37.5,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2022,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "PIT: Optimization of Dynamic Sparse Deep Learning Models via Permutation Invariant Transformation",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SparTA: Deep-Learning Model Sparsity via Tensor-with-Sparsity-Attribute",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Retiarii: A Deep Learning Exploratory-Training Framework",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "nnscaler constraintguided parallelization plan generation for deep learning training",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "ladder enabling efficient lowprecision deep learning computing through hardwareaware tensor transformation",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "silod a codesign of caching and scheduling for deep learning clusters",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "hived sharing a gpu cluster for deep learning with guarantees",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "towards webbased delta synchronization for cloud storage services",
        "conference": "FAST",
        "year": 2018
      }
    ],
    "author_id": 392,
    "paper_ids": [
      146,
      151,
      157
    ],
    "papers_without_artifact_ids": [
      158,
      159,
      160,
      163,
      634
    ]
  },
  {
    "name": "Lili Qiu",
    "display_name": "Lili Qiu",
    "affiliation": "University of Texas at Austin",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 2,
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2024": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {},
      "NSDI": {
        "2021": 1,
        "2023": 1,
        "2007": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "PIT: Optimization of Dynamic Sparse Deep Learning Models via Permutation Invariant Transformation",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Parrot: Efficient Serving of LLM-based Applications with Semantic Variable",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Optimizing Dynamic Neural Networks with Brainstorm",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "silod a codesign of caching and scheduling for deep learning clusters",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "acoustic sensing and communication using metasurface",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "mavl multiresolution analysis of voice localization",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "s4 small state and small stretch routing protocol for large wireless sensor networks",
        "conference": "NSDI",
        "year": 2007
      }
    ],
    "author_id": 393,
    "paper_ids": [
      146,
      152,
      155
    ],
    "papers_without_artifact_ids": [
      160,
      2674,
      2675,
      2676
    ]
  },
  {
    "name": "Sudarsun Kannan",
    "display_name": "Sudarsun Kannan",
    "affiliation": "Rutgers University",
    "artifact_count": 3,
    "total_papers": 10,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "FAST": 7
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "FAST": {
        "2024": 1,
        "2021": 1,
        "2020": 1,
        "2018": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 30.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Enabling High-Performance and Secure Userspace NVM File Systems with the Trio Architecture",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Scale and Performance in a Filesystem Semi-Microkernel",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CrossFS: A Cross-layered Direct-Access File System",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "polystore exploiting combined capabilities of heterogeneous storage",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "omnicache collaborative caching for nearstorage accelerators",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "tenet memory safe and fault tolerant persistent transactional memory",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "fusionfs fusing io operations using ciscops in firmware file systems",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "pfsck accelerating file system checking and repair for modern storage",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "read as needed building wiser a flashoptimized search engine",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "designing a true directaccess file system with devfs",
        "conference": "FAST",
        "year": 2018
      }
    ],
    "author_id": 105,
    "paper_ids": [
      523,
      2008,
      1585
    ],
    "papers_without_artifact_ids": [
      531,
      1586,
      532,
      2677,
      2678,
      2019,
      2020
    ]
  },
  {
    "name": "Sishuai Gong",
    "display_name": "Sishuai Gong",
    "affiliation": "University of North Carolina",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "OSDI": {
        "2024": 1
      },
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Snowcat: Efficient Kernel Concurrency Testing using a Learned Coverage Predictor",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Snowboard: Finding Kernel Concurrency Bugs through Systematic Inter-thread Communication Analysis",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "VeriSMo: A Verified Security Module for Confidential VMs",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ondemandfork a microsecond fork for memoryintensive and latencysensitive applications",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 223,
    "paper_ids": [
      1973,
      1974,
      2056
    ],
    "papers_without_artifact_ids": [
      1979
    ]
  },
  {
    "name": "Pierre Tholoniat",
    "display_name": "Pierre Tholoniat",
    "affiliation": "Columbia University, New York, US",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1,
      "EUROSYS": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Turbo: Effective Caching in Differentially-Private Databases",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Cookie Monster: Efficient On-Device Budgeting for Differentially-Private Ad-Measurement Systems",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Privacy Budget Scheduling",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dpack efficiencyoriented privacy budget scheduling",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "ariann lowinteraction privacypreserving deep learning via function secret sharing",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 396,
    "paper_ids": [
      1352,
      1353,
      1354
    ],
    "papers_without_artifact_ids": [
      1357,
      2679
    ]
  },
  {
    "name": "Roxana Geambasu",
    "display_name": "Roxana Geambasu",
    "affiliation": "Columbia University",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1,
      "EUROSYS": 1,
      "USENIXSEC": 0,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "USENIXSEC": {},
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Turbo: Effective Caching in Differentially-Private Databases",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Cookie Monster: Efficient On-Device Budgeting for Differentially-Private Ad-Measurement Systems",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Privacy Budget Scheduling",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dpack efficiencyoriented privacy budget scheduling",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "how to combine membershipinference attacks on multiple updated machine learning models",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 397,
    "paper_ids": [
      1352,
      1353,
      1354
    ],
    "papers_without_artifact_ids": [
      1357,
      2680
    ]
  },
  {
    "name": "Diogo Behrens",
    "display_name": "Diogo Behrens",
    "affiliation": "Huawei Dresden Research Center, Germany",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2023": 1
      },
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2015": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "CLoF: A Compositional Lock Framework for Multi-level NUMA Systems",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "BBQ: A Block-based Bounded Queue for Exchanging Data and Profiling",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "BWoS: Formally Verified Block-based Work Stealing for Parallel Processing",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scalable error isolation for distributed systems",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 398,
    "paper_ids": [
      32,
      36,
      44
    ],
    "papers_without_artifact_ids": [
      2681
    ]
  },
  {
    "name": "Ming Fu",
    "display_name": "Ming Fu",
    "affiliation": "Huawei Dresden Research Center, Germany",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2023": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "CLoF: A Compositional Lock Framework for Multi-level NUMA Systems",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "BBQ: A Block-based Bounded Queue for Exchanging Data and Profiling",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "BWoS: Formally Verified Block-based Work Stealing for Parallel Processing",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 399,
    "paper_ids": [
      32,
      36,
      44
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hermann Härtig",
    "display_name": "Hermann Härtig",
    "affiliation": "TU Dresden",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1,
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "OSDI": {
        "2023": 1
      },
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "CLoF: A Compositional Lock Framework for Multi-level NUMA Systems",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "BBQ: A Block-based Bounded Queue for Exchanging Data and Profiling",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "BWoS: Formally Verified Block-based Work Stealing for Parallel Processing",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an nvm performance study towards whole system persistence on server platforms",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "slashing the disaggregation tax in heterogeneous data centers with fractos",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 7916,
    "paper_ids": [
      32,
      36,
      44
    ],
    "papers_without_artifact_ids": [
      2682,
      2683
    ]
  },
  {
    "name": "Vijay Chidambaram",
    "display_name": "Vijay Chidambaram",
    "affiliation": "University of Texas at Austin",
    "artifact_count": 3,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 2,
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 5,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2022": 1,
        "2024": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2021": 1,
        "2012": 1,
        "2017": 1,
        "2018": 1,
        "2022": 1
      },
      "NSDI": {
        "2014": 1,
        "2023": 1
      }
    },
    "artifact_rate": 27.3,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2022,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "WineFS: a hugepage-aware file system for persistent memory that ages gracefully",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Looking Beyond GPUs for DNN Scheduling on Multi-Tenant Clusters",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SquirrelFS: using the Rust compiler to check file-system crash consistency",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "chipmunk investigating crashconsistency in persistentmemory file systems",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "taccl guiding collective algorithm synthesis using communication sketches",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "paio general portable io optimizations with minor application modifications",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "checkfreq frequent finegrained dnn checkpointing",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "protocolaware recovery for consensusbased storage",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "application crash consistency and performance with ccfs",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "blizzard fast cloudscale block storage for cloudoblivious applications",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "consistency without ordering",
        "conference": "FAST",
        "year": 2012
      }
    ],
    "author_id": 152,
    "paper_ids": [
      1320,
      2684,
      2685
    ],
    "papers_without_artifact_ids": [
      2686,
      2687,
      2688,
      2689,
      1643,
      1646,
      2690,
      2033
    ]
  },
  {
    "name": "Lorenzo Alvisi",
    "display_name": "Lorenzo Alvisi",
    "affiliation": "Cornell University",
    "artifact_count": 3,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 2,
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 6
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1,
        "2024": 1
      },
      "OSDI": {
        "2023": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {},
      "NSDI": {
        "2013": 1,
        "2009": 1,
        "2014": 1,
        "2017": 1,
        "2016": 1,
        "2020": 1
      }
    },
    "artifact_rate": 27.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Basil: Breaking up BFT with ACID (transactions)",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Autobahn: Seamless high speed BFT",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Byzantine Ordered Consensus without Byzantine Oligarchy",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "morty scaling concurrency control with reexecution",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "scaledb a scalable asynchronous inmemory database",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "scalog seamless reconfiguration and total order in a scalable shared log",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "i cant believe its not causal scalable causal consistency with no slowdown cascades",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "scalable and private media consumption with popcorn",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "exalt empowering researchers to evaluate largescale storage systems",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "robustness in the salus scalable block store",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "making byzantine fault tolerant systems tolerate byzantine faults",
        "conference": "NSDI",
        "year": 2009
      }
    ],
    "author_id": 400,
    "paper_ids": [
      1990,
      1991,
      289
    ],
    "papers_without_artifact_ids": [
      1995,
      1369,
      2691,
      1997,
      1998,
      2692,
      2693,
      2694
    ]
  },
  {
    "name": "Xupeng Li",
    "display_name": "Xupeng Li",
    "affiliation": "Columbia University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2022": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "OSDI",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Formal Verification of a Multiprocessor Hypervisor on Arm Relaxed Memory Hardware",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Design and Verification of the Arm Confidential Compute Architecture",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "spoq scaling machinecheckable systems verification in coq",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 401,
    "paper_ids": [
      1999,
      2000,
      2001
    ],
    "papers_without_artifact_ids": [
      2002
    ]
  },
  {
    "name": "Shih-Wei Li",
    "display_name": "Shih-Wei Li",
    "affiliation": "National Taiwan University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 1,
      "ACSAC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 66.7,
    "functional_rate": 33.3,
    "category": "both",
    "conferences": [
      "ACSAC",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Formal Verification of a Multiprocessor Hypervisor on Arm Relaxed Memory Hardware",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SECvma: Virtualization-based Linux Kernel Protection for Arm",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 402,
    "paper_ids": [
      1999,
      2695,
      2000
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ronghui Gu",
    "display_name": "Ronghui Gu",
    "affiliation": "Columbia University",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 5,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2021": 1,
        "2022": 3,
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "OSDI",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Formal Verification of a Multiprocessor Hypervisor on Arm Relaxed Memory Hardware",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Design and Verification of the Arm Confidential Compute Architecture",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "spoq scaling machinecheckable systems verification in coq",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "upgradvisor early adopting dependency updates using hybrid program analysis and hardware tracing",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "duoai fast automated inference of inductive invariants for verifying distributed protocols",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "distai datadriven automated invariant learning for distributed protocols",
        "conference": "OSDI",
        "year": 2021
      }
    ],
    "author_id": 228,
    "paper_ids": [
      1999,
      2000,
      2001
    ],
    "papers_without_artifact_ids": [
      2002,
      2004,
      2003,
      2006
    ]
  },
  {
    "name": "Daniel S. Berger",
    "display_name": "Daniel S. Berger",
    "affiliation": "Microsoft Research/University of Washington",
    "artifact_count": 3,
    "total_papers": 12,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 5,
      "EUROSYS": 1,
      "FAST": 1,
      "NSDI": 4
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2024": 2,
        "2023": 2,
        "2020": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "FAST": {
        "2024": 1
      },
      "NSDI": {
        "2017": 1,
        "2025": 1,
        "2020": 1,
        "2022": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Kangaroo: Caching Billions of Tiny Objects on Flash",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Managing Memory Tiers with CXL in Virtualized Environments",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Ensō: A Streaming Interface for NIC-Application Communication",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enhancing network failure mitigation with performanceaware ranking",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "baleen ml admission prefetching for flash caches",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "fairywren a sustainable cache for emerging writereaderase flash interfaces",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "palette load balancing locality hints for serverless functions",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "hyrax failinplace server operation in cloud platforms",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "c2dn how to harness erasure codes at the edge for efficient content delivery",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "learning relaxed belady for content distribution network caching",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "the cachelib caching engine design and experiences at scale",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "adaptsize orchestrating the hot object memory cache in a content delivery network",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 229,
    "paper_ids": [
      1321,
      1356,
      2696
    ],
    "papers_without_artifact_ids": [
      2697,
      1325,
      1326,
      2698,
      2699,
      1962,
      2700,
      1332,
      2701
    ]
  },
  {
    "name": "Anurag Khandelwal",
    "display_name": "Anurag Khandelwal",
    "affiliation": "Yale University",
    "artifact_count": 3,
    "total_papers": 13,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 3,
      "EUROSYS": 2,
      "NSDI": 5,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2025": 1
      },
      "EUROSYS": {
        "2024": 1,
        "2022": 1
      },
      "NSDI": {
        "2021": 1,
        "2019": 1,
        "2023": 1,
        "2016": 1,
        "2015": 1
      },
      "OSDI": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 23.1,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "MIND: In-Network Memory Management for Disaggregated Data Centers",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Jiffy: elastic far-memory for stateful serverless analytics",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Found in Translation: A Generative Language Modeling Approach to Memory Access Pattern Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "trinity a fast compressed multiattribute data store",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "length leakage in oblivious data access mechanisms",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "shepherd serving dnns in the wild",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "karma resource allocation for dynamic demands",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "shortstack distributed faulttolerant oblivious data access",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "caerus nimble task scheduling for serverless analytics",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "pancake frequency smoothing for encrypted data stores",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "confluo distributed monitoring and diagnosis stack for highspeed networks",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "blowfish dynamic storageperformance tradeoff in data stores",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "succinct enabling queries on compressed data",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 230,
    "paper_ids": [
      2702,
      466,
      2703
    ],
    "papers_without_artifact_ids": [
      2704,
      2705,
      480,
      1359,
      2706,
      492,
      2707,
      496,
      504,
      508
    ]
  },
  {
    "name": "Xusheng Chen",
    "display_name": "Xusheng Chen",
    "affiliation": "The University of Hong Kong",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2018": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Achieving low tail-latency and high scalability for serializable transactions in edge computing",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SOTER: Guarding Black-box Inference for General Neural Networks at the Edge",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "plover fast multicore scalable virtual machine faulttolerance",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 405,
    "paper_ids": [
      1658,
      1604,
      770
    ],
    "papers_without_artifact_ids": [
      1662
    ]
  },
  {
    "name": "Shixiong Zhao",
    "display_name": "Shixiong Zhao",
    "affiliation": "the University of Hong Kong",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ACSAC": 1,
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "ACSAC": {
        "2017": 1
      },
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2018": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "ATC",
      "SOSP"
    ],
    "years": [
      2017,
      2021,
      2022
    ],
    "year_range": "2017-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SOTER: Guarding Black-box Inference for General Neural Networks at the Edge",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "plover fast multicore scalable virtual machine faulttolerance",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 406,
    "paper_ids": [
      1658,
      770,
      1660
    ],
    "papers_without_artifact_ids": [
      1662
    ]
  },
  {
    "name": "Sen Wang 0004",
    "display_name": "Sen Wang",
    "affiliation": "IIT Bombay",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Achieving low tail-latency and high scalability for serializable transactions in edge computing",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SOTER: Guarding Black-box Inference for General Neural Networks at the Edge",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 407,
    "paper_ids": [
      1658,
      1604,
      770
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Li Chen 0008",
    "display_name": "Li Chen",
    "affiliation": "Zhejiang University",
    "artifact_count": 3,
    "total_papers": 15,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 1,
      "ATC": 1,
      "NSDI": 10,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2021": 1,
        "2017": 1,
        "2024": 1,
        "2025": 4,
        "2016": 1,
        "2018": 1,
        "2015": 1
      },
      "NDSS": {
        "2024": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ATC",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SOTER: Guarding Black-box Inference for General Neural Networks at the Edge",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Your Shield is My Sword: A Persistent Denial-of-Service Attack via the Reuse of Unvalidated Caches in DNSSEC Validation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "resolving packets from counters enabling multiscale network traffic super resolution via composable large traffic model",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "accelerating design space exploration for llm training systems with multiexperiment parallel simulation",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "simai unifying architecture design and performance tuning for largescale large language model training with scalability and precision",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "cegs configuration example generalizing synthesizer",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "understanding route origin validation rov deployment in the real world and why manrs action 1 is not followed",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "drr a decentralized scalable and auditable architecture for rpki repository",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "klonet an easytouse and scalable platform for computer networks education",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "lightguardian a fullvisibility lightweight inband telemetry system using sketchlets",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "powerman an outofband management network for datacenters using power line communication",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "enabling widespread communications on optical fabric with megaswitch",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "enabling ecn in multiservice multiqueue data centers",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "informationagnostic flow scheduling for commodity data centers",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 408,
    "paper_ids": [
      1658,
      770,
      2708
    ],
    "papers_without_artifact_ids": [
      2709,
      1941,
      2710,
      2711,
      2712,
      556,
      2713,
      2714,
      2715,
      2716,
      2717,
      2718
    ]
  },
  {
    "name": "Ashvin Goel",
    "display_name": "Ashvin Goel",
    "affiliation": "University of Toronto",
    "artifact_count": 3,
    "total_papers": 8,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 2,
      "ATC": 1,
      "FAST": 4,
      "USENIXSEC": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2023": 1,
        "2021": 1
      },
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2012": 1,
        "2018": 1,
        "2014": 1,
        "2025": 1
      },
      "USENIXSEC": {},
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 37.5,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Caracal: Contention Management with Deterministic Concurrency Control",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Integrating Non-Volatile Main Memory in a Deterministic Database",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Massively Parallel Multi-Versioned Transaction Processing",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "silhouette leveraging consistency mechanisms to detect bugs in persistent memorybased file systems",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "tesseract distributed general graph pattern mining on evolving graphs",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "spiffy enabling filesystem aware storage applications",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "checking the integrity of transactional mechanisms",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "recon verifying file system consistency at runtime",
        "conference": "FAST",
        "year": 2012
      }
    ],
    "author_id": 232,
    "paper_ids": [
      2719,
      2720,
      2721
    ],
    "papers_without_artifact_ids": [
      2722,
      2723,
      2724,
      2725,
      2726
    ]
  },
  {
    "name": "Ioannis Demertzis",
    "display_name": "Ioannis Demertzis",
    "affiliation": "Univ. of California - Santa Cruz",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 4,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2022": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OBLIVIATOR: OBLIVIous Parallel Joins and other OperATORs in Shared Memory Environments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dynamic searchable encryption with optimal search in the presence of deletions",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "seal attack mitigation for encrypted databases via adjustable leakage",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 409,
    "paper_ids": [
      668,
      2415,
      2417
    ],
    "papers_without_artifact_ids": [
      2418,
      2419
    ]
  },
  {
    "name": "Andreas Haeberlen",
    "display_name": "Andreas Haeberlen",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 3,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1,
      "ACSAC": 1,
      "EUROSYS": 2,
      "USENIXSEC": 0,
      "NSDI": 5,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "OSDI": {
        "2020": 1
      },
      "ACSAC": {
        "2018": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2021": 1
      },
      "USENIXSEC": {},
      "NSDI": {
        "2009": 1,
        "2017": 1,
        "2006": 1,
        "2012": 1,
        "2005": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 27.3,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2018,
      2020,
      2021
    ],
    "year_range": "2018-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Mycelium: Large-Scale Distributed Graph Queries with Differential Privacy",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DeDoS: Defusing DoS with Dispersion Oriented Software",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Orchard: Differentially Private Analytics at Scale",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "roborebound multirobot system defense with boundedtime interaction",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "arboretum a planner for largescale federated analytics with differential privacy",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "rebound defending distributed systems against attacks with boundedtime recovery",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "automated bug removal for softwaredefined networks",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "reliable client accounting for p2pinfrastructure hybrids",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "netreview detecting when interdomain routing goes wrong",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "efficient replica maintenance for distributed storage systems",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "glacier highly durable decentralized storage despite massive correlated failures",
        "conference": "NSDI",
        "year": 2005
      }
    ],
    "author_id": 410,
    "paper_ids": [
      1074,
      696,
      2727
    ],
    "papers_without_artifact_ids": [
      2728,
      2729,
      2730,
      714,
      2731,
      2732,
      1300,
      2733
    ]
  },
  {
    "name": "Yiming Qiu 0001",
    "display_name": "Yiming Qiu",
    "affiliation": "IISc Bangalore",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 2,
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1,
        "2024": 1
      },
      "USENIXSEC": {
        "2022": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "both",
    "conferences": [
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated SmartNIC Offloading Insights for Network Functions",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Unearthing Semantic Checks for Cloud Infrastructure-as-Code Programs",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Bedrock: Programmable Network Support for Secure RDMA Systems",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "synthesizing runtime programmable switch updates",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 411,
    "paper_ids": [
      693,
      694,
      700
    ],
    "papers_without_artifact_ids": [
      703
    ]
  },
  {
    "name": "Jiarong Xing",
    "display_name": "Jiarong Xing",
    "affiliation": "Rice University",
    "artifact_count": 3,
    "total_papers": 8,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 5,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2021": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 37.5,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "both",
    "conferences": [
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated SmartNIC Offloading Insights for Network Functions",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Remote Direct Memory Introspection",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Bedrock: Programmable Network Support for Secure RDMA Systems",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "occam a programming system for reliable network management",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "on the criticality of integrity protection in 5g fronthaul networks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "runtime programmable switches",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "ripple a programmable decentralized linkflooding defense against adaptive adversaries",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "netwarden mitigating network covert channels while preserving performance",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 412,
    "paper_ids": [
      693,
      699,
      700
    ],
    "papers_without_artifact_ids": [
      702,
      2734,
      706,
      708,
      711
    ]
  },
  {
    "name": "Miguel Matos",
    "display_name": "Miguel Matos",
    "affiliation": "Universidade de Lisboa",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2021,
      2023,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Kauri: Scalable BFT Consensus with Pipelined Tree-Based Dissemination and Aggregation",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "HawkSet: Automatic, Application-Agnostic, and Efficient Concurrent PM Bug Detection",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Mumak: Efficient and Black-Box Bug Detection for Persistent Memory",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 413,
    "paper_ids": [
      2735,
      2736,
      1983
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yingdi Shan",
    "display_name": "Yingdi Shan",
    "affiliation": "Tsinghua University, Beijing, China",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 2,
      "ATC": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1,
        "2024": 1
      },
      "ATC": {
        "2023": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Geometric Partitioning: Explore the Boundary of Optimal Erasure Code Repair",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TrEnv: Transparently Share Serverless Execution Environments Across Different Functions and Nodes",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Explore Data Placement Algorithm for Balanced Recovery Load Distribution",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 233,
    "paper_ids": [
      288,
      639,
      642
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hao Sun 0021",
    "display_name": "Hao Sun",
    "affiliation": "ETH Zurich",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 2,
      "EUROSYS": 1,
      "ATC": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "USENIXSEC": {
        "2025": 2
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2022": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HEALER: Relation Learning Guided Kernel Fuzzing",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Approximation Enforced Execution of Untrusted Linux Kernel Extensions",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Finding Metadata Inconsistencies in Distributed File Systems via Cross-Node Operation Modeling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "finding correctness bugs in ebpf verifier with structured and sanitized program",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "validating the ebpf verifier via state embedding",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "ksg augmenting kernel fuzzing with system call specification generation",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 416,
    "paper_ids": [
      2737,
      1028,
      2738
    ],
    "papers_without_artifact_ids": [
      2739,
      1032,
      2740
    ]
  },
  {
    "name": "Wyatt Lloyd",
    "display_name": "Wyatt Lloyd",
    "affiliation": "Princeton University",
    "artifact_count": 3,
    "total_papers": 13,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3,
      "ATC": 1,
      "FAST": 2,
      "NSDI": 6
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2023": 1,
        "2020": 2
      },
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2015": 1,
        "2021": 1
      },
      "NSDI": {
        "2013": 1,
        "2017": 1,
        "2024": 1,
        "2010": 1,
        "2020": 2
      }
    },
    "artifact_rate": 23.1,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Regular Sequential Serializability and Regular Sequential Consistency",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Speculative Recovery: Cheap, Highly Available Fault Tolerance with Disaggregated Storage",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Performance-Optimal Read-Only Transactions",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "accelerating skewed workloads with performance multipliers in the turbodb distributed database",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "ncc natural concurrency control for strictly serializable datastores by avoiding the timestampinversion pitfall",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "facebooks tectonic filesystem efficiency from exascale",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "gryff unifying consensus and shared registers",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "learning relaxed belady for content distribution network caching",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "tolerating slowdowns in replicated state machines using copilots",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "i cant believe its not causal scalable causal consistency with no slowdown cascades",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "ripq advanced photo caching on flash for facebook",
        "conference": "FAST",
        "year": 2015
      },
      {
        "title": "stronger semantics for lowlatency georeplicated storage",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "prophecy using history for highthroughput fault tolerance",
        "conference": "NSDI",
        "year": 2010
      }
    ],
    "author_id": 418,
    "paper_ids": [
      2741,
      2742,
      2126
    ],
    "papers_without_artifact_ids": [
      2743,
      2127,
      2744,
      2745,
      2700,
      2130,
      1997,
      2746,
      2747,
      2133
    ]
  },
  {
    "name": "Mohammad Shahrad",
    "display_name": "Mohammad Shahrad",
    "affiliation": "University of British Columbia",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 2,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "ATC": {
        "2023": 2
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Caribou: Fine-Grained Geospatial Shifting of Serverless Applications for Sustainability",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "VectorVisor: A Binary Translation Scheme for Throughput-Oriented GPU Acceleration",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "UnFaaSener: Latency and Cost Aware Offloading of Functions from Serverless Platforms",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "estimating the carbon footprint of serverless functions on a public cloud platform",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 419,
    "paper_ids": [
      2748,
      2749,
      2750
    ],
    "papers_without_artifact_ids": [
      2751
    ]
  },
  {
    "name": "Antoine Murat",
    "display_name": "Antoine Murat",
    "affiliation": "École Polytechnique Fédérale de Lausanne (EPFL), Lausanne, CH",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "SWARM: Replicating Shared Disaggregated-Memory Data in No Time",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "uKharon: A Membership Service for Microsecond Applications",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DSig: Breaking the Barrier of Signatures in Data Centers",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 420,
    "paper_ids": [
      1378,
      1380,
      1382
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Igor Zablotchi",
    "display_name": "Igor Zablotchi",
    "affiliation": "Mysten Labs, Zürich, CH",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 2,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1,
        "2020": 1
      },
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SWARM: Replicating Shared Disaggregated-Memory Data in No Time",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DSig: Breaking the Barrier of Signatures in Data Centers",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Microsecond Consensus for Microsecond Applications",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 421,
    "paper_ids": [
      1378,
      1382,
      1383
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rachit Agarwal 0001",
    "display_name": "Rachit Agarwal",
    "affiliation": "Cornell University",
    "artifact_count": 3,
    "total_papers": 21,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 4,
      "EUROSYS": 1,
      "USENIXSEC": 3,
      "NSDI": 11
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 2
      },
      "OSDI": {
        "2021": 1,
        "2022": 1,
        "2024": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2020": 1
      },
      "NSDI": {
        "2021": 1,
        "2024": 1,
        "2019": 2,
        "2023": 1,
        "2016": 2,
        "2020": 2,
        "2018": 1,
        "2015": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2022,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Tiered Memory Management: Access Latency is the Key!",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Jiffy: elastic far-memory for stateful serverless analytics",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rearchitecting Linux Storage Stack for µs Latency and High Throughput",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "harmony a congestionfree datacenter architecture",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "highthroughput and flexible host networking for accelerated computing",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "fast safe io memory protection",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "length leakage in oblivious data access mechanisms",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "exploiting leakage in password managers via injection attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "formal methods for network performance analysis",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "karma resource allocation for dynamic demands",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "shortstack distributed faulttolerant oblivious data access",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "codedbulk interdatacenter bulk transfers using network coding",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "tcp rdma cpuefficient remote storage access with i10",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "building an elastic query engine on disaggregated storage",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "pancake frequency smoothing for encrypted data stores",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "shoal a network architecture for disaggregated racks",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "confluo distributed monitoring and diagnosis stack for highspeed networks",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "distributed network monitoring and debugging with switchpointer",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "blowfish dynamic storageperformance tradeoff in data stores",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "universal packet scheduling",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "succinct enabling queries on compressed data",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 855,
    "paper_ids": [
      2752,
      466,
      1367
    ],
    "papers_without_artifact_ids": [
      2753,
      2754,
      2755,
      2705,
      2756,
      2757,
      1359,
      2706,
      2758,
      2759,
      2760,
      2707,
      2761,
      496,
      2762,
      504,
      2763,
      508
    ]
  },
  {
    "name": "Byoungyoung Lee",
    "display_name": "Byoungyoung Lee",
    "affiliation": "Seoul National University",
    "artifact_count": 3,
    "total_papers": 16,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 9,
      "ATC": 1,
      "EUROSYS": 1,
      "PETS": 1,
      "NDSS": 2,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "USENIXSEC": {
        "2023": 2,
        "2022": 3,
        "2025": 1,
        "2021": 3
      },
      "ATC": {
        "2024": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "PETS": {
        "2020": 1
      },
      "NDSS": {
        "2025": 2
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 18.8,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ATC",
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "OZZ: Identifying Kernel Out-of-Order Concurrency Bugs with In-Vivo Memory Access Reordering",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "A Secure, Fast, and Resource-Efficient Serverless Platform with Function REWIND",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dlbox new model training framework for protecting training data",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "secure data analytics in apache spark with finegrained policy enforcement and isolated execution",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "subverting the secure vm by exploiting pcie devices",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "diagnosing kernel concurrency failures with aitia",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "an extensible orchestration and protection framework for confidential cloud computing",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "pspray timing sidechannel based linux kernel heap exploitation technique",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "extending a hand to attackers browser privilege escalation attacks via extensions",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "fuzzorigin detecting uxss vulnerabilities in browsers through origin fuzzing",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "mundofuzz hypervisor fuzzing with statistical coverage testing and grammar inference",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "exprace exploiting kernel races through raising interrupts",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "m2mon building an mmiobased security reference monitor for unmanned vehicles",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "constraintguided directed greybox fuzzing",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "a tale of two trees one writes and other reads",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 423,
    "paper_ids": [
      345,
      2764,
      2274
    ],
    "papers_without_artifact_ids": [
      2765,
      2766,
      2767,
      355,
      1978,
      2768,
      2769,
      2770,
      2771,
      1591,
      1780,
      2772,
      2579
    ]
  },
  {
    "name": "Ming-Chang Yang",
    "display_name": "Ming-Chang Yang",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1,
      "ATC": 0,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 2
      },
      "OSDI": {
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2024": 1,
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "BIZA: Design of Self-Governing Block-Interface ZNS AFA for Endurance and Performance",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Aceso: Achieving Efficient Fault Tolerance in Memory-Disaggregated Key-Value Stores",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SEPH: Scalable, Efficient, and Predictable Hashing on Persistent Memory",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oasis an outofcore approximate graph system via alldistances sketches",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "seraph towards scalable and efficient fullyexternal graph computation via ondemand processing",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "practicably boosting the processing performance of bfslike algorithms on semiexternal graph system via ioefficient graph ordering",
        "conference": "FAST",
        "year": 2022
      }
    ],
    "author_id": 236,
    "paper_ids": [
      2773,
      1610,
      2774
    ],
    "papers_without_artifact_ids": [
      2775,
      2776,
      2777
    ]
  },
  {
    "name": "Jie Zhang 0048",
    "display_name": "Jie Zhang",
    "affiliation": "Peking University",
    "artifact_count": 3,
    "total_papers": 8,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ATC": 3,
      "FAST": 2,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2024": 3
      },
      "FAST": {
        "2020": 1,
        "2026": 1
      },
      "NSDI": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 37.5,
    "repro_rate": 0.0,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BIZA: Design of Self-Governing Block-Interface ZNS AFA for Endurance and Performance",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Daredevil: Rescue Your Flash Storage from Inflexible Kernel Storage Stack",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ScalaAFA: Constructing User-Space All-Flash Array Engine with Holistic Designs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "xerxes extensive exploration of scalable hardware systems with cxlbased simulation framework",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "beehive a scalable disaggregated memory runtime exploiting asynchrony of multithreaded programs",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "superbench improving cloud ai infrastructure reliability with proactive validation",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "scalacache scalable userspace page cache management with softwarehardware coordination",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "scalable parallel flash firmware for manycore architectures",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 424,
    "paper_ids": [
      2773,
      2778,
      2779
    ],
    "papers_without_artifact_ids": [
      649,
      2780,
      290,
      2781,
      2782
    ]
  },
  {
    "name": "Guo Li",
    "display_name": "Guo Li",
    "affiliation": "Imperial College London, London, United Kingdom",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2020": 1
      },
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2022,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tenplex: Dynamic Parallelism for Deep Learning using Parallelizable Tensor Collections",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AddrMiner: A Comprehensive Global Active IPv6 Address Discovery System",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "KungFu: Making Training in Distributed Machine Learning Adaptive",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "granny granular management of computeintensive applications in the cloud",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 425,
    "paper_ids": [
      1385,
      2783,
      1390
    ],
    "papers_without_artifact_ids": [
      1391
    ]
  },
  {
    "name": "Travis Hance",
    "display_name": "Travis Hance",
    "affiliation": "Carnegie Mellon University, Pittsburgh, PA, US",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1,
        "2023": 1,
        "2020": 1
      },
      "NSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Verus: A Practical Foundation for Systems Verification",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Sharding the State Machine: Automated Modular Reasoning for Complex Concurrent Systems",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Storage Systems are Distributed Systems (So Verify Them That Way!)",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "inductive invariants that spark joy using invariant taxonomies to streamline distributed protocol proofs",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "finding invariants of distributed systems its a small enough world after all",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 426,
    "paper_ids": [
      715,
      721,
      722
    ],
    "papers_without_artifact_ids": [
      723,
      725
    ]
  },
  {
    "name": "Reto Achermann",
    "display_name": "Reto Achermann",
    "affiliation": "University of British Columbia",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 3,
      "OSDI": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1,
        "2024": 1
      },
      "OSDI": {
        "2021": 1,
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Verus: A Practical Foundation for Systems Verification",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "NrOS: Effective Replication and Sharing in an Operating System",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Sharding the State Machine: Automated Modular Reasoning for Complex Concurrent Systems",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "synthesizing device drivers with ghost writer",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "generating correct initial page tables from formal hardware descriptions",
        "conference": "SOSP",
        "year": 2021
      }
    ],
    "author_id": 428,
    "paper_ids": [
      715,
      527,
      721
    ],
    "papers_without_artifact_ids": [
      2784,
      2785
    ]
  },
  {
    "name": "Yuan Xie 0001",
    "display_name": "Yuan Xie",
    "affiliation": "HKUST",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 1,
      "OSDI": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "OSDI": {
        "2021": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Efficient tensor core-based GPU kernels for structured sparsity under reduced precision",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Faith: An Efficient Framework for Transformer Verification on GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "GNNAdvisor: An Adaptive and Efficient Runtime System for GNN Acceleration on GPUs",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 430,
    "paper_ids": [
      1673,
      1675,
      1677
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qinghao Hu 0004",
    "display_name": "Qinghao Hu",
    "affiliation": "Massachusetts Institute of Technology",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SC": 1,
      "EUROSYS": 1,
      "ATC": 1,
      "SOSP": 0,
      "NSDI": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2022": 1
      },
      "SOSP": {},
      "NSDI": {
        "2024": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "SC"
    ],
    "years": [
      2021,
      2022,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Characterization and prediction of deep learning workloads in large-scale GPU datacenters",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DeltaZip: Efficient Serving of Multiple Full-Model-Tuned LLMs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Primo: Practical Learning-Augmented Systems with Interpretable Models",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "characterization of large language model development in the datacenter",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "hydro surrogatebased hyperparameter tuning service in datacenters",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 431,
    "paper_ids": [
      730,
      1664,
      731
    ],
    "papers_without_artifact_ids": [
      741,
      744
    ]
  },
  {
    "name": "Shuaiwen Leon Song",
    "display_name": "Shuaiwen Leon Song",
    "affiliation": "University of Sydney",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SC": 2,
      "ATC": 1,
      "EUROSYS": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      },
      "ATC": {
        "2024": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MAPA: multi-accelerator pattern allocation policy for multi-tenant GPU servers",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Dr. Top-k: delegate-centric Top-k on GPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Quant-LLM: Accelerating the Serving of Large Language Models via FP6-Centric Algorithm-System Co-Design on Modern GPUs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mononn enabling a new monolithic optimization space for neural network inference tasks on modern gpucentric architectures",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "tea a generalpurpose temporal graph random walk engine",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 432,
    "paper_ids": [
      2786,
      2787,
      2788
    ],
    "papers_without_artifact_ids": [
      2789,
      644
    ]
  },
  {
    "name": "Timo Schneider",
    "display_name": "Timo Schneider",
    "affiliation": "ETH Zurich, Switzerland",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 2,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Productivity, portability, performance: data-centric Python",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "On the parallel I/O optimality of linear algebra kernels: near-optimal matrix factorizations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "OSMOSIS: Enabling Multi-Tenancy in Datacenter SmartNICs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 433,
    "paper_ids": [
      748,
      751,
      753
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tal Ben-Nun",
    "display_name": "Tal Ben-Nun",
    "affiliation": "ETH Zurich, Switzerland",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 3
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 3
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Productivity, portability, performance: data-centric Python",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Clairvoyant prefetching for distributed machine learning I/O",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "On the parallel I/O optimality of linear algebra kernels: near-optimal matrix factorizations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 434,
    "paper_ids": [
      748,
      750,
      751
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weihao Cui",
    "display_name": "Weihao Cui",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SC": 1,
      "OSDI": 1,
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "OSDI": {
        "2023": 1
      },
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI",
      "SC"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Enable simultaneous DNN services based on deterministic operator overlap and precise latency prediction",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DVABatch: Diversity-aware Multi-Entry Multi-Exit Batching for Efficient Processing of DNN Services on GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Optimizing Dynamic Neural Networks with Brainstorm",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improving gpu sharing performance through adaptive bubbleless spatialtemporal sharing",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 435,
    "paper_ids": [
      1084,
      1086,
      155
    ],
    "papers_without_artifact_ids": [
      1089
    ]
  },
  {
    "name": "Zhuo Song",
    "display_name": "Zhuo Song",
    "affiliation": "Alibaba Cloud",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 3
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {
        "2022": 2,
        "2024": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Enable simultaneous DNN services based on deterministic operator overlap and precise latency prediction",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Help Rather Than Recycle: Alleviating Cold Startup in Serverless Computing Through Inter-Function Container Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Zero Overhead Monitoring for Cloud-native Infrastructure using RDMA",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diagnosing applicationnetwork anomalies for millions of ips in production clouds",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 436,
    "paper_ids": [
      1084,
      1085,
      2660
    ],
    "papers_without_artifact_ids": [
      1935
    ]
  },
  {
    "name": "Chao Li 0009",
    "display_name": "Chao Li",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {
        "2022": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Enable simultaneous DNN services based on deterministic operator overlap and precise latency prediction",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Help Rather Than Recycle: Alleviating Cold Startup in Serverless Computing Through Inter-Function Container Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DVABatch: Diversity-aware Multi-Entry Multi-Exit Batching for Efficient Processing of DNN Services on GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 437,
    "paper_ids": [
      1084,
      1085,
      1086
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Laiping Zhao",
    "display_name": "Laiping Zhao",
    "affiliation": "Tianjin University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 1,
      "EUROSYS": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "SC"
    ],
    "years": [
      2021,
      2022,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding, predicting and scheduling serverless workloads under partial interference",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AlloyStack: A Library Operating System for Serverless Workflow Applications",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Tetris: Memory-efficient Serverless Inference through Tensor Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 440,
    "paper_ids": [
      2790,
      641,
      2791
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Keqiu Li",
    "display_name": "Keqiu Li",
    "affiliation": "Dalian University of Technology, School of Computer Science and Technology, China",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SC": 1,
      "EUROSYS": 1,
      "ATC": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "SC"
    ],
    "years": [
      2021,
      2022,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding, predicting and scheduling serverless workloads under partial interference",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AlloyStack: A Library Operating System for Serverless Workflow Applications",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Tetris: Memory-efficient Serverless Inference through Tensor Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ladder a convergencebased structured dag blockchain for high throughput and low latency",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "flow scheduling with imprecise knowledge",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 441,
    "paper_ids": [
      2790,
      641,
      2791
    ],
    "papers_without_artifact_ids": [
      2792,
      2793
    ]
  },
  {
    "name": "Mona Vij",
    "display_name": "Mona Vij",
    "affiliation": "Intel Labs, Hillsboro, OR, USA",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "EUROSYS": 3,
      "ATC": 1,
      "USENIXSEC": 1,
      "NDSS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 3
      },
      "ATC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Pegasus: Transparent and Unified Kernel-Bypass Networking for Fast Local and Remote Communication",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Erebor: A Drop-In Sandbox Solution for Private Data Processing in Untrusted Confidential Virtual Machines",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rakis: Secure Fast I/O Primitives Across Trust Boundaries on Intel SGX",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sense enhancing microarchitectural awareness for tees via subscriptionbased notification",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "aexnotify thwarting precise singlestepping attacks through interrupt awareness for intel sgx enclaves",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "pridwen universally hardening sgx programs via loadtime synthesis",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 444,
    "paper_ids": [
      1975,
      2794,
      652
    ],
    "papers_without_artifact_ids": [
      660,
      663,
      664
    ]
  },
  {
    "name": "Yuancheng Jiang",
    "display_name": "Yuancheng Jiang",
    "affiliation": "National University of Singapore",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Erebor: A Drop-In Sandbox Solution for Private Data Processing in Untrusted Confidential Virtual Machines",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fuzzing the PHP Interpreter via Dataflow Fusion",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 445,
    "paper_ids": [
      2794,
      1768,
      2571
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhenkai Liang",
    "display_name": "Zhenkai Liang",
    "affiliation": "National University of Singapore",
    "artifact_count": 3,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "EUROSYS": 1,
      "ATC": 0,
      "ACSAC": 0,
      "PETS": 0,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 2,
        "2025": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {},
      "ACSAC": {},
      "PETS": {},
      "NDSS": {
        "2025": 3
      }
    },
    "artifact_rate": 37.5,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Erebor: A Drop-In Sandbox Solution for Private Data Processing in Untrusted Confidential Virtual Machines",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fuzzing the PHP Interpreter via Dataflow Fusion",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "uictx understanding ui behaviors with code contexts for mobile applications",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "scrutinizer towards secure forensics on compromised trustzone",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "provguard detecting sdn control policy manipulation via contextual semantics of provenance graphs",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "uihash detecting similar android uis through gridbased visual appearance representation",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "freewill automatically diagnosing useafterfree bugs via reference miscounting detection on binaries",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 446,
    "paper_ids": [
      2794,
      1768,
      2571
    ],
    "papers_without_artifact_ids": [
      2795,
      776,
      2796,
      2797,
      2798
    ]
  },
  {
    "name": "Wei Wang 0030",
    "display_name": "Wei Wang",
    "affiliation": "HKUST",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 1,
      "SC": 0,
      "USENIXSEC": 1,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      },
      "ATC": {
        "2023": 1
      },
      "SC": {},
      "USENIXSEC": {
        "2024": 1
      },
      "NSDI": {
        "2025": 1,
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SpInfer: Leveraging Low-Level Sparsity for Efficient Large Language Model Inference on GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Dordis: Efficient Federated Learning with Dropout-Resilient Differential Privacy",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Beware of Fragmentation: Scheduling GPU-Sharing Workloads with Fragmentation Gradient Descent",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gpudisaggregated serving for deep learning recommendation models at scale",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "lotto secure participant selection against adversarial servers in federated learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "following the data not the function rethinking function orchestration in serverless computing",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "mlaas in the wild workload analysis and scheduling in largescale heterogeneous gpu clusters",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 447,
    "paper_ids": [
      2799,
      2800,
      2801
    ],
    "papers_without_artifact_ids": [
      2802,
      2803,
      2804,
      2805
    ]
  },
  {
    "name": "Xiangyu Zou",
    "display_name": "Xiangyu Zou",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 2,
      "FAST": 3,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2022": 1,
        "2023": 1
      },
      "FAST": {
        "2021": 1,
        "2026": 1,
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Garbage Collection Does Not Only Collect Garbage: Piggybacking-Style Defragmentation for Deduplicated Backup Storage",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Building a High-performance Fine-grained Deduplication Framework for Backup Storage with High Deduplication Ratio",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Light-Dedup: A Light-weight Inline Deduplication Framework for Non-Volatile Memory File Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards condensed and efficient readonly file system via sortenhanced compression",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "dont maintain twice its alright merged metadata management in deduplication file system with gogetafs",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "the dilemma between deduplication and locality can both be achieved",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 162,
    "paper_ids": [
      2059,
      2061,
      2062
    ],
    "papers_without_artifact_ids": [
      2063,
      2064,
      2065
    ]
  },
  {
    "name": "Yanqi Pan",
    "display_name": "Yanqi Pan",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 1,
      "FAST": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 2
      },
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2026": 1,
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Garbage Collection Does Not Only Collect Garbage: Piggybacking-Style Defragmentation for Deduplicated Backup Storage",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Overcoming the Last Mile between Log-Structured File Systems and Persistent Memory via Scatter Logging",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Light-Dedup: A Light-weight Inline Deduplication Framework for Non-Volatile Memory File Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards condensed and efficient readonly file system via sortenhanced compression",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "dont maintain twice its alright merged metadata management in deduplication file system with gogetafs",
        "conference": "FAST",
        "year": 2025
      }
    ],
    "author_id": 163,
    "paper_ids": [
      2059,
      2060,
      2062
    ],
    "papers_without_artifact_ids": [
      2063,
      2064
    ]
  },
  {
    "name": "Hao Huang",
    "display_name": "Hao Huang",
    "affiliation": "George Washington University",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 2,
      "FAST": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2025": 2
      },
      "FAST": {
        "2026": 1,
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Garbage Collection Does Not Only Collect Garbage: Piggybacking-Style Defragmentation for Deduplicated Backup Storage",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Overcoming the Last Mile between Log-Structured File Systems and Persistent Memory via Scatter Logging",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pig in a Poke: Automatically Detecting and Exploiting Link Following Vulnerabilities in Windows File Operations",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards condensed and efficient readonly file system via sortenhanced compression",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "dont maintain twice its alright merged metadata management in deduplication file system with gogetafs",
        "conference": "FAST",
        "year": 2025
      }
    ],
    "author_id": 164,
    "paper_ids": [
      2059,
      2060,
      237
    ],
    "papers_without_artifact_ids": [
      2063,
      2064
    ]
  },
  {
    "name": "Christian Dietrich 0001",
    "display_name": "Christian Dietrich",
    "affiliation": "TU Braunschweig",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 2,
      "SOSP": 3,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2023": 2
      },
      "SOSP": {
        "2023": 1,
        "2021": 1,
        "2024": 1
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "HyperAlloc: Efficient VM Memory De/Inflation via Hypervisor-Shared Page-Frame Allocators",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "LLFree: Scalable and Optionally-Persistent Page-Frame Allocation",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "MELF: Multivariant Executables for a Heterogeneous World",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the new costs of physical memory fragmentation",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "morsels explicit virtual memory objects",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "cppsig extracting type information for cpreprocessor macro expansions",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "from global to local quiescence waitfree code patching of multithreaded processes",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 450,
    "paper_ids": [
      2806,
      2807,
      2808
    ],
    "papers_without_artifact_ids": [
      2809,
      2810,
      2811,
      2812
    ]
  },
  {
    "name": "Daniel Lohmann",
    "display_name": "Daniel Lohmann",
    "affiliation": "University of Hannover",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 2,
      "SOSP": 2,
      "SC": 0,
      "NDSS": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2023": 2
      },
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "SC": {},
      "NDSS": {},
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "HyperAlloc: Efficient VM Memory De/Inflation via Hypervisor-Shared Page-Frame Allocators",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "LLFree: Scalable and Optionally-Persistent Page-Frame Allocation",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "MELF: Multivariant Executables for a Heterogeneous World",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the new costs of physical memory fragmentation",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "morsels explicit virtual memory objects",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "from global to local quiescence waitfree code patching of multithreaded processes",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 451,
    "paper_ids": [
      2806,
      2807,
      2808
    ],
    "papers_without_artifact_ids": [
      2809,
      2810,
      2812
    ]
  },
  {
    "name": "Erci Xu",
    "display_name": "Erci Xu",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 3,
    "total_papers": 16,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 2,
      "SOSP": 0,
      "SC": 0,
      "FAST": 10,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      },
      "ATC": {
        "2022": 1,
        "2023": 1
      },
      "SOSP": {},
      "SC": {},
      "FAST": {
        "2024": 1,
        "2021": 1,
        "2026": 4,
        "2023": 2,
        "2025": 2
      },
      "OSDI": {
        "2024": 1,
        "2020": 1
      }
    },
    "artifact_rate": 18.8,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Hey Hey, My My, Skewness Is Here to Stay: Challenges and Opportunities in Cloud Block Store Traffic",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CSAL: the Next-Gen Local Disks for the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "NVMe SSD Failures in the Field: the Fail-Stop and the Fail-Slow",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mlsdisk trusted block storage for tees based on layered secure logging",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "range as a key is the key fast and compact cloud block store index with rask",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "here there and everywhere the past the present and the future of local storage in cloud",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "how soon is now preloading images for virtual disks with thinkahead",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "atomicdisk a secure virtual disk for tees against eviction attacks",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "dont maintain twice its alright merged metadata management in deduplication file system with gogetafs",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "whats the story in ebs glory evolutions and lessons in building cloud block store",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "ransom access memories achieving practical ransomware protection in cloud with deftpunk",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "deploying userspace tcp at cloud scale with luna",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "perseus a failslow detection framework for cloud storage systems",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "smrstore a storage engine for cloud object storage on hmsmr drives",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "concordia distributed shared memory with innetwork cache coherence",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "write dependency disentanglement with horae",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 242,
    "paper_ids": [
      2813,
      2086,
      2087
    ],
    "papers_without_artifact_ids": [
      1045,
      48,
      2089,
      2090,
      2814,
      2064,
      2091,
      2092,
      2093,
      1062,
      2094,
      1069,
      1071
    ]
  },
  {
    "name": "Wenguang Chen",
    "display_name": "Wenguang Chen",
    "affiliation": "Tsinghua University",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0,
      "ACSAC": 0,
      "NSDI": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "SC": {},
      "ATC": {},
      "ACSAC": {},
      "NSDI": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "MEPipe: Democratizing LLM Training with Memory-Efficient Slice-Level Pipeline Scheduling on Cost-Effective Accelerators",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "GraphAce: Secure Two-Party Graph Analysis Achieving Communication Efficiency",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TriCache: A User-Transparent Block Cache Enabling High-Performance Out-of-Core Processing with In-Memory Programs",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bumblebee secure twoparty inference framework for large transformers",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "canvas isolated and adaptive swapping for multiapplications on remote memory",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 452,
    "paper_ids": [
      2815,
      2816,
      2817
    ],
    "papers_without_artifact_ids": [
      309,
      2619
    ]
  },
  {
    "name": "Vasiliki Kalavri",
    "display_name": "Vasiliki Kalavri",
    "affiliation": "Boston University",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 2,
      "SOSP": 0,
      "NSDI": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2022": 1
      },
      "SOSP": {},
      "NSDI": {
        "2023": 1,
        "2018": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "CAPSys: Contention-aware task placement for data stream processing",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "A new benchmark harness for systematic and robust evaluation of streaming state stores",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TVA: A multi-party computation system for secure and expressive time series analytics",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secrecy secure collaborative analytics in untrusted clouds",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "snailtrail generalizing critical paths for online analysis of distributed dataflows",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 453,
    "paper_ids": [
      2818,
      2819,
      2443
    ],
    "papers_without_artifact_ids": [
      2446,
      2055
    ]
  },
  {
    "name": "Jinhyung Koo",
    "display_name": "Jinhyung Koo",
    "affiliation": "POSTECH, Republic of Korea",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2023,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Solid State Drive Targeted Memory-Efficient Indexing for Universal I/O Patterns and Fragmentation Degrees",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "All-Flash Array Key-Value Cache for Large Objects",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Modernizing File System through In-Storage Indexing",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 455,
    "paper_ids": [
      2071,
      2072,
      2074
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Juhyung Park",
    "display_name": "Juhyung Park",
    "affiliation": "DGIST, Republic of Korea",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "ATC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2023": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2023,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Solid State Drive Targeted Memory-Efficient Indexing for Universal I/O Patterns and Fragmentation Degrees",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Overcoming the Memory Wall with CXL-Enabled SSDs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Modernizing File System through In-Storage Indexing",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "integrated hostssd mapping table management for improving user experience of smartphones",
        "conference": "FAST",
        "year": 2023
      }
    ],
    "author_id": 456,
    "paper_ids": [
      2071,
      2073,
      2074
    ],
    "papers_without_artifact_ids": [
      2078
    ]
  },
  {
    "name": "Jinyu Gu 0001",
    "display_name": "Jinyu Gu",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 1,
      "NSDI": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "SOSP": {},
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2025": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "A Hardware-Software Co-Design for Efficient Secure Containers",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "A Hardware-Software Co-design for Efficient Intra-Enclave Isolation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Serverless Functions Made Confidential and Efficient with Split Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "odrp ondemand remote paging with programmable rdma",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "no provisioned concurrency fast rdmacodesigned remote fork for serverless computing",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "epk scalable and efficient memory protection keys",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 458,
    "paper_ids": [
      1685,
      38,
      39
    ],
    "papers_without_artifact_ids": [
      51,
      62,
      66
    ]
  },
  {
    "name": "Chenxiong Qian",
    "display_name": "Chenxiong Qian",
    "affiliation": "University of Hong Kong",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "ACSAC": 1,
      "SOSP": 0,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "SOSP": {},
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "ACSAC",
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Daredevil: Rescue Your Flash Storage from Inflexible Kernel Storage Stack",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DeView: Confining Progressive Web Applications by Debloating Web APIs",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Invisibility Cloak: Proactive Defense Against Visual Game Cheating",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automatic library fuzzing through api relation evolvement",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "beyond the surface uncovering the unprotected components of android against overlay attack",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 459,
    "paper_ids": [
      2778,
      1408,
      2820
    ],
    "papers_without_artifact_ids": [
      2821,
      779
    ]
  },
  {
    "name": "Zhi Yang 0001",
    "display_name": "Zhi Yang",
    "affiliation": "Peking University",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "OSDI": 4,
      "EUROSYS": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 2,
        "2020": 2
      },
      "EUROSYS": {
        "2025": 1,
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2020,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "NeuStream: Bridging Deep Learning Serving and Stream Processing",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Welder: Scheduling Deep Learning Memory Access via Tile-graph",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rammer: Enabling Holistic Deep Learning Compiler Optimizations with rTasks",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "silod a codesign of caching and scheduling for deep learning clusters",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "cocktailer analyzing and optimizing dynamic control flow in deep learning",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "hived sharing a gpu cluster for deep learning with guarantees",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 461,
    "paper_ids": [
      1034,
      153,
      156
    ],
    "papers_without_artifact_ids": [
      160,
      162,
      163
    ]
  },
  {
    "name": "Eren Yildiz",
    "display_name": "Eren Yildiz",
    "affiliation": "Ege University, Izmir, Turkiye",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "EUROSYS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficient and Safe I/O Operations for Intermittent Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Adaptable Runtime Monitoring for Intermittent Systems",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Immortal Threads: Multithreaded Event-driven Intermittent Computing on Ultra-Low-Power Microcontrollers",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 462,
    "paper_ids": [
      2822,
      2823,
      2824
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kasim Sinan Yildirim",
    "display_name": "Kasim Sinan Yildirim",
    "affiliation": "University of Trento",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "EUROSYS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficient and Safe I/O Operations for Intermittent Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Adaptable Runtime Monitoring for Intermittent Systems",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Immortal Threads: Multithreaded Event-driven Intermittent Computing on Ultra-Low-Power Microcontrollers",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 463,
    "paper_ids": [
      2822,
      2823,
      2824
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jeongseob Ahn",
    "display_name": "Jeongseob Ahn",
    "affiliation": "Korea University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Fast and Efficient Model Serving Using Multi-GPUs with Direct-Host-Access",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Memory Harvesting in Multi-GPU Systems with Hierarchical Unified Virtual Memory",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "EnvPipe: Performance-preserving DNN Training Framework for Saving Energy",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 464,
    "paper_ids": [
      2825,
      348,
      349
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peter Druschel",
    "display_name": "Peter Druschel",
    "affiliation": "Max Planck Society",
    "artifact_count": 3,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 0,
      "NSDI": 6,
      "NDSS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "SOSP": {},
      "ATC": {},
      "NSDI": {
        "2009": 1,
        "2012": 1,
        "2008": 2,
        "2005": 1,
        "2007": 1
      },
      "NDSS": {},
      "OSDI": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Groundhog: Efficient Request Isolation in FaaS",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CoVault: Secure, Scalable Analytics of Personal Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reliable client accounting for p2pinfrastructure hybrids",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "netreview detecting when interdomain routing goes wrong",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "ostra leveraging trust to thwart unwanted communication",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "bft protocols under fire",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "saar a shared control plane for overlay multicast",
        "conference": "NSDI",
        "year": 2007
      },
      {
        "title": "glacier highly durable decentralized storage despite massive correlated failures",
        "conference": "NSDI",
        "year": 2005
      }
    ],
    "author_id": 465,
    "paper_ids": [
      1965,
      1966,
      1967
    ],
    "papers_without_artifact_ids": [
      2731,
      2732,
      2826,
      2827,
      517,
      2733
    ]
  },
  {
    "name": "Yibo Zhu 0001",
    "display_name": "Yibo Zhu",
    "affiliation": "IISc Bangalore",
    "artifact_count": 3,
    "total_papers": 14,
    "total_papers_by_conf": {
      "OSDI": 3,
      "EUROSYS": 3,
      "SOSP": 0,
      "ATC": 1,
      "NSDI": 7
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2020": 2
      },
      "EUROSYS": {
        "2023": 2,
        "2024": 1
      },
      "SOSP": {},
      "ATC": {
        "2023": 1
      },
      "NSDI": {
        "2019": 3,
        "2025": 1,
        "2023": 1,
        "2022": 1,
        "2018": 1
      }
    },
    "artifact_rate": 21.4,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hi-Speed DNN Training with Espresso: Unleashing the Full Potential of Gradient Compression with Near-Optimal Usage Strategies",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CDMPP: A Device-Model Agnostic Framework for Latency Prediction of Tensor Programs",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "A Unified Architecture for Accelerating Distributed DNN Training in Heterogeneous GPU/CPU Clusters",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "optimizing rlhf training for large language models with stage fusion",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "distserve disaggregating prefill and decoding for goodputoptimized large language model serving",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "accelerating distributed moe training and inference with lina",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "lyra elastic scheduling for deep learning clusters",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "bgl gpuefficient gnn training by optimizing graph data io and preprocessing",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "collie finding performance anomalies in rdma subsystems",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "pipeswitch fast pipelined context switching for deep learning applications",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "slim os kernel support for a lowoverhead container overlay network",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "tiresias a gpu cluster manager for distributed deep learning",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "freeflow softwarebased virtual rdma networking for containerized clouds",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "007 democratically finding the cause of packet drops",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 469,
    "paper_ids": [
      2828,
      2829,
      2830
    ],
    "papers_without_artifact_ids": [
      999,
      1005,
      2527,
      2528,
      2831,
      2120,
      1013,
      2122,
      1956,
      2832,
      2833
    ]
  },
  {
    "name": "Vikram Narayanan",
    "display_name": "Vikram Narayanan",
    "affiliation": "University of California, Irvine",
    "artifact_count": 3,
    "total_papers": 10,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 1,
      "ACSAC": 2,
      "SOSP": 4,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "ACSAC": {
        "2024": 1,
        "2023": 1
      },
      "SOSP": {
        "2023": 2,
        "2021": 2
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 30.0,
    "repro_rate": 100.0,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "ACSAC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "DRAMHiT: A Hash Table Architected for the Speed of DRAM",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Remote attestation of confidential VMs using ephemeral vTPMs",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "KSplit: Automating Device Driver Isolation",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rust for linux understanding the security impact of rust in the linux kernel",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "limitations and opportunities of modern hardware isolation mechanisms",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "extending rust with support for zero copy communication",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "atmosphere towards practical verified kernels in rust",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "understanding the overheads of hardware and languagebased ipc mechanisms",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "isolation in rust what is missing",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "redleaf isolation and communication in a safe operating system",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 470,
    "paper_ids": [
      2834,
      2835,
      2166
    ],
    "papers_without_artifact_ids": [
      2836,
      2837,
      2838,
      2839,
      2840,
      2841,
      2842
    ]
  },
  {
    "name": "Anton Burtsev",
    "display_name": "Anton Burtsev",
    "affiliation": "University of Utah",
    "artifact_count": 3,
    "total_papers": 11,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 1,
      "ACSAC": 2,
      "SOSP": 5,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "ACSAC": {
        "2024": 1,
        "2023": 1
      },
      "SOSP": {
        "2023": 2,
        "2021": 2,
        "2024": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 27.3,
    "repro_rate": 100.0,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "ACSAC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "DRAMHiT: A Hash Table Architected for the Speed of DRAM",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Remote attestation of confidential VMs using ephemeral vTPMs",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "KSplit: Automating Device Driver Isolation",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rust for linux understanding the security impact of rust in the linux kernel",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "limitations and opportunities of modern hardware isolation mechanisms",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "veld verified linux drivers",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "extending rust with support for zero copy communication",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "atmosphere towards practical verified kernels in rust",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "understanding the overheads of hardware and languagebased ipc mechanisms",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "isolation in rust what is missing",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "redleaf isolation and communication in a safe operating system",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 471,
    "paper_ids": [
      2834,
      2835,
      2166
    ],
    "papers_without_artifact_ids": [
      2836,
      2837,
      2843,
      2838,
      2839,
      2840,
      2841,
      2842
    ]
  },
  {
    "name": "Eunji Lee",
    "display_name": "Eunji Lee",
    "affiliation": "Soongsil University, Seoul, Republic of Korea",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "ATC": 1,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2018": 1,
        "2013": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "All-Flash Array Key-Value Cache for Large Objects",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Overcoming the Memory Wall with CXL-Enabled SSDs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Modernizing File System through In-Storage Indexing",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rflush rethink the flush",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "unioning of the buffer cache and journaling layers with nonvolatile memory",
        "conference": "FAST",
        "year": 2013
      }
    ],
    "author_id": 472,
    "paper_ids": [
      2072,
      2073,
      2074
    ],
    "papers_without_artifact_ids": [
      2081,
      2844
    ]
  },
  {
    "name": "Bryan S. Kim",
    "display_name": "Bryan S. Kim",
    "affiliation": "Syracuse University",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "ATC": 1,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2024": 1,
        "2026": 1,
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "All-Flash Array Key-Value Cache for Large Objects",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Overcoming the Memory Wall with CXL-Enabled SSDs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Modernizing File System through In-Storage Indexing",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "preparation meets opportunity enhancing data preprocessing for ml training with seneca",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "the design and implementation of a capacityvariant storage system",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "design tradeoffs for ssd reliability",
        "conference": "FAST",
        "year": 2019
      }
    ],
    "author_id": 245,
    "paper_ids": [
      2072,
      2073,
      2074
    ],
    "papers_without_artifact_ids": [
      2845,
      2846,
      2847
    ]
  },
  {
    "name": "Shuai Mu 0001",
    "display_name": "Shuai Mu",
    "affiliation": "Stony Brook University",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 2,
      "SOSP": 0,
      "ATC": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2023": 1,
        "2022": 1
      },
      "SOSP": {},
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2021": 1,
        "2023": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 100.0,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2020,
      2022,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Viper: A Fast Snapshot Isolation Checker",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rolis: a software approach to efficiently replicating multi-core transactions",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Cobra: Making Transactional Key-Value Stores Verifiably Serializable",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "waverunner an elegant approach to hardware acceleration of state machine replication",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "ncc natural concurrency control for strictly serializable datastores by avoiding the timestampinversion pitfall",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "depfast orchestrating code of quorum systems",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "faulttolerant replication with pullbased consensus in mongodb",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 473,
    "paper_ids": [
      2848,
      1075,
      2849
    ],
    "papers_without_artifact_ids": [
      2850,
      2127,
      628,
      2851
    ]
  },
  {
    "name": "Cheng Tan 0005",
    "display_name": "Cheng Tan",
    "affiliation": "Northeastern University",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "OSDI": 3,
      "EUROSYS": 2,
      "SOSP": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2023": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2023": 1,
        "2024": 1
      },
      "SOSP": {
        "2024": 1
      },
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 100.0,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Viper: A Fast Snapshot Isolation Checker",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Encrypted Databases Made Secure Yet Maintainable",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Cobra: Making Transactional Key-Value Stores Verifiably Serializable",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "simplifying snapshot isolation a new definition equivalence and efficient checking",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "instanceoptimized mapping with portfolio methods",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "bringing decentralized search to decentralized services",
        "conference": "OSDI",
        "year": 2021
      },
      {
        "title": "netbouncer active device and link failure localization in data center networks",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 474,
    "paper_ids": [
      2848,
      43,
      2849
    ],
    "papers_without_artifact_ids": [
      2852,
      2853,
      72,
      2854
    ]
  },
  {
    "name": "Chuan Wu 0001",
    "display_name": "Chuan Wu",
    "affiliation": "University of Hong Kong",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "EUROSYS": 4,
      "SOSP": 0,
      "ATC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2024": 3
      },
      "SOSP": {},
      "ATC": {},
      "NSDI": {
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CDMPP: A Device-Model Agnostic Framework for Latency Prediction of Tensor Programs",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "HAP: SPMD DNN Training on Heterogeneous GPU Clusters with Automated Program Synthesis",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DynaPipe: Optimizing Multi-task Training through Dynamic Pipelines",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hybridflow a flexible and efficient rlhf framework",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "bytecheckpoint a unified checkpointing system for large foundation model development",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "bgl gpuefficient gnn training by optimizing graph data io and preprocessing",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 476,
    "paper_ids": [
      2829,
      2855,
      2650
    ],
    "papers_without_artifact_ids": [
      2856,
      2857,
      2831
    ]
  },
  {
    "name": "Kezhao Huang",
    "display_name": "Kezhao Huang",
    "affiliation": "Tsinghua University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "WiseGraph: Optimizing GNN with Joint Workload Partition of Graph and Operations",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PUZZLE: Efficiently Aligning Large Language Models through Light-Weight Context Switch",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "EINNET: Optimizing Tensor Programs with Derivation-Based Transformations",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 477,
    "paper_ids": [
      2097,
      2098,
      1619
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Liyan Zheng 0001",
    "display_name": "Liyan Zheng",
    "affiliation": "Tsinghua University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "WiseGraph: Optimizing GNN with Joint Workload Partition of Graph and Operations",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PET: Optimizing Tensor Programs with Partially Equivalent Transformations and Automated Corrections",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "EINNET: Optimizing Tensor Programs with Derivation-Based Transformations",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 478,
    "paper_ids": [
      2097,
      1616,
      1619
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haojie Wang 0004",
    "display_name": "Haojie Wang",
    "affiliation": "Tsinghua University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "SC": {},
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "WiseGraph: Optimizing GNN with Joint Workload Partition of Graph and Operations",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PET: Optimizing Tensor Programs with Partially Equivalent Transformations and Automated Corrections",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "EINNET: Optimizing Tensor Programs with Derivation-Based Transformations",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "magpy compiling eager mode dnn programs by monitoring execution states",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 479,
    "paper_ids": [
      2097,
      1616,
      1619
    ],
    "papers_without_artifact_ids": [
      2099
    ]
  },
  {
    "name": "Zhen Zheng",
    "display_name": "Zhen Zheng",
    "affiliation": "Microsoft",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "EUROSYS": 3,
      "ATC": 2,
      "SC": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2024": 1,
        "2021": 1
      },
      "ATC": {
        "2022": 1,
        "2024": 1
      },
      "SC": {},
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "WiseGraph: Optimizing GNN with Joint Workload Partition of Graph and Operations",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Whale: Efficient Giant Model Training over Heterogeneous GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Quant-LLM: Accelerating the Serving of Large Language Models via FP6-Centric Algorithm-System Co-Design on Modern GPUs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improving gpu sharing performance through adaptive bubbleless spatialtemporal sharing",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "mononn enabling a new monolithic optimization space for neural network inference tasks on modern gpucentric architectures",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "disc a dynamic shape compiler for machine learning workloads",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 480,
    "paper_ids": [
      2097,
      2858,
      2788
    ],
    "papers_without_artifact_ids": [
      1089,
      2789,
      2859
    ]
  },
  {
    "name": "Aurojit Panda",
    "display_name": "Aurojit Panda",
    "affiliation": "New York University",
    "artifact_count": 3,
    "total_papers": 11,
    "total_papers_by_conf": {
      "OSDI": 2,
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 0,
      "NSDI": 7
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "SOSP": {},
      "ATC": {},
      "NSDI": {
        "2013": 1,
        "2017": 2,
        "2025": 1,
        "2016": 1,
        "2022": 1,
        "2018": 1
      }
    },
    "artifact_rate": 27.3,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Efficient Auditing of Event-driven Web Applications",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ensō: A Streaming Interface for NIC-Application Communication",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "runtime protocol refinement checking for distributed protocol implementations",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "isolation mechanisms for highspeed packetprocessing pipelines",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "blockaid data access policy enforcement for web applications",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "resq enabling slos in network function virtualization",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "scl simplifying distributed sdn control planes",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "verifying reachability in networks with mutable datapaths",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "minimizing faulty executions of distributed systems",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "ensuring connectivity via data plane mechanisms",
        "conference": "NSDI",
        "year": 2013
      }
    ],
    "author_id": 247,
    "paper_ids": [
      2860,
      468,
      2696
    ],
    "papers_without_artifact_ids": [
      2861,
      2862,
      2863,
      2864,
      2865,
      2866,
      2867,
      2868
    ]
  },
  {
    "name": "Michael Walfish",
    "display_name": "Michael Walfish",
    "affiliation": "New York University",
    "artifact_count": 3,
    "total_papers": 9,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "SOSP": 1,
      "ATC": 0,
      "NSDI": 5,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "USENIXSEC": {
        "2022": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "SOSP": {
        "2024": 1
      },
      "ATC": {},
      "NSDI": {
        "2013": 1,
        "2024": 1,
        "2006": 1,
        "2016": 1,
        "2004": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Efficient Auditing of Event-driven Web Applications",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Zero-Knowledge Middleboxes",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cobra: Making Transactional Key-Value Stores Verifiably Serializable",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "zombie middleboxes that dont snoop",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "nope strengthening domain authentication with succinct proofs",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "scalable and private media consumption with popcorn",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "improving availability in distributed systems with failure informers",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "distributed quota enforcement for spam control",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "untangling the web from dns",
        "conference": "NSDI",
        "year": 2004
      }
    ],
    "author_id": 481,
    "paper_ids": [
      2860,
      2869,
      2849
    ],
    "papers_without_artifact_ids": [
      2870,
      2871,
      1998,
      2872,
      2873,
      2874
    ]
  },
  {
    "name": "Yueyang Pan",
    "display_name": "Yueyang Pan",
    "affiliation": "School of Computer &amp; Communication Sciences, EPFL, Switzerland",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "ATC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2024": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Transparent Multicore Scaling of Single-Threaded Network Functions",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Monarch: A Fuzzing Framework for Distributed File Systems",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Ship your Critical Section, Not Your Data: Enabling Transparent Delegation with TCLOCKS",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 482,
    "paper_ids": [
      526,
      1,
      530
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guihai Chen",
    "display_name": "Guihai Chen",
    "affiliation": "Nanjing University",
    "artifact_count": 3,
    "total_papers": 15,
    "total_papers_by_conf": {
      "EUROSYS": 6,
      "ATC": 3,
      "NSDI": 4,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 3,
        "2023": 1,
        "2024": 2
      },
      "ATC": {
        "2022": 1,
        "2024": 1,
        "2023": 1
      },
      "NSDI": {
        "2025": 3,
        "2023": 1
      },
      "OSDI": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Unison: A Parallel-Efficient and User-Transparent Network Simulation Kernel",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Zero Overhead Monitoring for Cloud-native Infrastructure using RDMA",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Adaptive Online Cache Capacity Optimization via Lightweight Working Set Size Estimation at Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enabling virtual priority in data center congestion control",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "empower vision applications with lora lmm",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "marlin enabling highthroughput congestion control testing in largescale networks",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "when p4 meets runtocompletion architecture",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "learning productionoptimized congestion control selection for alibaba cloud cdn",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "pyrrha congestionrootbased flow control to eliminate headofline blocking in datacenter",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "diagnosing applicationnetwork anomalies for millions of ips in production clouds",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "wormhole filters caching your hash on persistent memory",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "alt breaking the wall between data layout and loop optimizations for deep learning compilation",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "norma towards practical network load testing",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "flor an open high performance rdma framework over heterogeneous rnics",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "walle an endtoend generalpurpose and largescale production system for devicecloud collaborative machine learning",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 483,
    "paper_ids": [
      996,
      2660,
      2875
    ],
    "papers_without_artifact_ids": [
      2876,
      2877,
      2878,
      2879,
      2880,
      2881,
      1935,
      1375,
      2882,
      2883,
      1065,
      2884
    ]
  },
  {
    "name": "Wei Lin 0016",
    "display_name": "Wei Lin",
    "affiliation": "UESTC",
    "artifact_count": 3,
    "total_papers": 11,
    "total_papers_by_conf": {
      "OSDI": 3,
      "EUROSYS": 3,
      "ATC": 1,
      "SC": 0,
      "NSDI": 4
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 2,
        "2020": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2024": 1,
        "2021": 1
      },
      "ATC": {
        "2022": 1
      },
      "SC": {},
      "NSDI": {
        "2025": 1,
        "2012": 1,
        "2016": 1,
        "2022": 1
      }
    },
    "artifact_rate": 27.3,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HAP: SPMD DNN Training on Heterogeneous GPU Clusters with Automated Program Synthesis",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Whale: Efficient Giant Model Training over Heterogeneous GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Llumnix: Dynamic Scheduling for Large Language Model Serving",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improving gpu sharing performance through adaptive bubbleless spatialtemporal sharing",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "evolution of aegis fault diagnosis for ai model training service in production",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "mononn enabling a new monolithic optimization space for neural network inference tasks on modern gpucentric architectures",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "mlaas in the wild workload analysis and scheduling in largescale heterogeneous gpu clusters",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "disc a dynamic shape compiler for machine learning workloads",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "antman dynamic scaling on gpu clusters for deep learning",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "streamscope continuous reliable distributed processing of big data streams",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "optimizing data shuffling in dataparallel computation by understanding userdefined functions",
        "conference": "NSDI",
        "year": 2012
      }
    ],
    "author_id": 484,
    "paper_ids": [
      2855,
      2858,
      2885
    ],
    "papers_without_artifact_ids": [
      1089,
      2886,
      2789,
      2805,
      2859,
      2887,
      292,
      293
    ]
  },
  {
    "name": "Timothy Zhu",
    "display_name": "Timothy Zhu",
    "affiliation": "Pennsylvania State University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 2,
      "SOSP": 0,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1,
        "2021": 1
      },
      "SOSP": {},
      "SC": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2022,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TraceUpscaler: Upscaling Traces to Evaluate Systems at High Load",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TraceSplitter: a new paradigm for downscaling traces",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Metastable Failures in the Wild",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "kerveros efficient and scalable cloud admission control",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 485,
    "paper_ids": [
      2124,
      2125,
      2888
    ],
    "papers_without_artifact_ids": [
      2889
    ]
  },
  {
    "name": "Harshavardhan Unnibhavi",
    "display_name": "Harshavardhan Unnibhavi",
    "affiliation": "Technical University of Munich",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1,
        "2022": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2021,
      2022,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "rkt-io: a direct I/O stack for shielded execution",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "VMSH: hypervisor-agnostic guest overlays for VMs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "vFPIO: A Virtual I/O Abstraction for FPGA-accelerated I/O Devices",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 486,
    "paper_ids": [
      1386,
      2134,
      2136
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Lion",
    "display_name": "David Lion",
    "affiliation": "University of Toronto",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 1,
      "ATC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {
        "2022": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "M3: end-to-end memory management in elastic system software stacks",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Investigating Managed Language Runtime Performance: Why JavaScript and Python are 8x and 29x slower than C++, yet Java and Go can be Faster?",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Relational Debugging - Pinpointing Root Causes of Performance Problems",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hubble performance debugging with inproduction justintime method tracing on android",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 487,
    "paper_ids": [
      1631,
      1632,
      623
    ],
    "papers_without_artifact_ids": [
      1636
    ]
  },
  {
    "name": "Adrian Chiu",
    "display_name": "Adrian Chiu",
    "affiliation": "University of Toronto",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "M3: end-to-end memory management in elastic system software stacks",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Investigating Managed Language Runtime Performance: Why JavaScript and Python are 8x and 29x slower than C++, yet Java and Go can be Faster?",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Relational Debugging - Pinpointing Root Causes of Performance Problems",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 488,
    "paper_ids": [
      1631,
      1632,
      623
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael V. Le",
    "display_name": "Michael V. Le",
    "affiliation": "IBM Research",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "ATC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {
        "2024": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ATC",
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fast (Trapless) Kernel Probes Everywhere",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SeaK: Rethinking the Design of a Secure Allocator for OS Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 489,
    "paper_ids": [
      2139,
      620,
      933
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aditya Akella",
    "display_name": "Aditya Akella",
    "affiliation": "University of Texas at Austin",
    "artifact_count": 3,
    "total_papers": 26,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 2,
      "SOSP": 0,
      "ATC": 0,
      "USENIXSEC": 0,
      "NSDI": 23
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2022": 2
      },
      "SOSP": {},
      "ATC": {},
      "USENIXSEC": {},
      "NSDI": {
        "2021": 3,
        "2009": 1,
        "2024": 1,
        "2019": 2,
        "2025": 2,
        "2023": 3,
        "2010": 2,
        "2012": 2,
        "2016": 2,
        "2020": 4,
        "2018": 1
      }
    },
    "artifact_rate": 11.5,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Jiffy: elastic far-memory for stateful serverless analytics",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Memory deduplication for serverless computing with Medes",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PANIC: A High-Performance Programmable NIC for Multi-tenant Networks",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mtp transport for innetwork computing",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "enabling portable and highperformance smartnic programs with alkali",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "cassini networkaware job scheduling in machine learning clusters",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "ringleader efficiently offloading intraserver orchestration to nics",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "better together jointly optimizing ml collective scheduling and execution planning using syndicate",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "shockwave fair and efficient cluster scheduling for dynamic adaptation in machine learning",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "whiz datadriven analytics execution",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "atp innetwork aggregation for multitenant learning",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "running bgp in data centers at scale",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "liveness verification of stateful network functions",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "tiramisu fast multilayer network verification",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "themis fair and efficient gpu cluster scheduling",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "automated verification of customizable middlebox properties with gravel",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "correctness and performance for stateful chained network functions",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "loom flexible and efficient nic packet scheduling",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "iron isolating networkbased cpu in container environments",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "efficiently delivering online services over integrated infrastructure",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "paving the way for nfv simplifying middlebox modifications using statealyzr",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "xia efficient support for evolvable internetworking",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "rpt rearchitecting loss protection for contentaware networks",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "endre an endsystem redundancy elimination service for enterprises",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "cheap and large cams for high performance dataintensive networked systems",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "unraveling the complexity of network management",
        "conference": "NSDI",
        "year": 2009
      }
    ],
    "author_id": 490,
    "paper_ids": [
      466,
      2890,
      2891
    ],
    "papers_without_artifact_ids": [
      2892,
      2893,
      2894,
      2895,
      2896,
      1311,
      2897,
      2898,
      2899,
      2900,
      2901,
      1313,
      2121,
      2902,
      2903,
      2904,
      2905,
      2906,
      2907,
      2908,
      2909,
      2910,
      2911
    ]
  },
  {
    "name": "Joseph E. Gonzalez",
    "display_name": "Joseph E. Gonzalez",
    "affiliation": "Univ. of California - Berkeley",
    "artifact_count": 3,
    "total_papers": 11,
    "total_papers_by_conf": {
      "OSDI": 4,
      "EUROSYS": 2,
      "NSDI": 5
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2024": 1,
        "2023": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2021": 1,
        "2022": 1
      },
      "NSDI": {
        "2021": 1,
        "2017": 2,
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 27.3,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2020,
      2022,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "D3: a dynamic deadline-driven approach for building autonomous vehicles",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fairness in Serving Large Language Models",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Ansor: Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cloudcast highthroughput costaware overlay multicast in the cloud",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "skyplane optimizing transfer cost and throughput using cloudaware overlays",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "alpaserve statistical multiplexing with model parallelism for deep learning serving",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "alpa automating inter and intraoperator parallelism for distributed deep learning",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "rubberband cloudbased hyperparameter tuning",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "tegra efficient adhoc analytics on evolving graphs",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "opaque an oblivious and encrypted distributed analytics platform",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "clipper a lowlatency online prediction serving system",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 491,
    "paper_ids": [
      467,
      469,
      472
    ],
    "papers_without_artifact_ids": [
      479,
      481,
      484,
      488,
      490,
      493,
      499,
      500
    ]
  },
  {
    "name": "Lei Wang 0004",
    "display_name": "Lei Wang",
    "affiliation": "University of Arizona",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 3,
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2021": 1,
        "2022": 1
      },
      "ATC": {
        "2023": 2
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GNNLab: a factored system for sample-based GNN training over GPUs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Bridging the Gap between Relational OLTP and Graph-based OLAP",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Legion: Automatically Pushing the Envelope of Multi-GPU System for Billion-Scale GNN Training",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "moko marrying python with big data systems",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "flexgraph a flexible and efficient distributed framework for gnn training",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 492,
    "paper_ids": [
      1316,
      37,
      2145
    ],
    "papers_without_artifact_ids": [
      2147,
      1318
    ]
  },
  {
    "name": "Saurabh Bagchi",
    "display_name": "Saurabh Bagchi",
    "affiliation": "Purdue University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "USENIXSEC": {
        "2020": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "SC": {},
      "ATC": {},
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "LiteReconfig: cost and content aware reconfiguration of video object detection systems for mobile GPUs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ORION and the Three Rights: Sizing, Bundling, and Prewarming for Serverless DAGs",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 493,
    "paper_ids": [
      2912,
      9,
      2913
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alberto Sonnino",
    "display_name": "Alberto Sonnino",
    "affiliation": "MystenLabs & University College London",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "PETS": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "PETS": {
        "2024": 1,
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "PETS"
    ],
    "years": [
      2021,
      2022,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Narwhal and Tusk: a DAG-based mempool and efficient BFT consensus",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "EL PASSO: Efficient and Lightweight Privacy-preserving Single Sign On",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mysticeti reaching the latency limits with uncertified dags",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 494,
    "paper_ids": [
      2664,
      2914,
      2915
    ],
    "papers_without_artifact_ids": [
      2666
    ]
  },
  {
    "name": "Lingfeng Xiang",
    "display_name": "Lingfeng Xiang",
    "affiliation": "The University of Texas at Arlington",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Characterizing the performance of intel optane persistent memory: a close look at its on-DIMM buffering",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "P2CACHE: Exploring Tiered Memory for In-Kernel File Systems Caching",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Nomad: Non-Exclusive Memory Tiering via Transactional Page Migration",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 495,
    "paper_ids": [
      2105,
      2916,
      2917
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jia Rao",
    "display_name": "Jia Rao",
    "affiliation": "University of Texas at Arlington",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 2,
      "ATC": 1,
      "SOSP": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "EUROSYS": {
        "2021": 1,
        "2022": 1
      },
      "ATC": {
        "2023": 1
      },
      "SOSP": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Characterizing the performance of intel optane persistent memory: a close look at its on-DIMM buffering",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "P2CACHE: Exploring Tiered Memory for In-Kernel File Systems Caching",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Nomad: Non-Exclusive Memory Tiering via Transactional Page Migration",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pvm efficient shadow paging for deploying secure containers in cloudnative environment",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "parallelizing packet processing in container overlay networks",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 496,
    "paper_ids": [
      2105,
      2916,
      2917
    ],
    "papers_without_artifact_ids": [
      1936,
      2918
    ]
  },
  {
    "name": "Dan Williams 0001",
    "display_name": "Dan Williams",
    "affiliation": "Virginia Tech",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 2,
      "ATC": 1,
      "SOSP": 0,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "EUROSYS": {
        "2022": 2
      },
      "ATC": {
        "2024": 1
      },
      "SOSP": {},
      "NSDI": {
        "2013": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ATC",
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "KASLR in the age of MicroVMs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fast (Trapless) Kernel Probes Everywhere",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SeaK: Rethinking the Design of a Secure Allocator for OS Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "verified programs can party optimizing kernel extensions via postverification merging",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "splitmerge system support for elastic execution in virtual middleboxes",
        "conference": "NSDI",
        "year": 2013
      }
    ],
    "author_id": 254,
    "paper_ids": [
      2919,
      620,
      933
    ],
    "papers_without_artifact_ids": [
      629,
      2142
    ]
  },
  {
    "name": "Michael M. Swift",
    "display_name": "Michael M. Swift",
    "affiliation": "University of Wisconsin - Madison",
    "artifact_count": 3,
    "total_papers": 13,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1,
      "ATC": 3,
      "SOSP": 0,
      "EUROSYS": 0,
      "ACSAC": 0,
      "FAST": 4,
      "NSDI": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 2
      },
      "NDSS": {
        "2024": 1
      },
      "ATC": {
        "2022": 1,
        "2024": 1,
        "2023": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "ACSAC": {},
      "FAST": {
        "2020": 1,
        "2010": 1,
        "2013": 1,
        "2023": 1
      },
      "NSDI": {
        "2021": 1,
        "2019": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 23.1,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ATC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CBMM: Financial Advice for Kernel Memory Managers",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Guarding Serverless Applications with Kalium",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Architecting Trigger-Action Platforms for Security, Performance and Functionality",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fbmm making memory management extensible with filesystems",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "styx exploiting smartnic capability to reduce datacenter memory tax",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "madfs perfile virtualization for userspace persistent memory filesystems",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "gossamer securely measuring passwordbased logins",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "using trātṛ to tame adversarial synchronization",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "atp innetwork aggregation for multitenant learning",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "scalable parallel flash firmware for manycore architectures",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "loom flexible and efficient nic packet scheduling",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "getting real lessons in transitioning research simulations into hardware systems",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "membrane operating system support for restartable file systems",
        "conference": "FAST",
        "year": 2010
      }
    ],
    "author_id": 497,
    "paper_ids": [
      2920,
      2921,
      2922
    ],
    "papers_without_artifact_ids": [
      2923,
      2924,
      2016,
      2555,
      2018,
      2898,
      2782,
      2903,
      2029,
      2037
    ]
  },
  {
    "name": "Martina Lindorfer",
    "display_name": "Martina Lindorfer",
    "affiliation": "TU Wien",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ATC": 1,
      "ACSAC": 0,
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 2
      },
      "ATC": {
        "2022": 1
      },
      "ACSAC": {},
      "PETS": {
        "2023": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "both",
    "conferences": [
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Not that Simple: Email Delivery in the 21st Century",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TapTrap: Animation-Driven Tapjacking on Android",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "heads in the clouds measuring universities migration to public clouds implications for privacy academic freedom",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "not your average app a largescale privacy analysis of android browsers",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "comparing user perceptions of antistalkerware apps with the technical reality",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 501,
    "paper_ids": [
      2925,
      2438,
      2279
    ],
    "papers_without_artifact_ids": [
      2926,
      2927,
      1834
    ]
  },
  {
    "name": "Tobias Fiebig",
    "display_name": "Tobias Fiebig",
    "affiliation": "TU Wien",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ATC": 1,
      "WOOT": 0,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "ATC": {
        "2022": 1
      },
      "WOOT": {},
      "PETS": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Not that Simple: Email Delivery in the 21st Century",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SPF Beyond the Standard: Management and Operational Challenges in Practice and Practical Recommendations",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Catch-22: Uncovering Compromised Hosts using SSH Public Keys",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "heads in the clouds measuring universities migration to public clouds implications for privacy academic freedom",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "youve got report measurement and security implications of dmarc reporting",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "security at the end of the tunnel the anatomy of vpn mental models among experts and nonexperts in a corporate context",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 502,
    "paper_ids": [
      2925,
      2157,
      2928
    ],
    "papers_without_artifact_ids": [
      2926,
      2161,
      1836
    ]
  },
  {
    "name": "Wenhao Wang 0001",
    "display_name": "Wenhao Wang",
    "affiliation": "City University of Hong Kong",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ATC": 2,
      "ACSAC": 1,
      "CHES": 0,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "ATC": {
        "2022": 2
      },
      "ACSAC": {
        "2018": 1
      },
      "CHES": {},
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 33.3,
    "category": "both",
    "conferences": [
      "ATC",
      "NDSS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "HyperEnclave: An Open and Cross-platform Trusted Execution Environment",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "The Road to Trust: Building Enclaves within Confidential VMs",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tossing in the dark practical bitflipping on graybox deep neural networks for runtime trojan injection",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "beware of your screen anonymous fingerprinting of device screens for offline payment protection",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 503,
    "paper_ids": [
      2929,
      760,
      602
    ],
    "papers_without_artifact_ids": [
      604,
      2930
    ]
  },
  {
    "name": "Myeongjae Jeon",
    "display_name": "Myeongjae Jeon",
    "affiliation": "POSTECH",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "ATC": 5,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 2,
        "2024": 1,
        "2023": 2
      },
      "EUROSYS": {
        "2024": 1
      },
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Memory Harvesting in Multi-GPU Systems with Hierarchical Unified Virtual Memory",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "EnvPipe: Performance-preserving DNN Training Framework for Saving Energy",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Sponge: Fast Reactive Scaling for Stream Processing with Serverless Frameworks",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "metis fast automatic distributed training on heterogeneous gpus",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "blaze holistic caching for iterative data processing",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "sibylla to retry or not to retry on deep learning job failure",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "tiresias a gpu cluster manager for distributed deep learning",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 504,
    "paper_ids": [
      348,
      349,
      2931
    ],
    "papers_without_artifact_ids": [
      2932,
      2933,
      2934,
      1956
    ]
  },
  {
    "name": "Yufei Du",
    "display_name": "Yufei Du",
    "affiliation": "University of Rochester",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Automatic Recovery of Fine-grained Compiler Artifacts at the Binary Level",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Silhouette: Efficient Protected Shadow Stacks for Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 507,
    "paper_ids": [
      2935,
      2936,
      2937
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xian Wang",
    "display_name": "Xian Wang",
    "affiliation": "Western Sydney University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SOTER: Guarding Black-box Inference for General Neural Networks at the Edge",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ENIDrift: A Fast and Adaptive Ensemble System for Network Intrusion Detection under Real-world Drift",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OBLIVIATOR: OBLIVIous Parallel Joins and other OperATORs in Shared Memory Environments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "double face leveraging user intelligence to characterize and recognize aisynthesized faces",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 510,
    "paper_ids": [
      770,
      2938,
      2417
    ],
    "papers_without_artifact_ids": [
      2939
    ]
  },
  {
    "name": "Ryan Wails",
    "display_name": "Ryan Wails",
    "affiliation": "U.S. Naval Research Laboratory, Georgetown University",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2,
      "ATC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2022": 1,
        "2023": 1
      },
      "ATC": {
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "both",
    "conferences": [
      "ATC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Co-opting Linux Processes for High-Performance Network Simulation",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Censorship Evasion with Unidentified Protocol Generation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Data-Explainable Website Fingerprinting with Network Simulation",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on precisely detecting censorship circumvention in realworld networks",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "learning to behave improving covert channel security with behaviorbased designs",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 511,
    "paper_ids": [
      1699,
      1141,
      1700
    ],
    "papers_without_artifact_ids": [
      1144,
      1146
    ]
  },
  {
    "name": "Chenxi Wang 0005",
    "display_name": "Chenxi Wang",
    "affiliation": "Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China",
    "artifact_count": 3,
    "total_papers": 8,
    "total_papers_by_conf": {
      "OSDI": 3,
      "ATC": 2,
      "SOSP": 0,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2024": 1,
        "2020": 1
      },
      "ATC": {
        "2024": 2
      },
      "SOSP": {},
      "NSDI": {
        "2025": 1,
        "2023": 2
      }
    },
    "artifact_rate": 37.5,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2020,
      2022,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ScalaAFA: Constructing User-Space All-Flash Array Engine with Holistic Designs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "MemLiner: Lining up Tracing and Application for a Far-Memory-Friendly Runtime",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Semeru: A Memory-Disaggregated Managed Runtime",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "beehive a scalable disaggregated memory runtime exploiting asynchrony of multithreaded programs",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "scalacache scalable userspace page cache management with softwarehardware coordination",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "a tale of two paths toward a hybrid data plane for efficient farmemory applications",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "canvas isolated and adaptive swapping for multiapplications on remote memory",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "hermit lowlatency highthroughput and transparent remote memory via feedbackdirected asynchrony",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 513,
    "paper_ids": [
      2779,
      2940,
      2611
    ],
    "papers_without_artifact_ids": [
      2780,
      2781,
      1377,
      2619,
      2641
    ]
  },
  {
    "name": "Haoran Qiu",
    "display_name": "Haoran Qiu",
    "affiliation": "University of Illinois Urbana-Champaign",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 2,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "NSDI": {
        "2018": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Power-aware Deep Learning Model Serving with μ-Serve",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AWARE: Automate Workload Autoscaling with Reinforcement Learning in Production Cloud Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "FIRM: An Intelligent Fine-grained Resource Management Framework for SLO-Oriented Microservices",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reinforcement learning for resource management in multitenant serverless platforms",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "plover fast multicore scalable virtual machine faulttolerance",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 514,
    "paper_ids": [
      2644,
      2645,
      2941
    ],
    "papers_without_artifact_ids": [
      2648,
      1662
    ]
  },
  {
    "name": "Hubertus Franke",
    "display_name": "Hubertus Franke",
    "affiliation": "IBM Research, USA",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 2,
      "SOSP": 0,
      "SC": 0,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "SOSP": {},
      "SC": {},
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "ACSAC",
      "ATC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Power-aware Deep Learning Model Serving with μ-Serve",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AWARE: Automate Workload Autoscaling with Reinforcement Learning in Production Cloud Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Remote attestation of confidential VMs using ephemeral vTPMs",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reinforcement learning for resource management in multitenant serverless platforms",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 515,
    "paper_ids": [
      2644,
      2645,
      2835
    ],
    "papers_without_artifact_ids": [
      2648
    ]
  },
  {
    "name": "Ravishankar K. Iyer",
    "display_name": "Ravishankar K. Iyer",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 2,
      "SC": 0,
      "EUROSYS": 1,
      "USENIXSEC": 1,
      "WOOT": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "SC": {},
      "EUROSYS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "WOOT": {},
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Power-aware Deep Learning Model Serving with μ-Serve",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AWARE: Automate Workload Autoscaling with Reinforcement Learning in Production Cloud Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "FIRM: An Intelligent Fine-grained Resource Management Framework for SLO-Oriented Microservices",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "true attacks attack attempts or benign triggers an empirical measurement of network alerts in a security operations center",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "reinforcement learning for resource management in multitenant serverless platforms",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "caudit continuous auditing of ssh servers to mitigate bruteforce attacks",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 516,
    "paper_ids": [
      2644,
      2645,
      2941
    ],
    "papers_without_artifact_ids": [
      1531,
      2648,
      2942
    ]
  },
  {
    "name": "Sijie Shen",
    "display_name": "Sijie Shen",
    "affiliation": "Shanghai Artificial Intelligence Laboratory",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 2,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "ATC": {
        "2023": 2
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bridging the Gap between Relational OLTP and Graph-based OLAP",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "GLogS: Interactive Graph Pattern Matching Query At Large Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Retrofitting High Availability Mechanism to Tame Hybrid Transaction/Analytical Processing",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "moko marrying python with big data systems",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 518,
    "paper_ids": [
      37,
      2146,
      40
    ],
    "papers_without_artifact_ids": [
      2147
    ]
  },
  {
    "name": "Nick Sullivan",
    "display_name": "Nick Sullivan",
    "affiliation": "Cloudflare Inc.",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 2,
      "ATC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 2
      },
      "PETS": {
        "2023": 1,
        "2021": 1
      },
      "ATC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "both",
    "conferences": [
      "ATC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Portunus: Re-imagining Access Control in Distributed Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Might I Get Pwned: A Second Generation Compromised Credential Checking Service",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Evaluating practical QUIC website fingerprinting defenses for the masses",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "let the right one in attestation as a usable captcha alternative",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "oblivious dns over https odoh a practical privacy enhancement to dns",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 519,
    "paper_ids": [
      2943,
      2542,
      972
    ],
    "papers_without_artifact_ids": [
      2944,
      2945
    ]
  },
  {
    "name": "Salil S. Kanhere",
    "display_name": "Salil S. Kanhere",
    "affiliation": "UNSW",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 2,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 2
      },
      "ACSAC": {
        "2024": 2
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Can Trajectory Generation Combine Privacy and Utility?",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok trusting selfsovereign identity",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 520,
    "paper_ids": [
      761,
      2189,
      767
    ],
    "papers_without_artifact_ids": [
      2946
    ]
  },
  {
    "name": "Jorge Guajardo",
    "display_name": "Jorge Guajardo",
    "affiliation": "Robert Bosch Research and Technology Center, Germany",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1,
      "ACSAC": 1,
      "CHES": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "CHES": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Privacy-Preserving Verifiable Neural Network Inference Service",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MUSES: Efficient Multi-User Searchable Encrypted Database",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Client-Efficient Online-Offline Private Information Retrieval",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 521,
    "paper_ids": [
      1399,
      1401,
      1403
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhice Yang",
    "display_name": "Zhice Yang",
    "affiliation": "ShanghaiTech University",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {
        "2024": 2
      },
      "ATC": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "WiShield: Fine-grained Countermeasure Against Malicious Wi-Fi Sensing in Smart Home",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SecurityHub: Electromagnetic Fingerprinting USB Peripherals using Backscatter-assisted Commodity Hardware",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OneTouch: Effortless 2FA Scheme to Secure Fingerprint Authentication with Wearable OTP Token",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "camshield securing smart cameras through physical replication and isolation",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "crossvm and crossprocessor covert channels exploiting processor idle power management",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 522,
    "paper_ids": [
      2947,
      2948,
      2949
    ],
    "papers_without_artifact_ids": [
      2950,
      2951
    ]
  },
  {
    "name": "Aurélien Francillon",
    "display_name": "Aurélien Francillon",
    "affiliation": "EURECOM",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 2,
      "CHES": 1,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "ACSAC": {
        "2024": 1,
        "2019": 1
      },
      "CHES": {
        "2025": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BlueScream: Screaming Channels on Bluetooth Low Energy",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Symbolic execution with SymCC: Don't interpret, compile!",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "systematic comparison of symbolic execution systems intermediate representation and its generation",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 7917,
    "paper_ids": [
      2952,
      2953,
      2954
    ],
    "papers_without_artifact_ids": [
      2955
    ]
  },
  {
    "name": "Ee-Chien Chang",
    "display_name": "Ee-Chien Chang",
    "affiliation": "National University of Singapore",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ACSAC": 3,
      "USENIXSEC": 0,
      "PETS": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2021": 1,
        "2023": 1
      },
      "USENIXSEC": {},
      "PETS": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "T-Edge: Trusted Heterogeneous Edge Computing",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secretshared shuffle with malicious security",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 524,
    "paper_ids": [
      2956,
      2957,
      2958
    ],
    "papers_without_artifact_ids": [
      2959
    ]
  },
  {
    "name": "Adam Caulfield",
    "display_name": "Adam Caulfield",
    "affiliation": "Rochester Institute of Technology,USA",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {
        "2024": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 66.7,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SpecCFA: Enhancing Control Flow Attestation/Auditing via Application-Aware Sub-Path Speculation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 525,
    "paper_ids": [
      2170,
      2171,
      2172
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marco Caselli",
    "display_name": "Marco Caselli",
    "affiliation": "Siemens",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1,
        "2017": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2017,
      2024,
      2025
    ],
    "year_range": "2017-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "A Security Alert Investigation Tool Supporting Tier 1 Analysts in Contextualizing and Understanding Network Security Events",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Automated TTP Extraction from CTI Reports - Are We There Yet?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "replicawatcher trainingless anomaly detection in containerized microservices",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 526,
    "paper_ids": [
      2960,
      1436,
      1437
    ],
    "papers_without_artifact_ids": [
      1442
    ]
  },
  {
    "name": "Luca Allodi",
    "display_name": "Luca Allodi",
    "affiliation": "TU Eindhoven",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ACSAC": 3,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2022": 1,
        "2020": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020,
      2022,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "A Security Alert Investigation Tool Supporting Tier 1 Analysts in Contextualizing and Understanding Network Security Events",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "know your cybercriminal evaluating attacker preferences by measuring profile sales on an active leading criminal market for user impersonation at scale",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 527,
    "paper_ids": [
      2960,
      2961,
      2962
    ],
    "papers_without_artifact_ids": [
      2963
    ]
  },
  {
    "name": "Yanjun Zhang",
    "display_name": "Yanjun Zhang",
    "affiliation": "University of Technology Sydney,Sydney,Australia",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "ACSAC": {
        "2024": 1,
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Stealing Watermarks of Large Language Models via Mixed Integer Programming",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "On the Quality of Privacy Policy Documents of Virtual Personal Assistant Applications",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 528,
    "paper_ids": [
      2964,
      2965,
      2966
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leo Yu Zhang",
    "display_name": "Leo Yu Zhang",
    "affiliation": "Griffith University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Stealing Watermarks of Large Language Models via Mixed Integer Programming",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 529,
    "paper_ids": [
      2964,
      183,
      189
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Norrathep Rattanavipanon",
    "display_name": "Norrathep Rattanavipanon",
    "affiliation": "Prince of Songkla University,Thailand",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 530,
    "paper_ids": [
      2171,
      1174,
      2172
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Damith C. Ranasinghe",
    "display_name": "Damith C. Ranasinghe",
    "affiliation": "Adelaide University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2024": 1,
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 532,
    "paper_ids": [
      2189,
      2967,
      766
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Florian Draschbacher",
    "display_name": "Florian Draschbacher",
    "affiliation": "Graz University of Technology,Secure Information Technology Center Austria,Graz,Austria",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Manifest Problems: Analyzing Code Transparency for Android Application Bundles",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the doom of device drivers your android device most likely has nday kernel vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 533,
    "paper_ids": [
      1110,
      269,
      274
    ],
    "papers_without_artifact_ids": [
      279
    ]
  },
  {
    "name": "Jonathan Petit",
    "display_name": "Jonathan Petit",
    "affiliation": "Qualcomm",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vogues validation of object guise using estimated components",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 534,
    "paper_ids": [
      1729,
      126,
      1733
    ],
    "papers_without_artifact_ids": [
      1738
    ]
  },
  {
    "name": "Sebastian Köhler 0005",
    "display_name": "Sebastian Köhler",
    "affiliation": "University of Oxford",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Current Affairs: A Security Measurement Study of CCS EV Charging Deployments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7918,
    "paper_ids": [
      1757,
      2204,
      2205
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas Schneider 0003",
    "display_name": "Thomas Schneider",
    "affiliation": "TU Darmstadt",
    "artifact_count": 3,
    "total_papers": 8,
    "total_papers_by_conf": {
      "PETS": 2,
      "ACSAC": 2,
      "CHES": 0,
      "USENIXSEC": 4,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1
      },
      "CHES": {},
      "USENIXSEC": {
        "2022": 2,
        "2021": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 37.5,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2021,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MultiCent: Secure and Scalable Computation of Centrality Measures on Multilayer Graphs",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Efficient Privacy-preserving Clustering",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flame taming backdoors in federated learning",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "gpuaccelerated pir with clientindependent preprocessing for largescale applications",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "vasa vector aes instructions for security applications",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "aby20 improved mixedprotocol secure twoparty computation",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "privatedrop practical privacypreserving authentication for apple airdrop",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 536,
    "paper_ids": [
      2968,
      2969,
      2970
    ],
    "papers_without_artifact_ids": [
      2318,
      2971,
      2972,
      2973,
      424
    ]
  },
  {
    "name": "Hossein Yalame",
    "display_name": "Hossein Yalame",
    "affiliation": "Robert Bosch GmbH, Germany",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "PETS": 2,
      "ACSAC": 2,
      "CHES": 0,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1
      },
      "CHES": {},
      "USENIXSEC": {
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2021,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Efficient Privacy-preserving Clustering",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flame taming backdoors in federated learning",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "vasa vector aes instructions for security applications",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "aby20 improved mixedprotocol secure twoparty computation",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 537,
    "paper_ids": [
      2968,
      2601,
      2970
    ],
    "papers_without_artifact_ids": [
      2318,
      2972,
      2973
    ]
  },
  {
    "name": "Patrick Traynor",
    "display_name": "Patrick Traynor",
    "affiliation": "University of Florida",
    "artifact_count": 3,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 2,
      "ACSAC": 2,
      "ATC": 0,
      "WOOT": 0,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2022": 1,
        "2025": 2
      },
      "NDSS": {
        "2025": 2
      },
      "ACSAC": {
        "2024": 1,
        "2018": 1
      },
      "ATC": {},
      "WOOT": {},
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 30.0,
    "repro_rate": 66.7,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Analyzing the AI Nudification Application Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "characterizing the impact of audio deepfakes in the presence of cochlear implant",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "sok towards a unified approach to applied replicability for computer security",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "finding traceability attacks in the bluetooth low energy specification and its implementations",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "sok the good the bad and the unbalanced measuring structural limitations of deepfake media datasets",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "analyzing the monetization ecosystem of stalkerware",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "who are you i really wanna know detecting audio deepfakes through vocal tract reconstruction",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "a large scale investigation of obfuscation use in google play",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 538,
    "paper_ids": [
      2208,
      2210,
      1227
    ],
    "papers_without_artifact_ids": [
      2211,
      2212,
      1777,
      2213,
      2214,
      2215,
      1258
    ]
  },
  {
    "name": "Zheng Zhang",
    "display_name": "Zheng Zhang",
    "affiliation": "University of California, Riverside, USA",
    "artifact_count": 3,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "ACSAC": 1,
      "ATC": 0,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 2,
        "2021": 2
      },
      "ACSAC": {
        "2021": 1
      },
      "ATC": {},
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Eluding ML-based Adblockers With Actionable Adversarial Examples",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition Algorithms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "H2O2RAM: A High-Performance Hierarchical Doubly Oblivious RAM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i know what you asked prompt leakage via kvcache sharing in multitenant llm serving",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "syzbridge bridging the gap in exploitability assessment of linux kernel bugs in the linux ecosystem",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "symbisect accurate bisection for fuzzerexposed vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "relation mining under local differential privacy",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "syzvegas beating kernel fuzzing odds with reinforcement learning",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "an investigation of the android kernel patch ecosystem",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 539,
    "paper_ids": [
      802,
      2974,
      2524
    ],
    "papers_without_artifact_ids": [
      369,
      2223,
      2224,
      2476,
      2228,
      2229
    ]
  },
  {
    "name": "Jorge Blasco",
    "display_name": "Jorge Blasco",
    "affiliation": "Royal Holloway, University of London",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 3,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 2
      },
      "USENIXSEC": {
        "2025": 2,
        "2021": 1
      },
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 33.3,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Watch Over Your TV: A Security and Privacy Analysis of the Android TV Ecosystem",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cloudflow identifying securitysensitive data flows in serverless applications",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "towards improving code stylometry analysis in underground forums",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "collective information security in largescale urban protests the case of hong kong",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "how private is your period a systematic analysis of menstrual app privacy policies",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 540,
    "paper_ids": [
      2975,
      2279,
      2976
    ],
    "papers_without_artifact_ids": [
      2977,
      2978,
      2979,
      2980
    ]
  },
  {
    "name": "Martin Henze",
    "display_name": "Martin Henze",
    "affiliation": "RWTH Aachen University",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "introducing a comprehensive continuous and collaborative survey of intrusion detection datasets",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "powerduck a goose data set of cyberattacks in substations",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 541,
    "paper_ids": [
      2981,
      2982,
      2983
    ],
    "papers_without_artifact_ids": [
      2984,
      2985
    ]
  },
  {
    "name": "Fengjun Li",
    "display_name": "Fengjun Li",
    "affiliation": "University of Kansas",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 2,
      "ACSAC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2021,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "eunomia a realtime privacy compliance firewall for alexa skills",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "certificate transparency revisited the public inspections on thirdparty monitors",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 542,
    "paper_ids": [
      2238,
      2240,
      2241
    ],
    "papers_without_artifact_ids": [
      2242,
      2986
    ]
  },
  {
    "name": "Nicola Tuveri",
    "display_name": "Nicola Tuveri",
    "affiliation": "Tampere University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2020,
      2022
    ],
    "year_range": "2018-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Certified Side Channels",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OpenSSLNTRU: Faster post-quantum TLS key exchange",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 543,
    "paper_ids": [
      2250,
      2251,
      1808
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michalis Polychronakis",
    "display_name": "Michalis Polychronakis",
    "affiliation": "Stony Brook University",
    "artifact_count": 3,
    "total_papers": 10,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 3,
      "ACSAC": 4,
      "EUROSYS": 1,
      "ATC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2021": 1
      },
      "ACSAC": {
        "2018": 1,
        "2019": 1,
        "2017": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 30.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2020,
      2021
    ],
    "year_range": "2018-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Shredder: Breaking Exploits through API Specialization",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Temporal System Call Specialization for Attack Surface Reduction",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Domain name encryption is not enough: privacy leakage via IP-based website fingerprinting",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "leakless selective data protection against memory leakage attacks for serverless platforms",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "gfweb measuring the great firewalls web censorship at scale",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "sgxpecial specializing sgx interfaces against code reuse attacks",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "how great is the great firewall measuring chinas dns censorship",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "a flexible framework for expediting bug finding by leveraging past misbehavior to discover new bugs",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "mitigating data leakage by protecting memoryresident sensitive data",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "protecting cots binaries from disclosureguided code reuse attacks",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 544,
    "paper_ids": [
      2987,
      2988,
      2989
    ],
    "papers_without_artifact_ids": [
      2990,
      2991,
      2992,
      2993,
      2994,
      2995,
      2996
    ]
  },
  {
    "name": "Christof Ferreira Torres",
    "display_name": "Christof Ferreira Torres",
    "affiliation": "Universidade de Lisboa",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2021,
      2023
    ],
    "year_range": "2018-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 545,
    "paper_ids": [
      2997,
      2467,
      2998
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nils Ole Tippenhauer",
    "display_name": "Nils Ole Tippenhauer",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {
        "2022": 1,
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hiding in plain sight on the efficacy of power side channelbased control flow monitoring",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "lightblue automatic profileaware debloating of bluetooth stacks",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 546,
    "paper_ids": [
      2999,
      3000,
      109
    ],
    "papers_without_artifact_ids": [
      3001,
      27
    ]
  },
  {
    "name": "Zhuojia Shen",
    "display_name": "Zhuojia Shen",
    "affiliation": "University of Rochester, United States of America",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 66.7,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Randezvous: Making Randomization Effective on MCUs",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Silhouette: Efficient Protected Shadow Stacks for Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 547,
    "paper_ids": [
      3002,
      2936,
      2937
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "John Criswell",
    "display_name": "John Criswell",
    "affiliation": "University of Rochester",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "SOSP": 0,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "SOSP": {},
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Randezvous: Making Randomization Effective on MCUs",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Silhouette: Efficient Protected Shadow Stacks for Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "jinn hijacking safe programs with trojans",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "hardening hypervisors with ombro",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 548,
    "paper_ids": [
      3002,
      2936,
      2937
    ],
    "papers_without_artifact_ids": [
      3003,
      3004
    ]
  },
  {
    "name": "Erik Buchholz",
    "display_name": "Erik Buchholz",
    "affiliation": "University of New South Wales/CSIRO's Data61/Cyber Security CRC",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "ACSAC": {
        "2022": 1,
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2020,
      2022,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Reconstruction Attack on Differential Private Trajectory Protection Mechanisms",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privacy-Preserving Production Process Parameter Exchange",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Can Trajectory Generation Combine Privacy and Utility?",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 549,
    "paper_ids": [
      763,
      3005,
      767
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Savio Sciancalepore",
    "display_name": "Savio Sciancalepore",
    "affiliation": "Eindhoven University of Technology (TU/e), Netherlands",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "ACSAC": 5,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1,
        "2022": 2,
        "2023": 2
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Privacy-Preserving Trajectory Matching on Autonomous Unmanned Aerial Vehicles",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "selective authenticated pilot location disclosure for remote idenabled drones",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "the dayaftertomorrow on the performance of radio fingerprinting over time",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "arid anonymous remote identification of unmanned aerial vehicles",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 550,
    "paper_ids": [
      3006,
      2961,
      3007
    ],
    "papers_without_artifact_ids": [
      3008,
      3009,
      3010
    ]
  },
  {
    "name": "Guangdong Bai",
    "display_name": "Guangdong Bai",
    "affiliation": "City University of Hong Kong",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 2,
      "ATC": 0,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "ACSAC": {
        "2022": 1,
        "2017": 1
      },
      "ATC": {},
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2017,
      2022,
      2024
    ],
    "year_range": "2017-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "On the Quality of Privacy Policy Documents of Virtual Personal Assistant Applications",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "being transparent is merely the beginning enforcing purpose limitation with polynomial approximation",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 551,
    "paper_ids": [
      2965,
      1695,
      2966
    ],
    "papers_without_artifact_ids": [
      1578
    ]
  },
  {
    "name": "Elia Geretto",
    "display_name": "Elia Geretto",
    "affiliation": "Vrije Universiteit Amsterdam, Netherlands",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ACSAC": 3,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1,
        "2023": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020,
      2022,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Triereme: Speeding up hybrid fuzzing through efficient query scheduling",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "collabfuzz a framework for collaborative fuzzing",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 552,
    "paper_ids": [
      79,
      80,
      81
    ],
    "papers_without_artifact_ids": [
      94
    ]
  },
  {
    "name": "Collins W. Munyendo",
    "display_name": "Collins W. Munyendo",
    "affiliation": "Computer Science, The George Washington University, United States of America",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 2,
        "2025": 2,
        "2021": 2
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 0.0,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "User Perceptions of Five-Word Passwords",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Why Users (Don't) Use Password Managers at a Large Educational Institution",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"No, I Can't Be a Security Personnel on Your Phone\": Security and Privacy Threats From Sharing Infrastructure in Rural Ghana",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "digital security perceptions and practices around the world a weird versus nonweird comparison",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "the same pin just longer on the insecurity of upgrading pins from 4 to 6 digits",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "using a blocklist to improve the security of user selection of android patterns",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "strategies and perceived risks of sending sensitive documents",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 553,
    "paper_ids": [
      856,
      860,
      3011
    ],
    "papers_without_artifact_ids": [
      3012,
      867,
      873,
      876
    ]
  },
  {
    "name": "Zicheng Wang 0010",
    "display_name": "Zicheng Wang",
    "affiliation": "Nanjing University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "SOSP": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "SOSP": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Formal Modeling and Security Analysis for Intra-level Privilege Separation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SeaK: Rethinking the Design of a Secure Allocator for OS Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PET: Prevent Discovered Errors from Being Triggered in the Linux Kernel",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bulkhead secure scalable and efficient kernel compartmentalization with pks",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 554,
    "paper_ids": [
      3013,
      933,
      1872
    ],
    "papers_without_artifact_ids": [
      3014
    ]
  },
  {
    "name": "Yunheung Paek",
    "display_name": "Yunheung Paek",
    "affiliation": "Seoul National University",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 1,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 2
      },
      "ACSAC": {
        "2022": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust Integrity",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SLOTHE : Lazy Approximation of Non-Arithmetic Neural Network Functions over Encrypted Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lohen layerwise optimizations for neural network inferences over encrypted data with high performance or accuracy",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "trust a compilation framework for inprocess isolation to protect safe rust against untrusted code",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 555,
    "paper_ids": [
      2283,
      3015,
      3016
    ],
    "papers_without_artifact_ids": [
      3017,
      3018
    ]
  },
  {
    "name": "Lorenzo Cavallaro",
    "display_name": "Lorenzo Cavallaro",
    "affiliation": "University College London",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 3,
      "EUROSYS": 0,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2024": 1,
        "2022": 1,
        "2020": 1
      },
      "EUROSYS": {},
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 66.7,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Designing a Provenance Analysis for SGX Enclaves",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the impact of active learning on availability data poisoning for android malware classifiers",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "dos and donts of machine learning in computer security",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "probabilistic naming of functions in stripped binaries",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 556,
    "paper_ids": [
      3,
      1150,
      2279
    ],
    "papers_without_artifact_ids": [
      3019,
      541,
      3020
    ]
  },
  {
    "name": "Thijs van Ede",
    "display_name": "Thijs van Ede",
    "affiliation": "University of Twente",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2022": 1,
        "2017": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2017,
      2022,
      2025
    ],
    "year_range": "2017-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Automated TTP Extraction from CTI Reports - Are We There Yet?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 557,
    "paper_ids": [
      2961,
      1436,
      1437
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stjepan Picek",
    "display_name": "Stjepan Picek",
    "affiliation": "TU Delft",
    "artifact_count": 3,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1,
      "ACSAC": 1,
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "CHES": {
        "2022": 2,
        "2021": 2
      }
    },
    "artifact_rate": 37.5,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the best of two worlds deep learningassisted template attack",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "exploring feature selection scenarios for deep learningbased sidechannel analysis",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "hand me your pin inferring atm pins of users typing with a covered hand",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "keep it unsupervised horizontal attacks meet deep learning",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "reinforcement learning for hyperparameter tuning in deep learningbased sidechannel analysis",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 558,
    "paper_ids": [
      2286,
      1485,
      3021
    ],
    "papers_without_artifact_ids": [
      3022,
      3023,
      1139,
      3024,
      3025
    ]
  },
  {
    "name": "Karthik Pattabiraman",
    "display_name": "Karthik Pattabiraman",
    "affiliation": "University of British Columbia",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "NDSS": 2,
      "ACSAC": 1,
      "SC": 0,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "ACSAC": {
        "2019": 1
      },
      "SC": {},
      "EUROSYS": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS"
    ],
    "years": [
      2019,
      2024,
      2025
    ],
    "year_range": "2019-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Out of control: stealthy attacks against robotic vehicles protected by control-based techniques",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Method to Facilitate Membership Inference Attacks in Deep Learning Models",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hot under the hood an analysis of ambient temperature impact on heterogeneous edge platforms",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "snowflakes at the edge a study of variability among nvidia jetson agx xavier boards",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 559,
    "paper_ids": [
      3026,
      3027,
      3028
    ],
    "papers_without_artifact_ids": [
      3029,
      3030
    ]
  },
  {
    "name": "Ninghui Li 0001",
    "display_name": "Ninghui Li",
    "affiliation": "Purdue University",
    "artifact_count": 3,
    "total_papers": 12,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "ACSAC": 3,
      "PETS": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 2
      },
      "ACSAC": {
        "2018": 1,
        "2019": 1,
        "2017": 1
      },
      "PETS": {
        "2020": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2022,
      2025
    ],
    "year_range": "2019-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Koinonia: verifiable e-voting with long-term privacy",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "censor defense against gradient inversion via orthogonal subspace bayesian sampling",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "on the robustness of ldp protocols for numerical attributes under data poisoning attacks",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "mist defending against membership inference attacks through membershipinvariant subspace training",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "finegrained poisoning attack to local differential privacy protocols for mean and variance estimation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "privsyn differentially private data synthesis",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "polyscope multipolicy access control analysis to compute authorized attack operations in android systems",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "protecting the 4g and 5g cellular paging protocols against security and privacy attacks",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "why johnny cant make money with his contents pitfalls of designing and implementing content delivery apps",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "analysis of seandroid policies combining mac and dac in android",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 560,
    "paper_ids": [
      894,
      1167,
      3031
    ],
    "papers_without_artifact_ids": [
      3032,
      3033,
      3034,
      3035,
      210,
      2230,
      1172,
      2582,
      2271
    ]
  },
  {
    "name": "Engin Kirda",
    "display_name": "Engin Kirda",
    "affiliation": "Northeastern University",
    "artifact_count": 3,
    "total_papers": 13,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "NDSS": 2,
      "ACSAC": 5,
      "ATC": 0,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 1,
        "2022": 2
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "ACSAC": {
        "2018": 1,
        "2022": 1,
        "2019": 1,
        "2023": 1,
        "2017": 1
      },
      "ATC": {},
      "WOOT": {}
    },
    "artifact_rate": 23.1,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2024,
      2025
    ],
    "year_range": "2019-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Speculator: a tool to analyze speculative execution attacks and mitigations",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CO3: Concolic Co-execution for Firmware",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure IP Address Allocation at Cloud Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "untangle multilayer web server fingerprinting",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "shift semihosted fuzz testing for embedded applications",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "oauth 20 redirect uri validation falls short literally",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "a study of multifactor and riskbased authentication availability",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "a recent year on the internet measuring and understanding the threats to everyday internet devices",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "web cache deception escalates",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "frameshifter security implications of http2tohttp1 conversion anomalies",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "cached and confused web cache deception in the wild",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "on the effectiveness of typebased control flow integrity",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "exray detection of historyleaking browser extensions",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 561,
    "paper_ids": [
      3036,
      3037,
      3038
    ],
    "papers_without_artifact_ids": [
      3039,
      3040,
      3041,
      3042,
      3043,
      3044,
      3045,
      3046,
      3047,
      2426
    ]
  },
  {
    "name": "Xiangfu Song",
    "display_name": "Xiangfu Song",
    "affiliation": "National University of Singapore & Guangzhou University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Beyond Statistical Estimation: Differentially Private Individual Computation via Shuffling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secretshared shuffle with malicious security",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 562,
    "paper_ids": [
      2958,
      3048,
      839
    ],
    "papers_without_artifact_ids": [
      2959
    ]
  },
  {
    "name": "Phillip Rieger",
    "display_name": "Phillip Rieger",
    "affiliation": "Technical University of Darmstadt, Germany",
    "artifact_count": 3,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "NDSS": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2023": 1
      },
      "NDSS": {
        "2024": 2,
        "2025": 2
      }
    },
    "artifact_rate": 37.5,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LightShed: Defeating Perturbation-based Image Copyright Protections",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "safesplit a novel defense against clientside backdoor attacks in split learning",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "voiceradar voice deepfake detection using microfrequency and compositional analysis",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "crowdguard federated backdoor detection in federated learning",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "freqfed a frequency analysisbased approach for mitigating poisoning attacks in federated learning",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "flame taming backdoors in federated learning",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 563,
    "paper_ids": [
      2301,
      2302,
      2303
    ],
    "papers_without_artifact_ids": [
      2305,
      2306,
      2308,
      2309,
      2318
    ]
  },
  {
    "name": "Christoph Krauß",
    "display_name": "Christoph Krauß",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "ACSAC": {
        "2023": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 66.7,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Detection of Anomalies in Electric Vehicle Charging Sessions",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Remote Attestation with Constrained Disclosure",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Integrating Privacy into the Electric Vehicle Charging Architecture",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7919,
    "paper_ids": [
      410,
      3049,
      3050
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fabian Rauscher",
    "display_name": "Fabian Rauscher",
    "affiliation": "Graz University of Technology, Austria",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      },
      "ACSAC": {
        "2023": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 0.0,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DOPE: DOmain Protection Enforcement with PKS",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a systematic evaluation of novel and existing cache side channels",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "secret spilling drive leaking user behavior through ssd contention",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "teecorrelate an informationpreserving defense against performancecounter attacks on tees",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "idleleak exploiting idle state side effects for information leakage",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 565,
    "paper_ids": [
      265,
      335,
      338
    ],
    "papers_without_artifact_ids": [
      341,
      340,
      342,
      343
    ]
  },
  {
    "name": "Yixin Sun",
    "display_name": "Yixin Sun",
    "affiliation": "University of Virginia",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2022": 1
      },
      "ACSAC": {
        "2022": 1,
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Creating a Secure Underlay for the Internet",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RPKI-Based Location-Unaware Tor Guard Relay Selection Algorithms",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rapid realtime alert investigation with contextaware prioritization for efficient threat discovery",
        "conference": "ACSAC",
        "year": 2022
      }
    ],
    "author_id": 566,
    "paper_ids": [
      3051,
      129,
      3052
    ],
    "papers_without_artifact_ids": [
      141
    ]
  },
  {
    "name": "Zhou Li 0001",
    "display_name": "Zhou Li",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 3,
    "total_papers": 15,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 5,
      "ACSAC": 8,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 2,
        "2021": 1
      },
      "ACSAC": {
        "2021": 2,
        "2018": 2,
        "2022": 1,
        "2019": 1,
        "2023": 1,
        "2020": 1
      },
      "PETS": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "ACSAC",
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Differentially Private Resource Allocation",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Userspace Bypass: Accelerating Syscall-intensive Applications",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a comprehensive study of privacy risks in curriculum learning",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "the maginot line attacking the boundary of dns caching protection",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "prographer an anomaly detection system based on provenance graph embedding",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "play the imitation game model extraction attack against autonomous driving localization",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "the manyfaced god attacking face verification system with embedding and image recovery",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "detecting and characterizing sms spearphishing attacks",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "seal storageefficient causality analysis on enterprise logs with queryfriendly compression",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "understanding promotionasaservice on github",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "a comprehensive study of dnsoverhttps downgrade attack",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "casino royale a deep exploration of illegal online gambling",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "made security analytics for enterprise threat detection",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "beware of your screen anonymous fingerprinting of device screens for offline payment protection",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 567,
    "paper_ids": [
      180,
      544,
      3053
    ],
    "papers_without_artifact_ids": [
      194,
      569,
      3054,
      3055,
      3056,
      918,
      3057,
      260,
      3058,
      3059,
      3060,
      2930
    ]
  },
  {
    "name": "Petr Svenda",
    "display_name": "Petr Svenda",
    "affiliation": "Masaryk University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "CHES": 3,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      },
      "CHES": {
        "2024": 2,
        "2025": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "CHES"
    ],
    "years": [
      2017,
      2024
    ],
    "year_range": "2017-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ectester reverseengineering sidechannel countermeasures of ecc implementations",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 568,
    "paper_ids": [
      3061,
      3062,
      3063
    ],
    "papers_without_artifact_ids": [
      3064
    ]
  },
  {
    "name": "Michele Carminati",
    "display_name": "Michele Carminati",
    "affiliation": "Politecnico di Milano",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1,
      "ACSAC": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2018": 1,
        "2020": 2
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Automated TTP Extraction from CTI Reports - Are We There Yet?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "nosql breakdown a largescale analysis of misconfigured nosql services",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "systaint assisting reversing of malicious network communications",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 569,
    "paper_ids": [
      3000,
      1437,
      3065
    ],
    "papers_without_artifact_ids": [
      3066,
      3067
    ]
  },
  {
    "name": "Stefano Zanero",
    "display_name": "Stefano Zanero",
    "affiliation": "Politecnico di Milano",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1,
      "ACSAC": 4,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2018": 2,
        "2020": 2
      },
      "EUROSYS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Automated TTP Extraction from CTI Reports - Are We There Yet?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "nosql breakdown a largescale analysis of misconfigured nosql services",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "theres a hole in that bucket a largescale analysis of misconfigured s3 buckets",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "systaint assisting reversing of malicious network communications",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 570,
    "paper_ids": [
      3000,
      1437,
      3065
    ],
    "papers_without_artifact_ids": [
      3066,
      3068,
      3067
    ]
  },
  {
    "name": "Pierre-Alain Fouque",
    "display_name": "Pierre-Alain Fouque",
    "affiliation": "Rennes University",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1,
      "ACSAC": 1,
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "CHES": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"These results must be false\": A usability evaluation of constant-time analysis tools",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "avengers assemble supervised learning meets lattice reduction a single power trace attack against crystalskyber key generation",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "bat small and fast kem over ntru lattices",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 571,
    "paper_ids": [
      1782,
      1784,
      1786
    ],
    "papers_without_artifact_ids": [
      3069,
      3070
    ]
  },
  {
    "name": "Yingjiu Li",
    "display_name": "Yingjiu Li",
    "affiliation": "University of Oregon",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 3,
      "PETS": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "ACSAC": {
        "2018": 1,
        "2020": 2
      },
      "PETS": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "prisrv privacyenhanced and highly usable service discovery in wireless communications",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "guardspark finegrained purposeaware access control for secure data sharing and analysis in spark",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "typingproof usable secure and lowcost twofactor authentication based on keystroke timings",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 572,
    "paper_ids": [
      835,
      949,
      445
    ],
    "papers_without_artifact_ids": [
      3071,
      2245,
      3072
    ]
  },
  {
    "name": "Christina Pöpper",
    "display_name": "Christina Pöpper",
    "affiliation": "NYU Abu Dhabi",
    "artifact_count": 3,
    "total_papers": 12,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "ACSAC": 3,
      "WOOT": 0,
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 2,
        "2023": 3,
        "2025": 1
      },
      "ACSAC": {
        "2021": 1,
        "2022": 1,
        "2020": 1
      },
      "WOOT": {},
      "PETS": {
        "2024": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Exposing the Guardrails: Reverse-Engineering and Jailbreaking Safety Filters in DALL·E Text-to-Image Pipelines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "media talks privacy unraveling a decade of privacy discourse around the world",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "amplifying threats the role of multisender coordination in smstimingbased location inference attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "freaky leaky sms extracting user locations by analyzing sms timings",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "codexleaks privacy leaks from code generation language models in github copilot",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "you have been warned abusing 5gs warning and emergency systems",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "dont hand it over vulnerabilities in the handover procedure of cellular telecommunications",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "sok managing longitudinal privacy of publicly shared personal online data",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "call me maybe eavesdropping encrypted lte calls with revolte",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "timeless timing attacks exploiting concurrency to leak secrets over remote connections",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 7920,
    "paper_ids": [
      3073,
      3074,
      3075
    ],
    "papers_without_artifact_ids": [
      3076,
      3077,
      3078,
      3079,
      3080,
      3081,
      3082,
      121,
      3083
    ]
  },
  {
    "name": "Bailey Kacsmar",
    "display_name": "Bailey Kacsmar",
    "affiliation": "University of Waterloo",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 3,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2022": 1
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Over-Threshold Multi-Party Private Set Intersection",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Caring about Sharing: User Perceptions of Multiparty Data Sharing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mind the Gap: Ceremonies for Applied Secret Sharing",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fast and private inference of deep neural networks by codesigning activation functions",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "pepsi practically efficient private set intersection in the unbalanced setting",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 574,
    "paper_ids": [
      1208,
      1210,
      1211
    ],
    "papers_without_artifact_ids": [
      1215,
      1216
    ]
  },
  {
    "name": "Fritz Alder",
    "display_name": "Fritz Alder",
    "affiliation": "KU Leuven, Belgium",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 66.7,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Faulty Point Unit: ABI Poisoning Attacks on Intel SGX",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BlueGuard: Accelerated Host and Guest Introspection Using DPUs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Efficient and Timely Revocation of V2X Credentials",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 575,
    "paper_ids": [
      1445,
      3084,
      3085
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David F. Oswald",
    "display_name": "David F. Oswald",
    "affiliation": "University of Birmingham",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "CHES": 3,
      "USENIXSEC": 1,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "CHES": {
        "2021": 1,
        "2025": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 33.3,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "CHES"
    ],
    "years": [
      2020,
      2021,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Faulty Point Unit: ABI Poisoning Attacks on Intel SGX",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CHERI-Crypt: Transparent Memory Encryption on Capability Architectures",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pmfault faulting and bricking server cpus through management interfaces or a modern example of halt and catch fire",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "voltpillager hardwarebased fault injection attacks against intel sgx enclaves using the svid voltage scaling interface",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 576,
    "paper_ids": [
      1445,
      3086,
      3087
    ],
    "papers_without_artifact_ids": [
      3088,
      3089
    ]
  },
  {
    "name": "Mingshen Sun",
    "display_name": "Mingshen Sun",
    "affiliation": "Baidu",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "RusTEE: Developing Memory-Safe ARM TrustZone Applications",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Verified Confidential Computing as a Service Framework for Privacy Preservation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PICACHV: Formally Verified Data Use Policy Enforcement for Secure Data Analytics",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 577,
    "paper_ids": [
      166,
      597,
      601
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Klaus Wehrle",
    "display_name": "Klaus Wehrle",
    "affiliation": "RWTH Aachen University",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1,
      "ACSAC": 2,
      "EUROSYS": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2018": 1,
        "2020": 1
      },
      "EUROSYS": {},
      "NSDI": {
        "2006": 1,
        "2011": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Privacy-Preserving Production Process Parameter Exchange",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shield a framework for efficient and secure machine learning classification in constrained environments",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "slicetime a platform for scalable and accurate network emulation",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "ocala an architecture for supporting legacy applications over overlays",
        "conference": "NSDI",
        "year": 2006
      }
    ],
    "author_id": 578,
    "paper_ids": [
      3005,
      2983,
      3090
    ],
    "papers_without_artifact_ids": [
      3091,
      3092,
      519
    ]
  },
  {
    "name": "Brendan Dolan-Gavitt",
    "display_name": "Brendan Dolan-Gavitt",
    "affiliation": "New York University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "ATC": 0,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "ATC": {},
      "WOOT": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "elfuzz efficient input generation via llmdriven synthesis over fuzzer space",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 579,
    "paper_ids": [
      3093,
      3094,
      3095
    ],
    "papers_without_artifact_ids": [
      391
    ]
  },
  {
    "name": "Jianwei Zhuge",
    "display_name": "Jianwei Zhuge",
    "affiliation": "Tsinghua University",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "CHES": 1,
      "ACSAC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2025": 1
      },
      "CHES": {
        "2024": 1
      },
      "ACSAC": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FANS: Fuzzing Android Native System Services via Automated Interface Analysis",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "provguard detecting sdn control policy manipulation via contextual semantics of provenance graphs",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "demystifying the security implications in iot device rental services",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 580,
    "paper_ids": [
      543,
      1884,
      549
    ],
    "papers_without_artifact_ids": [
      2796,
      561
    ]
  },
  {
    "name": "Georg Land",
    "display_name": "Georg Land",
    "affiliation": "Ruhr University Bochum",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "CHES": 5
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 4,
        "2025": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Correction Fault Attacks on Randomized CRYSTALS-Dilithium",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hades automated hardware design exploration for cryptographic primitives",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "haetae shorter latticebased fiatshamir signatures",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 581,
    "paper_ids": [
      1462,
      1463,
      1464
    ],
    "papers_without_artifact_ids": [
      1469,
      1473
    ]
  },
  {
    "name": "Donglong Chen",
    "display_name": "Donglong Chen",
    "affiliation": "Beijing Normal University - Hong Kong Baptist University United International College",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 3,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "CHES": {
        "2024": 2,
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Revisiting Keccak and Dilithium Implementations on ARMv7-M",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Improved Plantard Arithmetic for Lattice-based Cryptography",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a highlyefficient latticebased postquantum cryptography processor for iot applications",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 582,
    "paper_ids": [
      2336,
      2337,
      2339
    ],
    "papers_without_artifact_ids": [
      3096
    ]
  },
  {
    "name": "Bohan Yang 0001",
    "display_name": "Bohan Yang",
    "affiliation": "University of Texas at Dallas",
    "artifact_count": 3,
    "total_papers": 10,
    "total_papers_by_conf": {
      "CHES": 10
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 3,
        "2022": 2,
        "2025": 4,
        "2023": 1
      }
    },
    "artifact_rate": 30.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Low-Latency High-Order Arithmetic to Boolean Masking Conversion",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "On the Characterization of Phase Noise for the Robust and Resilient PLL-TRNG Design",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Closer Look at the Chaotic Ring Oscillators based TRNG Design",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a highperformance nttmsm accelerator for zeroknowledge proof using loadbalanced fullypipelined montgomery multiplier",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "falconsign an efficient and highthroughput hardware architecture for falcon signature generation",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "entropy extractor based highthroughput postprocessings for true random number generators",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "breaking ground a new area record for lowlatency firstorder masked sha3 advancing from the 4x area era to the 3x area era",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "upwb an uncoupled architecture design for whitebox cryptography using vectorized montgomery multiplication",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "cfntt scalable radix24 ntt multiplication architecture with an efficient conflictfree memory mapping scheme",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "a compact and highperformance hardware architecture for crystalsdilithium",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 583,
    "paper_ids": [
      3097,
      3098,
      3099
    ],
    "papers_without_artifact_ids": [
      3100,
      3101,
      1794,
      3102,
      3103,
      3104,
      3105
    ]
  },
  {
    "name": "Min Zhu 0001",
    "display_name": "Min Zhu",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 3,
    "total_papers": 9,
    "total_papers_by_conf": {
      "CHES": 9
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 3,
        "2022": 1,
        "2025": 4,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Low-Latency High-Order Arithmetic to Boolean Masking Conversion",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "On the Characterization of Phase Noise for the Robust and Resilient PLL-TRNG Design",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Closer Look at the Chaotic Ring Oscillators based TRNG Design",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a highperformance nttmsm accelerator for zeroknowledge proof using loadbalanced fullypipelined montgomery multiplier",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "falconsign an efficient and highthroughput hardware architecture for falcon signature generation",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "entropy extractor based highthroughput postprocessings for true random number generators",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "breaking ground a new area record for lowlatency firstorder masked sha3 advancing from the 4x area era to the 3x area era",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "upwb an uncoupled architecture design for whitebox cryptography using vectorized montgomery multiplication",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "a compact and highperformance hardware architecture for crystalsdilithium",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 584,
    "paper_ids": [
      3097,
      3098,
      3099
    ],
    "papers_without_artifact_ids": [
      3100,
      3101,
      1794,
      3102,
      3103,
      3105
    ]
  },
  {
    "name": "Leibo Liu",
    "display_name": "Leibo Liu",
    "affiliation": "Tsinghua University",
    "artifact_count": 3,
    "total_papers": 10,
    "total_papers_by_conf": {
      "CHES": 10
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 3,
        "2022": 2,
        "2025": 4,
        "2023": 1
      }
    },
    "artifact_rate": 30.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Low-Latency High-Order Arithmetic to Boolean Masking Conversion",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "On the Characterization of Phase Noise for the Robust and Resilient PLL-TRNG Design",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Closer Look at the Chaotic Ring Oscillators based TRNG Design",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a highperformance nttmsm accelerator for zeroknowledge proof using loadbalanced fullypipelined montgomery multiplier",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "falconsign an efficient and highthroughput hardware architecture for falcon signature generation",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "entropy extractor based highthroughput postprocessings for true random number generators",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "breaking ground a new area record for lowlatency firstorder masked sha3 advancing from the 4x area era to the 3x area era",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "upwb an uncoupled architecture design for whitebox cryptography using vectorized montgomery multiplication",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "cfntt scalable radix24 ntt multiplication architecture with an efficient conflictfree memory mapping scheme",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "a compact and highperformance hardware architecture for crystalsdilithium",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 585,
    "paper_ids": [
      3097,
      3098,
      3099
    ],
    "papers_without_artifact_ids": [
      3100,
      3101,
      1794,
      3102,
      3103,
      3104,
      3105
    ]
  },
  {
    "name": "Liehuang Zhu",
    "display_name": "Liehuang Zhu",
    "affiliation": "Beijing Institute of Technology, China",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "PETS": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2025": 1
      },
      "PETS": {
        "2025": 1
      },
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "CHES",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Parallelizing Universal Atomic Swaps for Multi-Chain Cryptocurrency Exchanges",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "transferability of whitebox perturbations queryefficient adversarial attacks against commercial dnn services",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "subverting website fingerprinting defenses with robust traffic representation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "waterbear practical asynchronous bft matching security guarantees of partially synchronous bft",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 586,
    "paper_ids": [
      3106,
      3107,
      1564
    ],
    "papers_without_artifact_ids": [
      564,
      573,
      3108
    ]
  },
  {
    "name": "Jan Jancar",
    "display_name": "Jan Jancar",
    "affiliation": "Masaryk University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "CHES": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Let's DOIT: Using Intel's Extended HW/SW Contract for Secure Compilation of Crypto Code",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"These results must be false\": A usability evaluation of constant-time analysis tools",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ectester reverseengineering sidechannel countermeasures of ecc implementations",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 587,
    "paper_ids": [
      3062,
      1810,
      1784
    ],
    "papers_without_artifact_ids": [
      3064
    ]
  },
  {
    "name": "Viktor Fischer",
    "display_name": "Viktor Fischer",
    "affiliation": "Czech Technical University in Prague",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 2,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Low Cost and Precise Jitter Measurement Method for TRNG Entropy Assessment",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Impact of the Flicker Noise on the Ring Oscillator-based TRNGs",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Enhancing Quality and Security of the PLL-TRNG",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 588,
    "paper_ids": [
      3109,
      3110,
      3111
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nicolai Müller",
    "display_name": "Nicolai Müller",
    "affiliation": "Ruhr University Bochum",
    "artifact_count": 3,
    "total_papers": 9,
    "total_papers_by_conf": {
      "CHES": 9
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 3,
        "2022": 3,
        "2025": 2,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Robust but Relaxed Probing Model",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PROLEAD A Probing-Based Hardware Leakage Detection Tool",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PROLEAD_SW Probing-Based Software Leakage Detection for ARM Binaries",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "constantcycle hardware private circuits",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "fault injection evaluation with statistical analysis how to deal with nearly fabricated large circuits",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "a deep analysis of two glitchfree hardware masking schemes sesym and lmdpl",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "automated generation of faultresistant circuits",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "automated generation of masked hardware",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "transitional leakage in theory and practice unveiling security flaws in masked circuits",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 7921,
    "paper_ids": [
      2342,
      2343,
      2344
    ],
    "papers_without_artifact_ids": [
      2345,
      2347,
      2348,
      2351,
      2359,
      2355
    ]
  },
  {
    "name": "Dirmanto Jap",
    "display_name": "Dirmanto Jap",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "WOOT": 1,
      "CHES": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "WOOT": {
        "2025": 1
      },
      "CHES": {
        "2024": 1,
        "2022": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Reality Check on Side-Channels: Lessons learnt from breaking AES on ARM Cortex-A72 processor with Out-of-Order Execution",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "defeating lowcost countermeasures against sidechannel attacks in latticebased encryption a case study on crystalskyber",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "dapa differential analysis aided power attack on non linear feedback shift registers",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 590,
    "paper_ids": [
      1482,
      1485,
      1486
    ],
    "papers_without_artifact_ids": [
      1487,
      1495
    ]
  },
  {
    "name": "Prasanna Ravi",
    "display_name": "Prasanna Ravi",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 3,
    "total_papers": 8,
    "total_papers_by_conf": {
      "CHES": 7,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 3,
        "2025": 1,
        "2023": 2
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 37.5,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Multiple Persistent Faults Analysis",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Will You Cross the Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "KyberSlash: Exploiting secret-dependent division timings in Kyber implementations",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "defeating lowcost countermeasures against sidechannel attacks in latticebased encryption a case study on crystalskyber",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "achilles heel in secure boot breaking rsa authentication and bitstream recovery from zynq7000 soc",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "pushing the limits of generic sidechannel attacks on lwebased kems parallel pc oracle attacks on kyber kem and beyond",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "fiddling the twiddle constants fault injection analysis of the number theoretic transform",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "sipfa statistical ineffective persistent faults analysis on feistel ciphers",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 591,
    "paper_ids": [
      1483,
      1484,
      581
    ],
    "papers_without_artifact_ids": [
      1487,
      1488,
      1489,
      1490,
      1493
    ]
  },
  {
    "name": "Fan Zhang 0010",
    "display_name": "Fan Zhang",
    "affiliation": "Zhejiang University",
    "artifact_count": 3,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "WOOT": 1,
      "CHES": 6,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "WOOT": {
        "2025": 1
      },
      "CHES": {
        "2024": 1,
        "2022": 2,
        "2023": 3
      },
      "NDSS": {}
    },
    "artifact_rate": 37.5,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On Efficient and Secure Code-based Masking: A Pragmatic Evaluation",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Effective PII Extraction from LLMs through Augmented Few-Shot Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Reality Check on Side-Channels: Lessons learnt from breaking AES on ARM Cortex-A72 processor with Out-of-Order Execution",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shaper a general architecture for privacypreserving primitives in secure machine learning",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "rafa redundanciesassisted algebraic fault analysis and its implementation on spn block ciphers",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "fiddling the twiddle constants fault injection analysis of the number theoretic transform",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "efficient persistent fault analysis with small number of chosen plaintexts",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "free fault leakages for deep exploitation algebraic persistent fault analysis on lightweight block ciphers",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 592,
    "paper_ids": [
      3112,
      3113,
      1486
    ],
    "papers_without_artifact_ids": [
      3114,
      3115,
      1490,
      318,
      321
    ]
  },
  {
    "name": "Cheng-Jhih Shih",
    "display_name": "Cheng-Jhih Shih",
    "affiliation": "National Taiwan University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 2,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NTT Multiplication for NTT-unfriendly Rings New Speed Records for Saber and NTRU on Cortex-M4 and AVX2",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Oil and Vinegar: Modern Parameters and Implementations",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 593,
    "paper_ids": [
      432,
      434,
      436
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ozgur Sinanoglu",
    "display_name": "Ozgur Sinanoglu",
    "affiliation": "New York University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "CHES": {
        "2021": 1,
        "2025": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Breaking CAS-Lock and Its Variants by Exploiting Structural Traces",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GlitchFHE: Attacking Fully Homomorphic Encryption Using Fault Injection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "insight attacking industryadopted learning resilient logic locking techniques using explainable graph neural network",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 594,
    "paper_ids": [
      3116,
      3117,
      2516
    ],
    "papers_without_artifact_ids": [
      3118
    ]
  },
  {
    "name": "Tung Chou",
    "display_name": "Tung Chou",
    "affiliation": "Research Center for Information Technology Innovation, Academia Sinica",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "CHES": 6
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 2,
        "2021": 4
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Rainbow on Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Optimizing BIKE for the Intel Haswell and ARM Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CTIDH: faster constant-time CSIDH",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "complete and improved fpga implementation of classic mceliece",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "a constanttime avx2 implementation of a variant of rollo",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "classic mceliece on the arm cortexm4",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 595,
    "paper_ids": [
      433,
      2400,
      1806
    ],
    "papers_without_artifact_ids": [
      3119,
      3120,
      2401
    ]
  },
  {
    "name": "Luca Wilke",
    "display_name": "Luca Wilke",
    "affiliation": "Microsoft Research",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "CHES": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Side-Channel Protections for Picnic Signatures",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sevstep a singlestepping framework for amdsev",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 596,
    "paper_ids": [
      1427,
      1430,
      338
    ],
    "papers_without_artifact_ids": [
      1432
    ]
  },
  {
    "name": "Benjamin Grégoire",
    "display_name": "Benjamin Grégoire",
    "affiliation": "Research Centre Inria Sophia Antipolis - Méditerranée: Valbonne",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2021": 1,
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021,
      2023,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Let's DOIT: Using Intel's Extended HW/SW Contract for Secure Compilation of Crypto Code",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Formally verifying Kyber Episode IV: Implementation correctness",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "highassurance zeroization",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 7922,
    "paper_ids": [
      2402,
      1810,
      1812
    ],
    "papers_without_artifact_ids": [
      1814
    ]
  },
  {
    "name": "Tanja Lange 0001",
    "display_name": "Tanja Lange",
    "affiliation": "Virginia Tech",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1,
      "CHES": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {
        "2025": 1
      },
      "CHES": {
        "2021": 2
      },
      "SC": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "CHES",
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CTIDH: faster constant-time CSIDH",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PQConnect: Automated Post-Quantum End-to-End Tunnels",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "concrete quantum cryptanalysis of binary elliptic curves",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 598,
    "paper_ids": [
      1806,
      1807,
      437
    ],
    "papers_without_artifact_ids": [
      1809
    ]
  },
  {
    "name": "Ajith Suresh",
    "display_name": "Ajith Suresh",
    "affiliation": "Technology Innovation Institute, Abu Dhabi",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "PETS": 4,
      "CHES": 1,
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2025": 2,
        "2024": 1
      },
      "CHES": {
        "2025": 1
      },
      "USENIXSEC": {
        "2021": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 42.9,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "CHES",
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Truncation Untangled: Scaling Fixed-Point Arithmetic for Privacy-Preserving Machine Learning to Large Models and Datasets",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privadome delivery drones and citizen privacy",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "swift superfast and robust privacypreserving machine learning",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "aby20 improved mixedprotocol secure twoparty computation",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "flash fast and robust framework for privacypreserving machine learning",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 599,
    "paper_ids": [
      1467,
      2601,
      3121
    ],
    "papers_without_artifact_ids": [
      3122,
      3123,
      2973,
      3124
    ]
  },
  {
    "name": "Marco Squarcina",
    "display_name": "Marco Squarcina",
    "affiliation": "TU Wien",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Web Platform Threats: Automated Detection of Web Security Issues With WPT",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cookie Crumbles: Breaking and Fixing Web Session Integrity",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TapTrap: Animation-Driven Tapjacking on Android",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "can i take your subdomain exploring samesite attacks in the modern web",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 600,
    "paper_ids": [
      2406,
      2409,
      2438
    ],
    "papers_without_artifact_ids": [
      2408
    ]
  },
  {
    "name": "Yang Liu 0003",
    "display_name": "Yang Liu",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 3,
    "total_papers": 15,
    "total_papers_by_conf": {
      "USENIXSEC": 12,
      "ATC": 0,
      "CHES": 0,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2020": 3,
        "2023": 2,
        "2022": 1,
        "2025": 2,
        "2021": 1
      },
      "ATC": {},
      "CHES": {},
      "NDSS": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "songbsab a dual prevention approach against singing voice conversion based illegal song covers",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "propertygpt llmdriven formal verification of smart contracts through retrievalaugmented property generation",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "masterkey automated jailbreaking of large language model chatbots",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "fire combining multistage filtering with taint analysis for scalable recurring vulnerability detection",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "using my functions should follow my checks understanding and detecting insecure openzeppelin code in smart contracts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "automataguided controlflowsensitive fuzz driver generation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "nautilus automated restful api vulnerability detection",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "regexscalpel regular expression denial of service redos defense by localizeandfix",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "apicraft fuzz driver generation for closedsource sdk libraries",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "automatic hot patch generation for android kernels",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "mvp detecting vulnerabilities using patchenhanced vulnerability signatures",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "muzz threadaware greybox fuzzing for effective bug hunting in multithreaded programs",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 601,
    "paper_ids": [
      733,
      949,
      3125
    ],
    "papers_without_artifact_ids": [
      3126,
      3127,
      739,
      1107,
      3128,
      786,
      745,
      3129,
      3130,
      3131,
      3132,
      3133
    ]
  },
  {
    "name": "Christopher W. Fletcher",
    "display_name": "Christopher W. Fletcher",
    "affiliation": "Univ. of California - Berkeley",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 2,
        "2021": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 42.9,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "synchronization storage channels s2c timerless cache sidechannel attacks on the apple m1 via hardware synchronization instructions",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "binoculars contentionbased sidechannel attacks exploiting the page walker",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "doublecross attacks subverting active learning systems",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "cache telepathy leveraging shared resource attacks to learn dnn architectures",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 602,
    "paper_ids": [
      1497,
      1817,
      1819
    ],
    "papers_without_artifact_ids": [
      3134,
      3135,
      1535,
      3136
    ]
  },
  {
    "name": "Pascal Lafourcade 0001",
    "display_name": "Pascal Lafourcade",
    "affiliation": "Queen's University Belfast",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 2
      },
      "NDSS": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Tale of Two Worlds, a Formal Story of WireGuard Hybridization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Unified Symbolic Analysis of WireGuard",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "who pays whom anonymous emvcompliant contactless payments",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "how fast do you heal a taxonomy for postcompromise security in securechannel establishment",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 603,
    "paper_ids": [
      3137,
      3138,
      3139
    ],
    "papers_without_artifact_ids": [
      3140,
      3141
    ]
  },
  {
    "name": "Dhekra Mahmoud",
    "display_name": "Dhekra Mahmoud",
    "affiliation": "Laboratoire d'Informatique, de Modélisation et d'Optimisation des Systèmes",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Tale of Two Worlds, a Formal Story of WireGuard Hybridization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Unified Symbolic Analysis of WireGuard",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 604,
    "paper_ids": [
      3137,
      3138,
      3139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Riad S. Wahby",
    "display_name": "Riad S. Wahby",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 2,
      "ATC": 0,
      "CHES": 0,
      "NSDI": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1
      },
      "PETS": {
        "2025": 1,
        "2024": 1
      },
      "ATC": {},
      "CHES": {},
      "NSDI": {
        "2017": 1,
        "2018": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 42.9,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bending microarchitectural weird machines towards practicality",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Scaling Verifiable Computation Using Efficient Set Accumulators",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NOTRY: Deniable messaging with retroactive avowal",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sybilresistant parallel mixing",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "checking passwords on leaky computers a side channel analysis of chromes password leak detect protocol",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "salsify lowlatency network video through tighter integration between a video codec and a transport protocol",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "encoding fast and slow lowlatency video processing using thousands of tiny threads",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 605,
    "paper_ids": [
      1816,
      3142,
      3143
    ],
    "papers_without_artifact_ids": [
      3144,
      1506,
      3145,
      3146
    ]
  },
  {
    "name": "Diogo Barradas",
    "display_name": "Diogo Barradas",
    "affiliation": "University of Waterloo",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2024": 1
      },
      "PETS": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SpotProxy: Rediscovering the Cloud for Censorship Circumvention",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok the spectre of surveillance and censorship in future internet architectures",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 606,
    "paper_ids": [
      698,
      3147,
      3148
    ],
    "papers_without_artifact_ids": [
      1196
    ]
  },
  {
    "name": "Yehuda Afek",
    "display_name": "Yehuda Afek",
    "affiliation": "Tel Aviv University",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2025": 2
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "A Flushing Attack on the DNS Cache",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DNS FLaRE: A Flush-Reload Attack on DNS Forwarders",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pops from history to mitigation of dns cache poisoning attacks",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "nxnsattack recursive dns inefficiencies and vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 607,
    "paper_ids": [
      3149,
      3150,
      3151
    ],
    "papers_without_artifact_ids": [
      3152,
      3153
    ]
  },
  {
    "name": "Anat Bremler-Barr",
    "display_name": "Anat Bremler-Barr",
    "affiliation": "Tel Aviv University",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2025": 2
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "A Flushing Attack on the DNS Cache",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DNS FLaRE: A Flush-Reload Attack on DNS Forwarders",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pops from history to mitigation of dns cache poisoning attacks",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "nxnsattack recursive dns inefficiencies and vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 608,
    "paper_ids": [
      3149,
      3150,
      3151
    ],
    "papers_without_artifact_ids": [
      3152,
      3153
    ]
  },
  {
    "name": "Zhenpeng Lin",
    "display_name": "Zhenpeng Lin",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "CAMP: Compiler and Allocator-based Heap Memory Protection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SeaK: Rethinking the Design of a Secure Allocator for OS Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "take a step further understanding page spray in linux kernel exploitation",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 609,
    "paper_ids": [
      931,
      933,
      934
    ],
    "papers_without_artifact_ids": [
      826
    ]
  },
  {
    "name": "Zheng Yu 0003",
    "display_name": "Zheng Yu",
    "affiliation": "Tsinghua University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2025": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "CAMP: Compiler and Allocator-based Heap Memory Protection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PATCHAGENT: A Practical Program Repair Agent Mimicking Human Expertise",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "llmfuzzer scaling assessment of large language model jailbreaks",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 610,
    "paper_ids": [
      931,
      932,
      935
    ],
    "papers_without_artifact_ids": [
      939
    ]
  },
  {
    "name": "Zhiyuan Yu 0001",
    "display_name": "Zhiyuan Yu",
    "affiliation": "Texas A&M University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SMACK: Semantically Meaningful Adversarial Audio Attack",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 611,
    "paper_ids": [
      168,
      171,
      173
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yujie Wang",
    "display_name": "Yujie Wang",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1
      },
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ARI: Attestation of Real-time Mission Execution Integrity",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enabling parallelism hot switching for efficient training of large language models",
        "conference": "SOSP",
        "year": 2024
      }
    ],
    "author_id": 612,
    "paper_ids": [
      169,
      170,
      172
    ],
    "papers_without_artifact_ids": [
      3154
    ]
  },
  {
    "name": "Ao Li 0006",
    "display_name": "Ao Li",
    "affiliation": "Washington University in St. Louis, MO, USA",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ARI: Attestation of Real-time Mission Execution Integrity",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Software Availability Protection in Cyber-Physical Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dataflow availability achieving timing assurance in autonomous systems",
        "conference": "OSDI",
        "year": 2024
      }
    ],
    "author_id": 317,
    "paper_ids": [
      169,
      172,
      175
    ],
    "papers_without_artifact_ids": [
      178
    ]
  },
  {
    "name": "Eyal Ronen",
    "display_name": "Eyal Ronen",
    "affiliation": "Tel Aviv University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2022": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Windows into the Past: Exploiting Legacy Crypto in Modern OS's Kerberos Implementation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Gates of Time: Improving Cache Attacks with Transient Execution",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "checking passwords on leaky computers a side channel analysis of chromes password leak detect protocol",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 613,
    "paper_ids": [
      3155,
      1521,
      3156
    ],
    "papers_without_artifact_ids": [
      1506
    ]
  },
  {
    "name": "Aafaq Sabir",
    "display_name": "Aafaq Sabir",
    "affiliation": "North Carolina State University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2026
    ],
    "year_range": "2023-2026",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Spying through Your Voice Assistants: Realistic Voice Command Fingerprinting",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PriVA-C: Defending Voice Assistants from Fingerprinting Attacks",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 614,
    "paper_ids": [
      1820,
      1821,
      1824
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lea Gröber",
    "display_name": "Lea Gröber",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2023": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Trust Me If You Can - How Usable Is Trusted Types In Practice?",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"I chose to fight, be brave, and to deal with it\": Threat Experiences and Security Practices of Pakistani Content Creators",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Privacy and Security in Private Clouds: A Representative Survey on the Prevalence of Private Hosting and Administrator Characteristics",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "to cloud or not to cloud a qualitative study on selfhosters motivation operation and security mindset",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7923,
    "paper_ids": [
      1183,
      1828,
      1829
    ],
    "papers_without_artifact_ids": [
      1832
    ]
  },
  {
    "name": "Wil Gibbs",
    "display_name": "Wil Gibbs",
    "affiliation": "Arizona State University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2023": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tygr type inference on stripped binaries using graph neural networks",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 616,
    "paper_ids": [
      817,
      818,
      819
    ],
    "papers_without_artifact_ids": [
      825
    ]
  },
  {
    "name": "Zion Leonahenahe Basque",
    "display_name": "Zion Leonahenahe Basque",
    "affiliation": "Arizona State University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 617,
    "paper_ids": [
      817,
      818,
      819
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stefan Gast",
    "display_name": "Stefan Gast",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "counterseveillance performancecounter attacks on amd sevsnp",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "teecorrelate an informationpreserving defense against performancecounter attacks on tees",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 618,
    "paper_ids": [
      270,
      3157,
      335
    ],
    "papers_without_artifact_ids": [
      339,
      342
    ]
  },
  {
    "name": "Xiaojing Liao",
    "display_name": "Xiaojing Liao",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 3,
    "total_papers": 11,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "NDSS": 4,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 2,
        "2022": 1,
        "2021": 2
      },
      "NDSS": {
        "2024": 1,
        "2025": 3
      },
      "ACSAC": {}
    },
    "artifact_rate": 27.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Malla: Demystifying Real-world Large Language Model Integrated Malicious Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Privacy-Preserving Social-Media SDKs on Android",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tweezers a framework for security event detection via event attributioncentric tweet embedding",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "automated expansion of privacy data taxonomy for compliant data breach notification",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "understanding and analyzing appraisal systems in the underground marketplaces",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "lalaine measuring and characterizing noncompliance of apple privacy labels",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "are you spying on me largescale analysis on iot data exposure through companion apps",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "osaware vulnerability prioritization via differential severity analysis",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "understanding malicious crosslibrary data harvesting on android",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "evil under the sun understanding and discovering attacks on ethereum decentralized applications",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 619,
    "paper_ids": [
      595,
      2450,
      2452
    ],
    "papers_without_artifact_ids": [
      3158,
      3159,
      3160,
      2455,
      608,
      3161,
      612,
      613
    ]
  },
  {
    "name": "Aastha Mehta",
    "display_name": "Aastha Mehta",
    "affiliation": "University of British Columbia",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "SOSP": 0,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2025": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "NetShaper: A Differentially Private Network Side-Channel Mitigation System",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Relocate-Vote: Using Sparsity Information to Exploit Ciphertext Side-Channels",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "stream processing with adaptive edgeenhanced confidential computing",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 620,
    "paper_ids": [
      1982,
      1966,
      1687
    ],
    "papers_without_artifact_ids": [
      1690
    ]
  },
  {
    "name": "Neil Zhenqiang Gong",
    "display_name": "Neil Zhenqiang Gong",
    "affiliation": "Duke University",
    "artifact_count": 3,
    "total_papers": 17,
    "total_papers_by_conf": {
      "USENIXSEC": 12,
      "ACSAC": 4,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2020": 1,
        "2023": 3,
        "2022": 2,
        "2025": 1,
        "2021": 2
      },
      "ACSAC": {
        "2021": 1,
        "2018": 1,
        "2022": 1,
        "2017": 1
      },
      "PETS": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 17.6,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Evaluating LLM-based Personal Information Extraction and Countermeasures",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "link stealing attacks against inductive graph neural networks",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "formalizing and benchmarking prompt injection attacks and defenses",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "mudjacking patching backdoor vulnerabilities in foundation models",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "finegrained poisoning attack to local differential privacy protocols for mean and variance estimation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "pore provably robust recommender systems against data poisoning attacks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "aflguard byzantinerobust asynchronous federated learning",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "poisonedencoder poisoning the unlabeled pretraining data in contrastive learning",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "poisoning attacks to local differential privacy protocols for keyvalue data",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "on detecting growingup behaviors of malicious accounts in privacycentric mobile social networks",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "data poisoning attacks to local differential privacy protocols",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "stealing links from graph neural networks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "local model poisoning attacks to byzantinerobust federated learning",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "poisoning attacks to graphbased recommender systems",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "mitigating evasion attacks to deep neural networks via regionbased classification",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 621,
    "paper_ids": [
      3162,
      458,
      3163
    ],
    "papers_without_artifact_ids": [
      196,
      3164,
      3165,
      3035,
      3166,
      3167,
      3168,
      3169,
      575,
      3170,
      211,
      3171,
      3172,
      3173
    ]
  },
  {
    "name": "Jennifer Rexford",
    "display_name": "Jennifer Rexford",
    "affiliation": "Princeton University",
    "artifact_count": 3,
    "total_papers": 21,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "PETS": 1,
      "ATC": 0,
      "NSDI": 16
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2021": 1
      },
      "PETS": {
        "2023": 1
      },
      "ATC": {},
      "NSDI": {
        "2013": 1,
        "2009": 1,
        "2024": 1,
        "2023": 1,
        "2010": 1,
        "2012": 2,
        "2016": 2,
        "2020": 2,
        "2022": 1,
        "2005": 2,
        "2011": 1,
        "2015": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "How Effective is Multiple-Vantage-Point Domain Control Validation?",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tango secure collaborative route control across the public internet",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "building flexible lowcost wireless access networks with magma",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "modular switch programming under resource constraints",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "experiences deploying multivantagepoint domain validation at lets encrypt",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "contra a programmable system for performanceaware routing",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "enabling programmable transport protocols in highspeed nics",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "mimiq masking ips with migration in quic",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "an industrialscale software defined internet exchange point",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "compiling path queries",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "covisor a compositional hypervisor for softwaredefined networks",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "composing software defined networks",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "a nice way to test openflow applications",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "serval an endhost stack for servicecentric networking",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "profiling network performance for multitier data center applications",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "seamless bgp migration with router grafting",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "netreview detecting when interdomain routing goes wrong",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "finding a needle in a haystack pinpointing significant bgp routing changes in an ip network",
        "conference": "NSDI",
        "year": 2005
      },
      {
        "title": "design and implementation of a routing control platform",
        "conference": "NSDI",
        "year": 2005
      }
    ],
    "author_id": 622,
    "paper_ids": [
      3174,
      128,
      136
    ],
    "papers_without_artifact_ids": [
      3175,
      3176,
      3177,
      142,
      709,
      3178,
      2493,
      1655,
      3179,
      1014,
      3180,
      1657,
      3181,
      3182,
      3183,
      2732,
      3184,
      3185
    ]
  },
  {
    "name": "Rujia Li 0001",
    "display_name": "Rujia Li",
    "affiliation": "Stony Brook University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoS",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Does Finality Gadget Finalize Your Block? A Case Study of Binance Consensus",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok teeassisted confidential smart contract",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 623,
    "paper_ids": [
      3186,
      3187,
      3188
    ],
    "papers_without_artifact_ids": [
      3189
    ]
  },
  {
    "name": "Sisi Duan",
    "display_name": "Sisi Duan",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "EUROSYS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 2
      },
      "EUROSYS": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoS",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Does Finality Gadget Finalize Your Block? A Case Study of Binance Consensus",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rondo scalable and reconfigurationfriendly randomness beacon",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "dashing and star byzantine fault tolerance with weak certificates",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "waterbear practical asynchronous bft matching security guarantees of partially synchronous bft",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 624,
    "paper_ids": [
      3186,
      3187,
      3188
    ],
    "papers_without_artifact_ids": [
      3190,
      3191,
      3108
    ]
  },
  {
    "name": "Rasoul Jahanshahi",
    "display_name": "Rasoul Jahanshahi",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2021": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Argus: All your (PHP) Injection-sinks are belong to us",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Saphire: Sandboxing PHP Applications with Tailored System Call Allowlists",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "animatedead debloating web applications using concolic execution",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 625,
    "paper_ids": [
      794,
      798,
      800
    ],
    "papers_without_artifact_ids": [
      801
    ]
  },
  {
    "name": "Sandra Deepthy Siby",
    "display_name": "Sandra Deepthy Siby",
    "affiliation": "NYU Abu Dhabi",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1,
      "EUROSYS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      },
      "PETS": {
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PURL: Safe and Effective Sanitization of Link Decoration",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Evaluating practical QUIC website fingerprinting defenses for the masses",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "guarantee towards attestable and private ml with cca",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 626,
    "paper_ids": [
      803,
      806,
      972
    ],
    "papers_without_artifact_ids": [
      3192
    ]
  },
  {
    "name": "Jeman Park 0001",
    "display_name": "Jeman Park",
    "affiliation": "Kyung Hee University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mistrust plugins you must a largescale study of malicious plugins in wordpress marketplaces",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 627,
    "paper_ids": [
      1448,
      1449,
      1451
    ],
    "papers_without_artifact_ids": [
      1452
    ]
  },
  {
    "name": "Alexander Viand",
    "display_name": "Alexander Viand",
    "affiliation": "ETH Zurich",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Holding Secrets Accountable: Auditing Privacy-Preserving Machine Learning",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HECO: Fully Homomorphic Encryption Compiler",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Zeph: Cryptographic Enforcement of End-to-End Data Privacy",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "timecrypt encrypted data stream processing at scale with cryptographic access control",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 628,
    "paper_ids": [
      2457,
      2458,
      2459
    ],
    "papers_without_artifact_ids": [
      2460
    ]
  },
  {
    "name": "Robin Kirchner",
    "display_name": "Robin Kirchner",
    "affiliation": "TU Braunschweig",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "PETS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Impact of Default Mobile SDK Usage on Privacy and Data Protection",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Black-Box Privacy Analysis of Messaging Service Providers' Chat Message Processing",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 629,
    "paper_ids": [
      215,
      223,
      224
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shruti Tople",
    "display_name": "Shruti Tople",
    "affiliation": "Azure Research",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 2,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2021": 1
      },
      "PETS": {
        "2024": 1,
        "2021": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Closed-Form Bounds for DP-SGD against Record-level Inference",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "leakage of dataset properties in multiparty machine learning",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 630,
    "paper_ids": [
      3193,
      3194,
      138
    ],
    "papers_without_artifact_ids": [
      3195
    ]
  },
  {
    "name": "Deian Stefan",
    "display_name": "Deian Stefan",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 4,
      "SOSP": 1,
      "CHES": 0,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 2,
        "2021": 1
      },
      "SOSP": {
        "2024": 1
      },
      "CHES": {},
      "PETS": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 42.9,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Stateful Least Privilege Authorization for the Cloud",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Retrofitting Fine Grain Isolation in the Firefox Renderer",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "STORM: Refinement Types for Secure Web Applications",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "icarus trustworthy justintime compilers with symbolic metaexecution",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "blocked or broken automatically detecting when privacy interventions break websites",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "swivel hardening webassembly against spectre",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "sys a staticsymbolic tool for finding good bugs in good browser code",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 631,
    "paper_ids": [
      3196,
      3197,
      3198
    ],
    "papers_without_artifact_ids": [
      3199,
      3200,
      3201,
      3202
    ]
  },
  {
    "name": "Earlence Fernandes",
    "display_name": "Earlence Fernandes",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2022": 2
      },
      "NDSS": {
        "2024": 2
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Stateful Least Privilege Authorization for the Cloud",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Practical Data Access Minimization in Trigger-Action Platforms",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Architecting Trigger-Action Platforms for Security, Performance and Functionality",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "experimental analyses of the physical surveillance risks in clientside content scanning",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "scalable metadatahiding for privacypreserving iot systems",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "makeshift security analysis of wireless gear shifting in bicycles",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "experimental security analysis of the app model in business collaboration platforms",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 632,
    "paper_ids": [
      3196,
      2541,
      2922
    ],
    "papers_without_artifact_ids": [
      3203,
      2549,
      3204,
      2556
    ]
  },
  {
    "name": "Trent Jaeger",
    "display_name": "Trent Jaeger",
    "affiliation": "Univ. of California - Riverside",
    "artifact_count": 3,
    "total_papers": 9,
    "total_papers_by_conf": {
      "OSDI": 2,
      "USENIXSEC": 4,
      "EUROSYS": 1,
      "ATC": 0,
      "ACSAC": 0,
      "FAST": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2023": 1,
        "2021": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {},
      "ACSAC": {},
      "FAST": {
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "KSplit: Automating Device Driver Isolation",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Nimble: Rollback Protection for Confidential Cloud Services",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "talisman tamper analysis for reference monitors",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "dont waste my efforts pruning redundant sanitizer checks by developerimplemented type checks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "unsafe at any copy name collisions from mixing case sensitivities",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "synchronization storage channels s2c timerless cache sidechannel attacks on the apple m1 via hardware synchronization instructions",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "finegrained program partitioning for security",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "polyscope multipolicy access control analysis to compute authorized attack operations in android systems",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 633,
    "paper_ids": [
      2219,
      2166,
      1079
    ],
    "papers_without_artifact_ids": [
      3205,
      2225,
      2226,
      3134,
      2169,
      2230
    ]
  },
  {
    "name": "Lucca Hirschi",
    "display_name": "Lucca Hirschi",
    "affiliation": "LORIA, Inria Nancy, France",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 2,
        "2025": 1
      },
      "PETS": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Comprehensive Formal Security Analysis of OPC UA",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hash gone bad automated discovery of protocol attacks that exploit hash function weaknesses",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "reversing breaking and fixing the french legislative election evoting protocol",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 634,
    "paper_ids": [
      3206,
      442,
      3207
    ],
    "papers_without_artifact_ids": [
      1882,
      3208
    ]
  },
  {
    "name": "Elissa M. Redmiles",
    "display_name": "Elissa M. Redmiles",
    "affiliation": "Georgetown University",
    "artifact_count": 3,
    "total_papers": 15,
    "total_papers_by_conf": {
      "USENIXSEC": 13,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 5,
        "2020": 1,
        "2023": 3,
        "2022": 1,
        "2025": 1,
        "2021": 2
      },
      "PETS": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2024,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I chose to fight, be brave, and to deal with it\": Threat Experiences and Security Practices of Pakistani Content Creators",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Analyzing the AI Nudification Application Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "models matter setting accurate privacy expectations for local and central differential privacy",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "i feel physically safe but not politically safe understanding the digital threats and safety practices of onlyfans creators",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "violation of my body perceptions of aigenerated nonconsensual intimate imagery",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "did they fing consent to that safer digital intimacy via proactive protection against imagebased sexual abuse",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "sok or solk on the quantitative study of sociodemographic factors and computer security behaviors",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "problematic advertising and its disparate exposure on facebook",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "exploring privacy and incentives considerations in adoption of covid19 contact tracing apps",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "what are the chances explaining the epsilon parameter in differential privacy",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "ctrlshift how privacy sentiment changed from 2019 to 2021",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "like lesbians walking the perimeter experiences of us lgbtq folks with online security safety and privacy advice",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "driving 2fa adoption at scale optimizing twofactor authentication notification design patterns",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "its stressful having all these phones investigating sex workers safety goals risks and practices online",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 635,
    "paper_ids": [
      1828,
      1259,
      2210
    ],
    "papers_without_artifact_ids": [
      3209,
      824,
      3210,
      3211,
      3212,
      3213,
      3214,
      3215,
      3216,
      3217,
      3218,
      1276
    ]
  },
  {
    "name": "Bhupendra Acharya",
    "display_name": "Bhupendra Acharya",
    "affiliation": "Univ. of Louisiana - Lafayette",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2021": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PhishPrint: Evading Phishing Detection Crawlers by Prior Profiling",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Understanding Regional Filter Lists: Efficacy and Impact",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 636,
    "paper_ids": [
      100,
      3219,
      110
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dean M. Tullsen",
    "display_name": "Dean M. Tullsen",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2021": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SecSMT: Securing SMT Processors against Contention-Based Covert Channels",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "swivel hardening webassembly against spectre",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 637,
    "paper_ids": [
      3220,
      3221,
      3222
    ],
    "papers_without_artifact_ids": [
      3201
    ]
  },
  {
    "name": "Mingxuan Yao",
    "display_name": "Mingxuan Yao",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 638,
    "paper_ids": [
      1449,
      1450,
      1451
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Frank Li 0001",
    "display_name": "Frank Li",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 3,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 9,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 30.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Building an Open, Robust, and Stable Voting-Based Domain Top List",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Evaluating Privacy Policies under Modern Privacy Laws At Scale: An LLM-Based Automated Approach",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "was this you investigating the design considerations for suspicious login notifications",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "comparing malware evasion theory with practice results from interviews with expert analysts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "6sense internetwide ipv6 scanning and its security applications",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "i experienced more than 10 defi scams on defi users perception of security breaches and countermeasures",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a largescale measurement of website login policies",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "deep entity classification abusive account detection for online social networks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "shim shimmeny evaluating the security and privacy contributions of link shimming in the modern web",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 639,
    "paper_ids": [
      2470,
      901,
      2471
    ],
    "papers_without_artifact_ids": [
      3223,
      3224,
      3225,
      661,
      3226,
      3227,
      3228
    ]
  },
  {
    "name": "Yanpei Guo",
    "display_name": "Yanpei Guo",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "zkGPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 640,
    "paper_ids": [
      1722,
      1902,
      1904
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Carlos Cotrini",
    "display_name": "Carlos Cotrini",
    "affiliation": "ETH Zurich",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      },
      "PETS": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Automated Large-Scale Analysis of Cookie Notice Compliance",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automating Cookie Consent and GDPR Violation Detection",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "checking websites gdpr consent compliance for marketing emails",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 641,
    "paper_ids": [
      441,
      443,
      447
    ],
    "papers_without_artifact_ids": [
      456
    ]
  },
  {
    "name": "Srinath T. V. Setty",
    "display_name": "Srinath T. V. Setty",
    "affiliation": "Microsoft Research (United Kingdom)",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "OSDI": 2,
      "USENIXSEC": 2,
      "SOSP": 0,
      "EUROSYS": 0,
      "NSDI": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1,
        "2020": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "NSDI": {
        "2010": 1,
        "2016": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Nimble: Rollback Protection for Confidential Cloud Services",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Byzantine Ordered Consensus without Byzantine Oligarchy",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "visor privacypreserving video analytics as a cloud service",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "scalable and private media consumption with popcorn",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "airavat security and privacy for mapreduce",
        "conference": "NSDI",
        "year": 2010
      }
    ],
    "author_id": 642,
    "paper_ids": [
      1076,
      1079,
      289
    ],
    "papers_without_artifact_ids": [
      678,
      1998,
      1848
    ]
  },
  {
    "name": "Xiao Wang 0012",
    "display_name": "Xiao Wang",
    "affiliation": "Northwestern University",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ppSAT: Towards Two-Party Private SAT Solving",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DFS: Delegation-friendly zkSNARK and Private Delegation of Provers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lightweight authentication of web data via garblethenprove",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "private multiwinner voting for machine learning",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "mystique efficient conversions for zeroknowledge proofs with applications to machine learning",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 643,
    "paper_ids": [
      2463,
      3229,
      3230
    ],
    "papers_without_artifact_ids": [
      3231,
      3232,
      3233
    ]
  },
  {
    "name": "David Schrammel",
    "display_name": "David Schrammel",
    "affiliation": "Institut für Informationsverarbeitung",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 2,
        "2023": 1,
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Jenny: Securing Syscalls for PKU-based Memory Isolation Systems",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tmebox scalable inprocess isolation through intel tmemk memory encryption",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "voodoo memory tagging authenticated encryption and error correction through magic",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "hashtag hashbased integrity protection for tagged architectures",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 644,
    "paper_ids": [
      271,
      3234,
      273
    ],
    "papers_without_artifact_ids": [
      278,
      281,
      282
    ]
  },
  {
    "name": "Samuel Weiser",
    "display_name": "Samuel Weiser",
    "affiliation": "Institut für Informationsverarbeitung",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 2,
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Jenny: Securing Syscalls for PKU-based Memory Isolation Systems",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 645,
    "paper_ids": [
      271,
      3234,
      273
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Robert J. Walls",
    "display_name": "Robert J. Walls",
    "affiliation": "Worcester Polytechnic Institute",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1,
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Silhouette: Efficient Protected Shadow Stacks for Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "REVDECODE: Enhancing Binary Function Matching with Context-Aware Graph Representations and Relevance Decoding",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 646,
    "paper_ids": [
      2936,
      2937,
      3235
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maximilian Zinkus",
    "display_name": "Maximilian Zinkus",
    "affiliation": "Johns Hopkins University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1
      },
      "PETS": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automating the Development of Chosen Ciphertext Attacks",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "McFIL: Model Counting Functionality-Inherent Leakage",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SocIoTy: Practical Cryptography in Smart Home Contexts",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok cryptographic confidentiality of data on mobile devices",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 647,
    "paper_ids": [
      3236,
      459,
      3237
    ],
    "papers_without_artifact_ids": [
      3238
    ]
  },
  {
    "name": "Yuan Tian 0001",
    "display_name": "Yuan Tian",
    "affiliation": "Univ. of California - Los Angeles",
    "artifact_count": 3,
    "total_papers": 11,
    "total_papers_by_conf": {
      "USENIXSEC": 8,
      "PETS": 2,
      "ACSAC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 2,
        "2023": 1,
        "2022": 1,
        "2025": 2,
        "2021": 1
      },
      "PETS": {
        "2023": 1,
        "2026": 1
      },
      "ACSAC": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 27.3,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2025,
      2026
    ],
    "year_range": "2020-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Location-Enhanced Information Flow for Home Automations",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok towards effective automated vulnerability repair",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "mock optimizing kernel fuzzing mutation with contextaware dependency",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "remote keylogging attacks in multiuser vr applications",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "senrev measurement of personal information disclosure in online health communities",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "uvscan detecting thirdparty component usage violations in iot firmware",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "your microphone array retains your identity a robust voice liveness detection system for smart speakers",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "mpinspector a systematic and automatic approach for evaluating the security of iot messaging protocols",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "ios your os everybodys os vetting and analyzing network services of ios applications",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 648,
    "paper_ids": [
      3239,
      1539,
      2587
    ],
    "papers_without_artifact_ids": [
      1530,
      1545,
      1156,
      1532,
      1555,
      3240,
      1560,
      1581
    ]
  },
  {
    "name": "Ralf Sasse",
    "display_name": "Ralf Sasse",
    "affiliation": "ETH Zurich",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2025": 2,
        "2021": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Formal Analysis of Apple's iMessage PQ3 Protocol",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "card brand mixup attack bypassing the pin in nonvisa cards by using them for visa transactions",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 649,
    "paper_ids": [
      442,
      444,
      445
    ],
    "papers_without_artifact_ids": [
      457
    ]
  },
  {
    "name": "Alishah Chator",
    "display_name": "Alishah Chator",
    "affiliation": "Baruch College",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "PETS": {
        "2024": 1,
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2024,
      2026
    ],
    "year_range": "2020-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BlockSci: Design and applications of a blockchain analysis platform",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SocIoTy: Practical Cryptography in Smart Home Contexts",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Making Sense of Private Advertising: A Principled Approach to a Complex Ecosystem",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 650,
    "paper_ids": [
      3241,
      3237,
      2445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yossi Gilad",
    "display_name": "Yossi Gilad",
    "affiliation": "Hebrew University of Jerusalem",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "SOSP": 0,
      "WOOT": 0,
      "NSDI": 2,
      "PETS": 1,
      "NDSS": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 2
      },
      "SOSP": {},
      "WOOT": {},
      "NSDI": {
        "2025": 1,
        "2018": 1
      },
      "PETS": {
        "2025": 1
      },
      "NDSS": {},
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Device Tracking via Linux's New TCP Source Port Selection Algorithm",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Twilight: A Differentially Private Payment Channel Network",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "suppressing bgp zombies with route status transparency",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "sybilresistant parallel mixing",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "groove flexible metadataprivate messaging",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "pcc vivace onlinelearning congestion control",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 651,
    "paper_ids": [
      3242,
      3243,
      982
    ],
    "papers_without_artifact_ids": [
      3244,
      3144,
      988,
      3245
    ]
  },
  {
    "name": "Kangkook Jee",
    "display_name": "Kangkook Jee",
    "affiliation": "University of Texas at Dallas",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2,
        "2022": 1,
        "2021": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Reassembly is Hard: A Reflection on Challenges and Strategies",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Evading Provenance-Based ML Detectors with Adversarial System Actions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Back-Propagating System Dependency Impact for Attack Investigation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "seal storageefficient causality analysis on enterprise logs with queryfriendly compression",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "this is why we cant cache nice things lightningfast threat hunting using suspicionbased hierarchical storage",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 652,
    "paper_ids": [
      2477,
      3246,
      2494
    ],
    "papers_without_artifact_ids": [
      3057,
      3247
    ]
  },
  {
    "name": "Daniel Klischies",
    "display_name": "Daniel Klischies",
    "affiliation": "Ruhr University Bochum",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 2
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Instructions Unclear: Undefined Behaviour in Cellular Network Specifications",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Confusing Value with Enumeration: Studying the Use of CVEs in Academia",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vulnerability where art thou an investigation of vulnerability management in android smartphone chipsets",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 653,
    "paper_ids": [
      1537,
      108,
      109
    ],
    "papers_without_artifact_ids": [
      3248
    ]
  },
  {
    "name": "Veelasha Moonsamy",
    "display_name": "Veelasha Moonsamy",
    "affiliation": "Ruhr-University Bochum",
    "artifact_count": 3,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 3,
      "ACSAC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1,
        "2021": 1
      },
      "PETS": {
        "2025": 1,
        "2024": 1,
        "2021": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Instructions Unclear: Undefined Behaviour in Cellular Network Specifications",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Kintsugi: Secure Hotpatching for Code-Shadowing Real-Time Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Making Web Applications GDPR Compliant: A Comparative Evaluation of GDPR-Enforcement Frameworks",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vulnerability where art thou an investigation of vulnerability management in android smartphone chipsets",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "spatialdomain wireless jamming with reconfigurable intelligent surfaces",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "the rings of tracking evaluating security and privacy in the smart ring ecosystem",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "those things are written by lawyers and programmers are reading that mapping the communication gap between software developers and privacy experts",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "less is more a privacyrespecting android malware classifier using federated learning",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "wheres crypto automated identification and classification of proprietary cryptographic primitives in binary code",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 654,
    "paper_ids": [
      1537,
      3249,
      222
    ],
    "papers_without_artifact_ids": [
      3248,
      3250,
      3251,
      2431,
      1914,
      3252
    ]
  },
  {
    "name": "David G. Balash",
    "display_name": "David G. Balash",
    "affiliation": "The George Washington University",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2021": 2
      },
      "PETS": {
        "2024": 2
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Educators' Perspectives of Using (or Not Using) Online Exam Proctoring",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Security and Privacy Perceptions of Third-Party Application Access for Google Accounts",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how does connecting online activities to advertising inferences impact privacy perceptions",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "i would not install an app with this label privacy label impact on risk perception and willingness to install ios apps",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "are privacy dashboards good for end users evaluating user perceptions and reactions to googles my activity",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "examining the examiners students privacy and security perceptions of online proctoring services",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 655,
    "paper_ids": [
      859,
      861,
      863
    ],
    "papers_without_artifact_ids": [
      864,
      865,
      877,
      875
    ]
  },
  {
    "name": "Nguyen Phong Hoang",
    "display_name": "Nguyen Phong Hoang",
    "affiliation": "University of British Columbia",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2025": 1,
        "2021": 1
      },
      "PETS": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "IRBlock: A Large-Scale Measurement Study of the Great Firewall of Iran",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Domain name encryption is not enough: privacy leakage via IP-based website fingerprinting",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automatic generation of web censorship probe lists",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "gfweb measuring the great firewalls web censorship at scale",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "how great is the great firewall measuring chinas dns censorship",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "triplet censors demystifying great firewalls dns censorship behavior",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 656,
    "paper_ids": [
      3253,
      3254,
      2989
    ],
    "papers_without_artifact_ids": [
      3255,
      2991,
      2993,
      893
    ]
  },
  {
    "name": "Dominik Wermke",
    "display_name": "Dominik Wermke",
    "affiliation": "North Carolina State University",
    "artifact_count": 3,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 8,
      "NDSS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 3
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 30.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Context Matters: Qualitative Insights into Developers' Approaches and Challenges with Software Composition Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "security and privacy software creators perspectives on unintended consequences",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "if you cant get them to the lab evaluating a virtual study environment with security information workers",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "on the limited impact of visualizing encryption perceptions of e2e messaging security",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "never ever or no matter what investigating adoption intentions and misconceptions about the coronawarnapp in germany",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "a largescale interview study on information security in and attacks against small and mediumsized enterprises",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "cloudy with a chance of misconceptions exploring users perceptions and expectations of security and privacy in cloud office suites",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "a large scale investigation of obfuscation use in google play",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 657,
    "paper_ids": [
      1240,
      2264,
      1245
    ],
    "papers_without_artifact_ids": [
      2433,
      1253,
      1254,
      1255,
      1256,
      1257,
      1258
    ]
  },
  {
    "name": "Dilawer Ahmed",
    "display_name": "Dilawer Ahmed",
    "affiliation": "North Carolina State University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "PETS": {
        "2022": 1,
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2026
    ],
    "year_range": "2022-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Spying through Your Voice Assistants: Realistic Voice Command Fingerprinting",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PriVA-C: Defending Voice Assistants from Fingerprinting Attacks",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 658,
    "paper_ids": [
      1821,
      1822,
      1824
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hieu Le 0003",
    "display_name": "Hieu Le",
    "affiliation": "University of California, Irvine",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "PETS": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "AutoFR: Automated Filter Rule Generation for Adblocking",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The TV is Smart and Full of Trackers: Measuring Smart TV Advertising and Tracking",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 659,
    "paper_ids": [
      804,
      961,
      808
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nils Bars",
    "display_name": "Nils Bars",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 2,
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "atropos effective fuzzing of web applications for serverside vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a binarylevel thread sanitizer or why sanitizing on the binary level is hard",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 660,
    "paper_ids": [
      101,
      104,
      106
    ],
    "papers_without_artifact_ids": [
      114,
      115
    ]
  },
  {
    "name": "Hans Liljestrand",
    "display_name": "Hans Liljestrand",
    "affiliation": "Aalto University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PACStack: an Authenticated Call Stack",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 661,
    "paper_ids": [
      1191,
      1193,
      1195
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Henry Birge-Lee",
    "display_name": "Henry Birge-Lee",
    "affiliation": "Princeton University",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NSDI": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "NSDI": {
        "2024": 1
      },
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "How Effective is Multiple-Vantage-Point Domain Control Validation?",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Creating a Secure Underlay for the Internet",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BGP Vortex: Update Message Floods Can Create Internet Instabilities",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "quicstep evaluating connection migration based quic censorship circumvention",
        "conference": "PETS",
        "year": 2026
      },
      {
        "title": "tango secure collaborative route control across the public internet",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "experiences deploying multivantagepoint domain validation at lets encrypt",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 662,
    "paper_ids": [
      128,
      129,
      1702
    ],
    "papers_without_artifact_ids": [
      140,
      3175,
      142
    ]
  },
  {
    "name": "Lukas Giner",
    "display_name": "Lukas Giner",
    "affiliation": "Graz University of Technology",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 663,
    "paper_ids": [
      272,
      327,
      275
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vladislav Mladenov",
    "display_name": "Vladislav Mladenov",
    "affiliation": "Ruhr University Bochum",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Every Signature is Broken: On the Insecurity of Microsoft Office's OOXML Signatures",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Security Implications of Malicious G-Codes in 3D Printing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "office document security and privacy",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 664,
    "paper_ids": [
      585,
      589,
      958
    ],
    "papers_without_artifact_ids": [
      594
    ]
  },
  {
    "name": "Johannes Wikner",
    "display_name": "Johannes Wikner",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Inception: Exposing New Attack Surfaces with Training in Transient Execution",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RETBLEED: Arbitrary Speculative Code Execution with Return Instructions",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Branch Privilege Injection: Compromising Spectre v2 Hardware Mitigations by Exploiting Branch Predictor Race Conditions",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 665,
    "paper_ids": [
      922,
      923,
      927
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cong Zhang",
    "display_name": "Cong Zhang",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 3
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Linear Private Set Union from Multi-Query Reverse Private Membership Test",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Practical Keyword Private Information Retrieval from Key-to-Index Mappings",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "efficient multiparty private set union without noncollusion assumptions",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "unbalanced circuitpsi from oblivious keyvalue retrieval",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 666,
    "paper_ids": [
      3256,
      3257,
      3258
    ],
    "papers_without_artifact_ids": [
      3259,
      742
    ]
  },
  {
    "name": "Weiran Liu",
    "display_name": "Weiran Liu",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 3
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Linear Private Set Union from Multi-Query Reverse Private Membership Test",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Practical Keyword Private Information Retrieval from Key-to-Index Mappings",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improved secure twoparty computation from a geometric perspective",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "unbalanced circuitpsi from oblivious keyvalue retrieval",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 667,
    "paper_ids": [
      3256,
      3257,
      3260
    ],
    "papers_without_artifact_ids": [
      3261,
      742
    ]
  },
  {
    "name": "Pardis Emami Naeini",
    "display_name": "Pardis Emami Naeini",
    "affiliation": "Duke University",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 3,
        "2025": 1,
        "2021": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Are Consumers Willing to Pay for Security and Privacy of IoT Devices?",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Exploring User Security and Privacy Attitudes and Concerns Toward the Use of General-Purpose LLM Chatbots for Mental Health",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: (Un)usable Privacy: the Lack of Overlap between Privacy-Aware Sensing and Usable Privacy Research",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "wellintended but halfhearted hosts consideration of guests privacy using smart devices on rental properties",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "abuse vectors a framework for conceptualizing iotenabled interpersonal abuse",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "its the equivalent of feeling like youre in jail lessons from firsthand and secondhand accounts of iotenabled intimate partner abuse",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "understanding privacy attitudes and concerns towards remote communications during the covid19 pandemic",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 668,
    "paper_ids": [
      2498,
      3262,
      3263
    ],
    "papers_without_artifact_ids": [
      3264,
      2551,
      2553,
      3265
    ]
  },
  {
    "name": "Sven Hebrok",
    "display_name": "Sven Hebrok",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "STEK Sharing is Not Caring: Bypassing TLS Authentication in Web Servers using Session Tickets",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 669,
    "paper_ids": [
      586,
      588,
      957
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thorsten Eisenhofer",
    "display_name": "Thorsten Eisenhofer",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 2,
        "2021": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Prompt Obfuscation for Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dompteur taming audio adversarial examples",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "imperio robust overtheair adversarial examples for automatic speech recognition systems",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 670,
    "paper_ids": [
      103,
      3266,
      538
    ],
    "papers_without_artifact_ids": [
      119,
      120
    ]
  },
  {
    "name": "Haipeng Cai",
    "display_name": "Haipeng Cai",
    "affiliation": "University at Buffalo",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PolyCruise: A Cross-Language Dynamic Information Flow Analysis",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "APPATCH: Automated Adaptive Prompting Large Language Models for Real-World Software Vulnerability Patching",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "beyond the surface uncovering the unprotected components of android against overlay attack",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "flowdist multistaged refinementbased dynamic information flow analysis for distributed software systems",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 671,
    "paper_ids": [
      771,
      772,
      1203
    ],
    "papers_without_artifact_ids": [
      779,
      3267
    ]
  },
  {
    "name": "Mathy Vanhoef",
    "display_name": "Mathy Vanhoef",
    "affiliation": "KU Leuven",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "ATC": 0,
      "ACSAC": 0,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 2,
        "2025": 2,
        "2021": 1
      },
      "ATC": {},
      "ACSAC": {},
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Confusing Value with Enumeration: Studying the Use of CVEs in Academia",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Haunted by Legacy: Discovering and Exploiting Vulnerable Tunnelling Hosts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lanshield analysing and protecting local network access on mobile devices",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "framing frames bypassing wifi encryption by manipulating transmit queues",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "fragment and forge breaking wifi through frame aggregation and fragmentation",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "timeless timing attacks exploiting concurrency to leak secrets over remote connections",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 672,
    "paper_ids": [
      3074,
      108,
      3268
    ],
    "papers_without_artifact_ids": [
      3269,
      3270,
      3271,
      3083
    ]
  },
  {
    "name": "Steve Kremer",
    "display_name": "Steve Kremer",
    "affiliation": "INRIA Nancy - Grand Est, France",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2,
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "A comprehensive, formal and automated analysis of the EDHOC protocol",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SAPIC+: protocol verifiers of the world, unite!",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Comprehensive Formal Security Analysis of OPC UA",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hash gone bad automated discovery of protocol attacks that exploit hash function weaknesses",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 673,
    "paper_ids": [
      2520,
      2521,
      3207
    ],
    "papers_without_artifact_ids": [
      1882
    ]
  },
  {
    "name": "Daniel Hugenroth",
    "display_name": "Daniel Hugenroth",
    "affiliation": "University of Cambridge",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      },
      "PETS": {
        "2022": 1,
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on Smartphones",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok web authentication and recovery in the age of endtoend encryption",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "coverdrop blowing the whistle through a news app",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 674,
    "paper_ids": [
      3272,
      3273,
      2914
    ],
    "papers_without_artifact_ids": [
      3274,
      3275
    ]
  },
  {
    "name": "Alastair R. Beresford",
    "display_name": "Alastair R. Beresford",
    "affiliation": "University of Cambridge",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 4,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      },
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2025": 1,
        "2024": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on Smartphones",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok web authentication and recovery in the age of endtoend encryption",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "sok managing risks of linkage attacks on data privacy",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "coverdrop blowing the whistle through a news app",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 675,
    "paper_ids": [
      3272,
      3273,
      2914
    ],
    "papers_without_artifact_ids": [
      3274,
      3276,
      3275
    ]
  },
  {
    "name": "Dawn Song",
    "display_name": "Dawn Song",
    "affiliation": "Univ. of California - Berkeley",
    "artifact_count": 3,
    "total_papers": 13,
    "total_papers_by_conf": {
      "USENIXSEC": 8,
      "PETS": 4,
      "EUROSYS": 0,
      "ATC": 0,
      "WOOT": 0,
      "NDSS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 5,
        "2022": 1,
        "2021": 1
      },
      "PETS": {
        "2023": 2,
        "2024": 1,
        "2021": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "WOOT": {},
      "NDSS": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 23.1,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PrivGuard: Privacy Regulation Compliance Made Easier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Exploring the Privacy Risks of Adversarial VR Game Design",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "textguard provable defense against backdoor attacks on text classification",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "sok data privacy in virtual reality",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "lessons learned surveying the practicality of differential privacy in the industry",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "unique identification of 50 000 virtual reality users from head hand motion data",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "the blockchain imitation game",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "secure floatingpoint training",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "patrol provable defense against adversarial policy in twoplayer games",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "dplis boosting utility of differentially private deep learning via randomized smoothing",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "extracting training data from large language models",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "mirage succinct arguments for randomized algorithms with applications to universal zksnarks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 676,
    "paper_ids": [
      3277,
      3278,
      3279
    ],
    "papers_without_artifact_ids": [
      3280,
      3281,
      3282,
      3283,
      3284,
      2540,
      942,
      3285,
      3286,
      2420
    ]
  },
  {
    "name": "Patrick Jattke",
    "display_name": "Patrick Jattke",
    "affiliation": "ETH Zurich",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 2
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "HECO: Fully Homomorphic Encryption Compiler",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Posthammer: Pervasive Browser-based Rowhammer Attacks with Postponed Refresh Commands",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "McSee: Evaluating Advanced Rowhammer Attacks and Defenses via Automated DRAM Traffic Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "zenhammer rowhammer attacks on amd zenbased platforms",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 677,
    "paper_ids": [
      2458,
      925,
      928
    ],
    "papers_without_artifact_ids": [
      930
    ]
  },
  {
    "name": "Miro Haller",
    "display_name": "Miro Haller",
    "affiliation": "ETH Zurich",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1,
        "2021": 1
      },
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2021,
      2023,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HECO: Fully Homomorphic Encryption Compiler",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "No Key, No Problem: Vulnerabilities in Master Lock Smart Locks",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mfkdf multiple factors knocked down flat",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "radiusudp considered harmful",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 678,
    "paper_ids": [
      2458,
      1226,
      3287
    ],
    "papers_without_artifact_ids": [
      3288,
      3289
    ]
  },
  {
    "name": "Nicolas Christin",
    "display_name": "Nicolas Christin",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 3,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "NDSS": 1,
      "ATC": 0,
      "WOOT": 0,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2023": 1,
        "2022": 2,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      },
      "ATC": {},
      "WOOT": {},
      "PETS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 30.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Measurement by Proxy: On the Accuracy of Online Marketplace Measurements",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Blockchain Address Poisoning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rethinking fingerprinting an assessment of behaviorbased methods at scale and implications for web tracking",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "automatic generation of web censorship probe lists",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "does online anonymous market vendor reputation matter",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "it was honestly just gambling investigating the experiences of teenage cryptocurrency users on reddit",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "gfweb measuring the great firewalls web censorship at scale",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "assessing anonymity techniques employed in german court decisions a deanonymization experiment",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "on recruiting and retaining users for securitysensitive longitudinal measurement panels",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 679,
    "paper_ids": [
      3290,
      3291,
      3148
    ],
    "papers_without_artifact_ids": [
      2502,
      3255,
      3292,
      2506,
      2991,
      3293,
      3294
    ]
  },
  {
    "name": "Abhik Roychoudhury",
    "display_name": "Abhik Roychoudhury",
    "affiliation": "National University of Singapore",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 2
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Stateful Greybox Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Large Language Model guided Protocol Fuzzing",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bleem packet sequence oriented fuzzing for protocol implementations",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "besfs a posix filesystem for enclaves with a mechanized safety proof",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 680,
    "paper_ids": [
      1768,
      3295,
      3296
    ],
    "papers_without_artifact_ids": [
      3297,
      1771
    ]
  },
  {
    "name": "Qi Pang",
    "display_name": "Qi Pang",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 2,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Automated Side Channel Analysis of Media Software with Manifold Learning",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PrivGuard: Privacy Regulation Compliance Made Easier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FABLE: Batched Evaluation on Confidential Lookup Tables in 2PC",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mpcdiff testing and repairing mpchardened deep learning models",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "mid tracing screen photos via moiré patterns",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 681,
    "paper_ids": [
      948,
      3278,
      3298
    ],
    "papers_without_artifact_ids": [
      955,
      3299
    ]
  },
  {
    "name": "Guoxing Chen",
    "display_name": "Guoxing Chen",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 3,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2,
        "2022": 1,
        "2025": 2,
        "2021": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 37.5,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "EKC: A Portable and Extensible Kernel Compartment for De-Privileging Commodity OS",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Depth Gives a False Sense of Privacy: LLM Internal States Inversion",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the philosophers stone trojaning plugins of large language models",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "a formal approach to multilayered privileges for enclaves",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "policycomp counterpart comparison of privacy policies uncovers overbroad personal data collection practices",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "reusable enclaves for confidential serverless computing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "towards formal verification of state continuity for enclave programs",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 682,
    "paper_ids": [
      364,
      365,
      3300
    ],
    "papers_without_artifact_ids": [
      1572,
      3301,
      3302,
      376,
      379
    ]
  },
  {
    "name": "Yves-Alexandre de Montjoye",
    "display_name": "Yves-Alexandre de Montjoye",
    "affiliation": "Imperial College London",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 2,
        "2025": 1
      },
      "PETS": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Free Record-Level Privacy Risk Evaluation Through Artifact-Based Methods",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a zero auxiliary knowledge membership inference attack on aggregate location data",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "did the neurons read your book documentlevel membership inference for large language models",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "pool inference attacks on local differential privacy quantifying the privacy guarantees of apples count mean sketch in practice",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 683,
    "paper_ids": [
      3303,
      3304,
      3194
    ],
    "papers_without_artifact_ids": [
      3305,
      3306,
      3307
    ]
  },
  {
    "name": "Qiang Tang 0005",
    "display_name": "Qiang Tang",
    "affiliation": "University of Sydney",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Pisces: Private and Compliable Cryptocurrency Exchange",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "epioracle privacypreserving crossfacility early warning for unknown epidemics",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 684,
    "paper_ids": [
      3308,
      3309,
      3310
    ],
    "papers_without_artifact_ids": [
      3311
    ]
  },
  {
    "name": "Liwei Song",
    "display_name": "Liwei Song",
    "affiliation": "Princeton University, E-mail: {sfar, liweis",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2021": 1
      },
      "PETS": {
        "2022": 2
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Machine Learning with Differentially Private Labels: Mechanisms and Frameworks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Athena: Probabilistic Verification of Machine Unlearning",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "systematic evaluation of privacy risks of machine learning models",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 685,
    "paper_ids": [
      130,
      133,
      135
    ],
    "papers_without_artifact_ids": [
      143
    ]
  },
  {
    "name": "Ting Wang 0006",
    "display_name": "Ting Wang",
    "affiliation": "Stony Brook University",
    "artifact_count": 3,
    "total_papers": 17,
    "total_papers_by_conf": {
      "USENIXSEC": 16,
      "ACSAC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 2,
        "2023": 3,
        "2022": 6,
        "2025": 1,
        "2021": 3
      },
      "ACSAC": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 17.6,
    "repro_rate": 0.0,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Back-Propagating System Dependency Impact for Attack Investigation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "On the Security Risks of AutoML",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Watch the Watchers! On the Security Risks of Robustness-Enhancing Diffusion Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improving the robustness of transformerbased large language models with dynamic attention",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "on the difficulty of defending contrastive learning against backdoor attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "airs explanation for deep reinforcement learning based security applications",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "freeeagle detecting complex neural trojans in datafree cases",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "on the security risks of knowledge graph reasoning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "seeing is living rethinking the security of facial liveness verification in the deepfake era",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "towards automatically reverse engineering vehicle diagnostic protocols",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "label inference attacks against vertical federated learning",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "foap finegrained openworld android app fingerprinting",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "unifuzz a holistic and pragmatic metricsdriven platform for evaluating fuzzers",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "graph backdoor",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "too good to be safe tricking lane detection in autonomous driving with crafted perturbations",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "textshield robust text classification based on multimodal embedding and neural machine translation",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "interpretable deep learning under fire",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 686,
    "paper_ids": [
      2494,
      773,
      1538
    ],
    "papers_without_artifact_ids": [
      1544,
      1546,
      941,
      1554,
      785,
      1557,
      692,
      1556,
      789,
      1558,
      1559,
      790,
      262,
      792
    ]
  },
  {
    "name": "Harjot Kaur",
    "display_name": "Harjot Kaur",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 2
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"That's my perspective from 30 years of doing this\": An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"Threat modeling is very formal, it's very technical, and also very hard to do correctly\": Investigating Threat Modeling Practices in Open-Source Software Projects",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "security is not my field im a stats guy a qualitative root cause analysis of barriers to adversarial machine learning defenses in industry",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 687,
    "paper_ids": [
      1241,
      1243,
      1244
    ],
    "papers_without_artifact_ids": [
      1251
    ]
  },
  {
    "name": "Chao Shen 0001",
    "display_name": "Chao Shen",
    "affiliation": "Xi'an Jiaotong University",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1,
        "2022": 2,
        "2025": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 42.9,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Revisiting Training-Inference Trigger Intensity in Backdoor Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "more simplicity for trainers more opportunity for attackers blackbox attacks on speaker recognition systems by inferring feature extractor",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "hijacking attacks against neural network by analyzing training data",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "kenku towards efficient and stealthy blackbox adversarial attacks against asr systems",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "teacher model fingerprinting attacks against transfer learning",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 688,
    "paper_ids": [
      547,
      3312,
      1202
    ],
    "papers_without_artifact_ids": [
      565,
      562,
      570,
      207
    ]
  },
  {
    "name": "Hamed Haddadi",
    "display_name": "Hamed Haddadi",
    "affiliation": "Imperial College London",
    "artifact_count": 3,
    "total_papers": 12,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 6,
      "EUROSYS": 2,
      "NSDI": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "PETS": {
        "2020": 1,
        "2022": 1,
        "2023": 1,
        "2025": 2,
        "2021": 1
      },
      "EUROSYS": {
        "2024": 2
      },
      "NSDI": {
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Web Execution Bundles: Reproducible, Accurate, and Archivable Web Measurements",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privacy-Aware Adversarial Network in Human Mobility Prediction",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "distefano decentralized infrastructure for sharing trusted encrypted facts and nothing more",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "telesparse practical privacypreserving verification of deep neural networks",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "measuring the accuracy and effectiveness of pii removal services",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "towards lowenergy adaptive personalization for resourceconstrained devices",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "guarantee towards attestable and private ml with cca",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "poolparty exploiting browser resource pools for web tracking",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "rearchitecting traffic analysis with neural network interface cards",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "blocked or broken automatically detecting when privacy interventions break websites",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "blocking without breaking identification and mitigation of nonessential iot traffic",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 689,
    "paper_ids": [
      1185,
      3313,
      3314
    ],
    "papers_without_artifact_ids": [
      3315,
      3316,
      3317,
      3318,
      3192,
      3319,
      3320,
      3200,
      3321
    ]
  },
  {
    "name": "Pengfei Wu 0003",
    "display_name": "Pengfei Wu",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 3
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: Understanding zk-SNARKs: The Gap Between Research and Practice",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Practical Keyword Private Information Retrieval from Key-to-Index Mappings",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 690,
    "paper_ids": [
      3322,
      1396,
      3257
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yixin Wu 0001",
    "display_name": "Yixin Wu",
    "affiliation": "IISc Bangalore",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 3
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream Applications",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "link stealing attacks against inductive graph neural networks",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "quantifying privacy risks of prompts in visual prompt learning",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 691,
    "paper_ids": [
      181,
      182,
      191
    ],
    "papers_without_artifact_ids": [
      196,
      198
    ]
  },
  {
    "name": "Ye Wu",
    "display_name": "Ye Wu",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 3
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition Algorithms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "H2O2RAM: A High-Performance Hierarchical Doubly Oblivious RAM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i know what you asked prompt leakage via kvcache sharing in multitenant llm serving",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "waven webassembly memory virtualization for enclaves",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 692,
    "paper_ids": [
      2974,
      3323,
      2524
    ],
    "papers_without_artifact_ids": [
      369,
      370
    ]
  },
  {
    "name": "Di Wang 0015",
    "display_name": "Di Wang",
    "affiliation": "KAUST",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 3
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One Run",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Lifecycle Unlearning Commitment Management: Measuring Sample-level Unlearning Completeness",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Beyond Statistical Estimation: Differentially Private Individual Computation via Shuffling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "inductive graph unlearning",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 693,
    "paper_ids": [
      896,
      463,
      3048
    ],
    "papers_without_artifact_ids": [
      3324
    ]
  },
  {
    "name": "Jinyuan Jia 0001",
    "display_name": "Jinyuan Jia",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 3,
    "total_papers": 13,
    "total_papers_by_conf": {
      "USENIXSEC": 12,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 1,
        "2022": 2,
        "2025": 4,
        "2021": 2
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 23.1,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Evaluating LLM-based Personal Information Extraction and Countermeasures",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Provably Robust Multi-bit Watermarking for AI-generated Text",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TracLLM: A Generic Framework for Attributing Long Context LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "poisonedrag knowledge corruption attacks to retrievalaugmented generation of large language models",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "textguard provable defense against backdoor attacks on text classification",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "ace a model poisoning attack on contribution evaluation methods in federated learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "formalizing and benchmarking prompt injection attacks and defenses",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "pore provably robust recommender systems against data poisoning attacks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "poisonedencoder poisoning the unlabeled pretraining data in contrastive learning",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "poisoning attacks to local differential privacy protocols for keyvalue data",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "data poisoning attacks to local differential privacy protocols",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "stealing links from graph neural networks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "local model poisoning attacks to byzantinerobust federated learning",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 694,
    "paper_ids": [
      3163,
      1903,
      3325
    ],
    "papers_without_artifact_ids": [
      3326,
      3280,
      3327,
      3164,
      3166,
      3168,
      3169,
      3170,
      211,
      3171
    ]
  },
  {
    "name": "Wenzhi Chen",
    "display_name": "Wenzhi Chen",
    "affiliation": "Zhejiang University",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 2,
      "EUROSYS": 0,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "EUROSYS": {},
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PRSA: Prompt Stealing Attacks against Real-World Prompt Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MineShark: Cryptomining Traffic Detection at Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lmsanitator defending prompttuning against taskagnostic backdoors",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "exploring chatgpts capabilities on vulnerability management",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "cuzk accelerating zeroknowledge proof with a faster parallel multiscalar multiplication algorithm on gpus",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 695,
    "paper_ids": [
      2328,
      1541,
      304
    ],
    "papers_without_artifact_ids": [
      2329,
      1551,
      3328
    ]
  },
  {
    "name": "Yiting Qu",
    "display_name": "Yiting Qu",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 3
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Meme to Threat: On the Hateful Meme Understanding and Induced Hateful Content Generation in Open-Source Vision Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Bridging the Gap in Vision Language Models in Identifying Unsafe Concepts Across Modalities",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "prompt stealing attacks against texttoimage generation models",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 696,
    "paper_ids": [
      182,
      184,
      190
    ],
    "papers_without_artifact_ids": [
      197
    ]
  },
  {
    "name": "Fengyu Liu",
    "display_name": "Fengyu Liu",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 3
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Pig in a Poke: Automatically Detecting and Exploiting Link Following Vulnerabilities in Windows File Operations",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 697,
    "paper_ids": [
      233,
      236,
      237
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiarun Dai",
    "display_name": "Jiarun Dai",
    "affiliation": "Fudan University",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2025": 3
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exorcising wraith protecting lidarbased object detector in automated driving system from appearing attacks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "bscout direct whole patch presence test for java executables",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 698,
    "paper_ids": [
      233,
      236,
      238
    ],
    "papers_without_artifact_ids": [
      251,
      261
    ]
  },
  {
    "name": "Zakir Durumeric",
    "display_name": "Zakir Durumeric",
    "affiliation": "Stanford University",
    "artifact_count": 3,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "WOOT": 0,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 4,
        "2021": 3
      },
      "WOOT": {},
      "NSDI": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 37.5,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "A First Look at Governments' Enterprise Security Guidance",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Characterizing the MrDeepFakes Sexual Deepfake Marketplace",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cato endtoend optimization of mlbased traffic analysis pipelines",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "tracking the takes and trajectories of englishlanguage news narratives across trustworthy and worrisome websites",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "designing toxic content classification for a diversity of perspectives",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "whats in a name exploring ca certificate control",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "lzr identifying unexpected internet services",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 699,
    "paper_ids": [
      3329,
      3330,
      885
    ],
    "papers_without_artifact_ids": [
      3331,
      3332,
      3333,
      3334,
      3335
    ]
  },
  {
    "name": "Michel van Eeten",
    "display_name": "Michel van Eeten",
    "affiliation": "TU Delft",
    "artifact_count": 3,
    "total_papers": 16,
    "total_papers_by_conf": {
      "USENIXSEC": 16,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 4,
        "2022": 1,
        "2025": 7,
        "2021": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 18.8,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Trust but Verify: An Assessment of Vulnerability Tagging Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "EvilEDR: Repurposing EDR as an Offensive Tool",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Regulating Smart Device Support Periods: User Expectations and the European Cyber Resilience Act",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "am i infected lessons from operating a largescale iot security diagnostic service",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "high stakes low certainty evaluating the efficacy of highlevel indicators of compromise in ransomware attribution",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "patching up stakeholder experiences of security updates for connected medical devices",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "ghost clusters evaluating attribution of illicit services through cryptocurrency tracing",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "iot market dynamics an analysis of device sales security and privacy signals and their interactions",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "the unpatchables why municipalities persist in running vulnerable hosts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "examining consumer reviews to understand security and privacy issues in the market of smart home devices",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "measuring up to reasonable consumer expectations providing an empirical basis for holding iot manufacturers legally responsible",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "two sides of the shield understanding protective dns adoption factors",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "an attackers dream exploring the capabilities of chatgpt for developing malware",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "helping hands measuring the impact of a large threat intelligence sharing community",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "the thing doesnt have a name learning from emergent realworld interventions in smart home security",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "a different cup of ti the added value of commercial threat intelligence",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 700,
    "paper_ids": [
      3336,
      3337,
      3338
    ],
    "papers_without_artifact_ids": [
      3339,
      3340,
      3341,
      3342,
      3343,
      3344,
      3345,
      3346,
      3347,
      3348,
      3349,
      3350,
      3351
    ]
  },
  {
    "name": "Hsu-Chun Hsiao",
    "display_name": "Hsu-Chun Hsiao",
    "affiliation": "National Taiwan University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2022": 1,
        "2026": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025,
      2026
    ],
    "year_range": "2022-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Bots can Snoop: Uncovering and Mitigating Privacy Risks of Bots in Group Chats",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Bot Among Us: Exploring User Awareness and Privacy Concerns About Chatbots in Group Chats",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "verifying lootbox probability without sourcecode disclosure",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 701,
    "paper_ids": [
      3352,
      2586,
      3353
    ],
    "papers_without_artifact_ids": [
      3354
    ]
  },
  {
    "name": "Dayong Ye",
    "display_name": "Dayong Ye",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 3
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cross-Modal Prompt Inversion: Unifying Threats to Text and Image Generative AI Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reinforcement unlearning",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 702,
    "paper_ids": [
      183,
      1570,
      189
    ],
    "papers_without_artifact_ids": [
      1573
    ]
  },
  {
    "name": "Tianqing Zhu",
    "display_name": "Tianqing Zhu",
    "affiliation": "City University of Macau",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 3
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cross-Modal Prompt Inversion: Unifying Threats to Text and Image Generative AI Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reinforcement unlearning",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "how does a deep learning model architecture impact its privacy a comprehensive study of privacy attacks on cnns and transformers",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 703,
    "paper_ids": [
      183,
      1570,
      189
    ],
    "papers_without_artifact_ids": [
      1573,
      3355
    ]
  },
  {
    "name": "Bo Liu 0001",
    "display_name": "Bo Liu",
    "affiliation": "University of Technology Sydney",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 3
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cross-Modal Prompt Inversion: Unifying Threats to Text and Image Generative AI Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok private knowledge sharing in distributed learning",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "how does a deep learning model architecture impact its privacy a comprehensive study of privacy attacks on cnns and transformers",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 704,
    "paper_ids": [
      183,
      1570,
      189
    ],
    "papers_without_artifact_ids": [
      3356,
      3355
    ]
  },
  {
    "name": "Wanlei Zhou 0001",
    "display_name": "Wanlei Zhou",
    "affiliation": "City University of Macau",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ATC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 3
      },
      "ATC": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cross-Modal Prompt Inversion: Unifying Threats to Text and Image Generative AI Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reinforcement unlearning",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "how does a deep learning model architecture impact its privacy a comprehensive study of privacy attacks on cnns and transformers",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 705,
    "paper_ids": [
      183,
      1570,
      189
    ],
    "papers_without_artifact_ids": [
      1573,
      3355
    ]
  },
  {
    "name": "Francesca Falzon",
    "display_name": "Francesca Falzon",
    "affiliation": "ETH Zürich",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Learning from Functionality Outputs: Private Join and Compute in the Real World",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Attacks on Encrypted Response-Hiding Range Search Schemes in Multiple Dimensions",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 706,
    "paper_ids": [
      3357,
      3358,
      3359
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anja Feldmann",
    "display_name": "Anja Feldmann",
    "affiliation": "Max Planck Society",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2025": 2
      },
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2015": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Catch-22: Uncovering Compromised Hosts using SSH Public Keys",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Intractable Cookie Crumbs: Unveiling the Nexus of Stateful Banner Interaction and Tracking Cookies",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Unmasking the Shadows: A Cross-Country Study of Online Tracking in Illegal Movie Streaming Services",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "c3 cutting tail latency in cloud data stores via adaptive replica selection",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 707,
    "paper_ids": [
      2928,
      3360,
      3361
    ],
    "papers_without_artifact_ids": [
      1656
    ]
  },
  {
    "name": "Wenjie Qu 0001",
    "display_name": "Wenjie Qu",
    "affiliation": "City University of Hong Kong",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 3
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "zkGPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Provably Robust Multi-bit Watermarking for AI-generated Text",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 708,
    "paper_ids": [
      1902,
      1903,
      1904
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xuanming Liu",
    "display_name": "Xuanming Liu",
    "affiliation": "Zhejiang University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 3
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "zkGPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof Delegation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 709,
    "paper_ids": [
      1902,
      1904,
      1905
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leon Trampert",
    "display_name": "Leon Trampert",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Confusing Value with Enumeration: Studying the Use of CVEs in Academia",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 710,
    "paper_ids": [
      108,
      328,
      330
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuan Lu 0001",
    "display_name": "Yuan Lu",
    "affiliation": "IISc Bangalore",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Aion: Robust and Efficient Multi-Round Single-Mask Secure Aggregation Against Malicious Participants",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 711,
    "paper_ids": [
      3309,
      2566,
      1134
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yeting Li",
    "display_name": "Yeting Li",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2025": 3,
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ZIPPER: Static Taint Analysis for PHP Applications with Precision and Efficiency",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "file hijacking vulnerability the elephant in the room",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "leveraging semantic relations in code and data to enhance taint analysis of embedded systems",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "regexscalpel regular expression denial of service redos defense by localizeandfix",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "redoshunter a combined static and dynamic approach for regular expression dos detection",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 712,
    "paper_ids": [
      3362,
      3363,
      3364
    ],
    "papers_without_artifact_ids": [
      3365,
      3366,
      3129,
      3367
    ]
  },
  {
    "name": "Yang Xiao 0011",
    "display_name": "Yang Xiao",
    "affiliation": "Institute of Science Tokyo",
    "artifact_count": 3,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 3
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 37.5,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ZIPPER: Static Taint Analysis for PHP Applications with Precision and Efficiency",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "file hijacking vulnerability the elephant in the room",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "leveraging semantic relations in code and data to enhance taint analysis of embedded systems",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "detecting api posthandling bugs using code and description in patches",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "regexscalpel regular expression denial of service redos defense by localizeandfix",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "mvp detecting vulnerabilities using patchenhanced vulnerability signatures",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 713,
    "paper_ids": [
      3362,
      3363,
      3364
    ],
    "papers_without_artifact_ids": [
      3365,
      3366,
      1864,
      3129,
      3132
    ]
  },
  {
    "name": "Wei Huo",
    "display_name": "Wei Huo",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2025": 3
      },
      "ACSAC": {
        "2019": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ZIPPER: Static Taint Analysis for PHP Applications with Precision and Efficiency",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "file hijacking vulnerability the elephant in the room",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "leveraging semantic relations in code and data to enhance taint analysis of embedded systems",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "mvp detecting vulnerabilities using patchenhanced vulnerability signatures",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "srfuzzer an automatic fuzzing framework for physical soho router devices to discover multitype vulnerabilities",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 714,
    "paper_ids": [
      3362,
      3363,
      3364
    ],
    "papers_without_artifact_ids": [
      3365,
      3366,
      3132,
      1901
    ]
  },
  {
    "name": "Anisa Halimi",
    "display_name": "Anisa Halimi",
    "affiliation": "IBM Research - Dublin",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2022": 1,
        "2024": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards a Re-evaluation of Data Forging Attacks in Practice",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AUTOLYCUS: Exploiting Explainable Artificial Intelligence (XAI) for Model Extraction Attacks against Interpretable Models",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aidriven workload management in meta os",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 715,
    "paper_ids": [
      3368,
      2557,
      2559
    ],
    "papers_without_artifact_ids": [
      3369
    ]
  },
  {
    "name": "Xinlei He 0001",
    "display_name": "Xinlei He",
    "affiliation": "Hong Kong University of Science and Technology",
    "artifact_count": 3,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "NDSS": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2025": 2,
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Unsafe LLM-Based Search: Quantitative Analysis and Mitigation of Safety Risks in AI Web Search",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Purity to Peril: Backdooring Merged Models From \"Harmless\" Benign Components",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Safety Misalignment Against Large Language Models",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a comprehensive study of privacy risks in curriculum learning",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "link stealing attacks against inductive graph neural networks",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "securitynet assessing machine learning vulnerabilities on public models",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a plot is worth a thousand words model information stealing attacks via scientific plots",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "mldoctor holistic risk assessment of inference attacks against machine learning models",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "stealing links from graph neural networks",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 716,
    "paper_ids": [
      3370,
      2569,
      3371
    ],
    "papers_without_artifact_ids": [
      194,
      196,
      199,
      204,
      206,
      211
    ]
  },
  {
    "name": "Changyu Dong",
    "display_name": "Changyu Dong",
    "affiliation": "Guangzhou University",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2,
        "2021": 1
      },
      "PETS": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Beyond Statistical Estimation: Differentially Private Individual Computation via Shuffling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Addressing Sensitivity Distinction in Local Differential Privacy: A General Utility-Optimized Framework",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secretshared shuffle with malicious security",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "how to make private distributed cardinality estimation practical and get differential privacy for free",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 717,
    "paper_ids": [
      3048,
      3372,
      839
    ],
    "papers_without_artifact_ids": [
      2959,
      3373
    ]
  },
  {
    "name": "Pratap Singh",
    "display_name": "Pratap Singh",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ATC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 3
      },
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Towards Practical, End-to-End Formally Verified X.509 Certificate Validators with Verdict",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OwlC: Compiling Security Protocols to Verified, Secure, High-Performance Libraries",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Vest: Verified, Secure, High-Performance Parsing and Serialization for Rust",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tectonicshift a composite storage fabric for largescale ml training",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "facebooks tectonic filesystem efficiency from exascale",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 718,
    "paper_ids": [
      717,
      718,
      720
    ],
    "papers_without_artifact_ids": [
      3374,
      2744
    ]
  },
  {
    "name": "Joshua Gancher",
    "display_name": "Joshua Gancher",
    "affiliation": "Northeastern University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 3
      },
      "PETS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Towards Practical, End-to-End Formally Verified X.509 Certificate Validators with Verdict",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OwlC: Compiling Security Protocols to Verified, Secure, High-Performance Libraries",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Vest: Verified, Secure, High-Performance Parsing and Serialization for Rust",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 719,
    "paper_ids": [
      717,
      718,
      720
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianjun Chen 0005",
    "display_name": "Jianjun Chen",
    "affiliation": "Tsinghua University",
    "artifact_count": 3,
    "total_papers": 12,
    "total_papers_by_conf": {
      "USENIXSEC": 8,
      "NDSS": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 3
      },
      "NDSS": {
        "2024": 3,
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "My ZIP isn't your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "crossorigin web attacks via http2 server push and signed http exchange",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "faster and better detecting vulnerabilities in linuxbased iot firmware with optimized reaching definition analysis",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "reqsminer automated discovery of cdn forwarding request inconsistencies and dos attacks with grammarbased fuzzing",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "breakspf how shared infrastructures magnify spf vulnerabilities across the internet",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "demystifying the security implications in iot device rental services",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "cdn cannon exploiting cdn backtoorigin strategies for amplification attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "temporal cdnconvex lens a cdnassisted practical pulsing ddos attack",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "a largescale and longitudinal measurement study of dkim deployment",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "composition kills a case study of email sender authentication",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 720,
    "paper_ids": [
      903,
      549,
      904
    ],
    "papers_without_artifact_ids": [
      906,
      1890,
      908,
      910,
      561,
      3375,
      916,
      917,
      3376
    ]
  },
  {
    "name": "Nick Feamster",
    "display_name": "Nick Feamster",
    "affiliation": "University of Chicago",
    "artifact_count": 3,
    "total_papers": 14,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "NDSS": 1,
      "ATC": 0,
      "ACSAC": 0,
      "NSDI": 7,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 2
      },
      "NDSS": {
        "2024": 1
      },
      "ATC": {},
      "ACSAC": {},
      "NSDI": {
        "2024": 1,
        "2025": 1,
        "2010": 1,
        "2016": 1,
        "2005": 2,
        "2015": 1
      },
      "PETS": {}
    },
    "artifact_rate": 21.4,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "\"I Cannot Write This Because It Violates Our Content Policy\": Understanding Content Moderation Policies and User Experiences in Generative AI Products",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Acoustic Keystroke Leakage on Smart Televisions",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cato endtoend optimization of mlbased traffic analysis pipelines",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "grace lossresilient realtime video through neural codecs",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "gfweb measuring the great firewalls web censorship at scale",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "user awareness and behaviors concerning encrypted dns settings in web browsers",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "how and why people use virtual private networks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "identifying disinformation websites using infrastructure features",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "an industrialscale software defined internet exchange point",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "kinetic verifiable dynamic network control",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "behavioral clustering of httpbased malware and signature generation using malicious network traces",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "design and implementation of a routing control platform",
        "conference": "NSDI",
        "year": 2005
      },
      {
        "title": "detecting bgp configuration faults with static analysis awarded best paper",
        "conference": "NSDI",
        "year": 2005
      }
    ],
    "author_id": 721,
    "paper_ids": [
      3377,
      549,
      3378
    ],
    "papers_without_artifact_ids": [
      3331,
      3379,
      2991,
      3380,
      3381,
      3382,
      1655,
      3383,
      1422,
      3185,
      3384
    ]
  },
  {
    "name": "Florian Hahn 0001",
    "display_name": "Florian Hahn",
    "affiliation": "University of Twente",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      },
      "PETS": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Ranking, Order Statistics, and Sorting under CKKS",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Private Sampling with Identifiable Cheaters",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 722,
    "paper_ids": [
      1438,
      1439,
      1440
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ian Neal",
    "display_name": "Ian Neal",
    "affiliation": "University of Michigan",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 2,
      "USENIXSEC": 1,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2020": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "ATC": {},
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DOLMA: Securing Speculation with the Principle of Transient Non-Observability",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DMon: Efficient Detection and Correction of Data Locality Problems Using Selective Profiling",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AGAMOTTO: How Persistent is your Persistent Memory Application?",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rethinking file mapping for persistent memory",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 723,
    "paper_ids": [
      1625,
      1626,
      353
    ],
    "papers_without_artifact_ids": [
      357
    ]
  },
  {
    "name": "Tobias Pulls",
    "display_name": "Tobias Pulls",
    "affiliation": "Karlstad University",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 4,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2025": 1,
        "2021": 1,
        "2026": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2025,
      2026
    ],
    "year_range": "2020-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Website Fingerprinting with Website Oracles",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Onion-Location Measurements and Fingerprinting",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ephemeral Network-Layer Fingerprinting Defenses",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "timeless timing attacks and preload defenses in tors dns cache",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "privacypreserving incrementallydeployable support for certificate transparency in tor",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 724,
    "paper_ids": [
      3385,
      1701,
      1919
    ],
    "papers_without_artifact_ids": [
      3386,
      3387
    ]
  },
  {
    "name": "Kassem Fawaz",
    "display_name": "Kassem Fawaz",
    "affiliation": "University of Wisconsin - Madison",
    "artifact_count": 3,
    "total_papers": 14,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 11
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 3,
        "2022": 2,
        "2025": 1,
        "2021": 3
      }
    },
    "artifact_rate": 21.4,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2021,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Privacy Policy Landscape After the GDPR",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Face-Off: Adversarial Face Obfuscation",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "abusability of automation apps in intimate partner violence",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "unpacking privacy labels a measurement and developer perspective on googles data safety section",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "tubes among us analog attack on automatic speaker identification",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "fairness properties of face recognition and obfuscation systems",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "automated cookie notice analysis and enforcement",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "experimental security analysis of the app model in business collaboration platforms",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "towards more robust keyword spotting for voice assistants",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "kalεido realtime privacy control for eyetracking systems",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "prisec a privacy settings enforcement controller",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "powercut and obfuscator an exploration of the design space for privacypreserving interventions for smart speakers",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "preech a system for privacypreserving speech transcription",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 725,
    "paper_ids": [
      3388,
      3389,
      3390
    ],
    "papers_without_artifact_ids": [
      2547,
      3391,
      3392,
      3393,
      3394,
      2556,
      3395,
      3396,
      3397,
      3398,
      3399
    ]
  },
  {
    "name": "Jean-Pierre Hubaux",
    "display_name": "Jean-Pierre Hubaux",
    "affiliation": "EPFL",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "PETS": 6,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1,
        "2023": 1,
        "2021": 3
      },
      "USENIXSEC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 42.9,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2021,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PriFi: Low-Latency Anonymity for Organizational Networks",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Multiparty Homomorphic Encryption from Ring-Learning-with-Errors",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacypreserving federated recurrent neural networks",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "scalable privacypreserving distributed learning",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "sok privacypreserving collaborative treebased model learning",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "privacy and integrity preserving computations with crisp",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 726,
    "paper_ids": [
      2667,
      2557,
      3400
    ],
    "papers_without_artifact_ids": [
      3401,
      3402,
      3403,
      3404
    ]
  },
  {
    "name": "Limin Jia 0001",
    "display_name": "Limin Jia",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "NDSS": 1,
      "PETS": 2,
      "USENIXSEC": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2022": 1,
        "2026": 1
      },
      "USENIXSEC": {
        "2020": 1
      },
      "NSDI": {
        "2020": 1,
        "2018": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 33.3,
    "functional_rate": 66.7,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2022,
      2025,
      2026
    ],
    "year_range": "2022-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Location-Enhanced Information Flow for Home Automations",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "netsmc a custom symbolic model checker for stateful network verification",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "how risky are real users ifttt applets",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "efficient and correct test scheduling for ensembles of network policies",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 727,
    "paper_ids": [
      2586,
      2587,
      3405
    ],
    "papers_without_artifact_ids": [
      3406,
      1827,
      3407
    ]
  },
  {
    "name": "Yohan Beugin",
    "display_name": "Yohan Beugin",
    "affiliation": "University of Wisconsin-Madison",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building a Privacy-Preserving Smart Camera System",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving)",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure IP Address Allocation at Cloud Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 728,
    "paper_ids": [
      2165,
      3408,
      3038
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Patrick D. McDaniel",
    "display_name": "Patrick D. McDaniel",
    "affiliation": "University of Wisconsin - Madison",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "NDSS": 1,
      "PETS": 3,
      "ATC": 0,
      "ACSAC": 0,
      "FAST": 1,
      "USENIXSEC": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2022": 1,
        "2024": 1,
        "2021": 1
      },
      "ATC": {},
      "ACSAC": {},
      "FAST": {
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 2
      },
      "OSDI": {}
    },
    "artifact_rate": 42.9,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2022,
      2024,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building a Privacy-Preserving Smart Camera System",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving)",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure IP Address Allocation at Cloud Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on scalable integrity checking for secure cloud disks",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "the space of adversarial strategies",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "dscope a cloudnative internet telescope",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "realtime analysis of privacyunaware iot applications",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 729,
    "paper_ids": [
      2165,
      3408,
      3038
    ],
    "papers_without_artifact_ids": [
      3409,
      3410,
      3411,
      1750
    ]
  },
  {
    "name": "Christian Reuter 0001",
    "display_name": "Christian Reuter",
    "affiliation": "TU Darmstadt",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "PETS": 6,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2024": 3,
        "2021": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Supporting Informed Choices about Browser Cookies: The Impact of Personalised Cookie Banners",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "support personas a concept for tailored support of users of privacyenhancing technologies",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "privacy concerns and acceptance factors of osint for cybersecurity a representative survey",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "the role of privacy in digitalization analyzing perspectives of german farmers",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "sok still plenty of phish in the sea a taxonomy of useroriented phishing interventions and avenues for future research",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 730,
    "paper_ids": [
      3412,
      3413,
      3414
    ],
    "papers_without_artifact_ids": [
      3415,
      3416,
      3417,
      3418
    ]
  },
  {
    "name": "Felix Engelmann",
    "display_name": "Felix Engelmann",
    "affiliation": "MAX-IV Laboratory, Lund University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021,
      2022,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PrePaMS: Privacy-Preserving Participant Management System for Studies with Rewards and Prerequisites",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 731,
    "paper_ids": [
      3419,
      3420,
      1441
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minh-Ha Le",
    "display_name": "Minh-Ha Le",
    "affiliation": "Linköping University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "StyleID: Identity Disentanglement for Anonymizing Faces",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DiffPrivate: Facial Privacy Protection with Diffusion Models",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "StyleAdv: A Usable Privacy Framework Against Facial Recognition with Adversarial Image Editing",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 732,
    "paper_ids": [
      1915,
      1916,
      1917
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marina Blanton",
    "display_name": "Marina Blanton",
    "affiliation": "University at Buffalo",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 2,
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure and Accurate Summation of Many Floating-Point Numbers",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 733,
    "paper_ids": [
      3421,
      3422,
      3423
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chen Yuan 0002",
    "display_name": "Chen Yuan",
    "affiliation": "New York University",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 2,
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure and Accurate Summation of Many Floating-Point Numbers",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 734,
    "paper_ids": [
      3421,
      3422,
      3423
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sebastian Zimmeck",
    "display_name": "Sebastian Zimmeck",
    "affiliation": "Wesleyan University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 2
      },
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Usability and Enforceability of Global Privacy Control",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Website Data Transparency in the Browser",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Generalizable Active Privacy Choice: Designing a Graphical User Interface for Global Privacy Control",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "websites global privacy control compliance at scale and over time",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 735,
    "paper_ids": [
      3424,
      3425,
      3426
    ],
    "papers_without_artifact_ids": [
      3427
    ]
  },
  {
    "name": "Nektarios Georgios Tsoutsos",
    "display_name": "Nektarios Georgios Tsoutsos",
    "affiliation": "University of Delaware",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 4,
      "SC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 2,
        "2024": 1
      },
      "SC": {},
      "NDSS": {}
    },
    "artifact_rate": 75.0,
    "repro_rate": 33.3,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hardwareaccelerated encrypted execution of generalpurpose applications",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 736,
    "paper_ids": [
      2595,
      2596,
      2597
    ],
    "papers_without_artifact_ids": [
      3428
    ]
  },
  {
    "name": "Christopher Harth-Kitzerow",
    "display_name": "Christopher Harth-Kitzerow",
    "affiliation": "Technical University of Munich, BMW Group",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 3
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "PIGEON: A High Throughput Framework for Private Inference of Neural Networks using Secure Multiparty Computation",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Truncation Untangled: Scaling Fixed-Point Arithmetic for Privacy-Preserving Machine Learning to Large Models and Datasets",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 737,
    "paper_ids": [
      2600,
      2601,
      3121
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Georg Carle",
    "display_name": "Georg Carle",
    "affiliation": "TU Munich",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 3
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "PIGEON: A High Throughput Framework for Private Inference of Neural Networks using Secure Multiparty Computation",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Truncation Untangled: Scaling Fixed-Point Arithmetic for Privacy-Preserving Machine Learning to Large Models and Datasets",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 738,
    "paper_ids": [
      2600,
      2601,
      3121
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sayan Biswas",
    "display_name": "Sayan Biswas",
    "affiliation": "EPFL",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 33.3,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Low-Cost Privacy-Preserving Decentralized Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Noiseless Privacy-Preserving Decentralized Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PRIVIC: A privacy-preserving method for incremental collection of location data",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 739,
    "paper_ids": [
      3429,
      3430,
      3431
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zu-Ming Jiang",
    "display_name": "Zu-Ming Jiang",
    "affiliation": "University of Hong Kong",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 2,
      "NDSS": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2023": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "NDSS",
      "OSDI"
    ],
    "years": [
      2023,
      2024,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 3,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Detecting Logic Bugs in Database Engines via Equivalent Expression Transformation",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Detecting Transactional Bugs in Database Engines via Graph-Based Oracle Construction",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dynsql stateful fuzzing for database management systems with complex and valid sql query generation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "fuzzing error handling code using contextsensitive software fault injection",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 740,
    "paper_ids": [
      648,
      1029,
      1030
    ],
    "papers_without_artifact_ids": [
      1033,
      3432
    ]
  },
  {
    "name": "Harsha V. Madhyastha",
    "display_name": "Harsha V. Madhyastha",
    "affiliation": "University of Southern California",
    "artifact_count": 3,
    "total_papers": 17,
    "total_papers_by_conf": {
      "OSDI": 3,
      "SOSP": 0,
      "EUROSYS": 0,
      "ATC": 0,
      "ACSAC": 0,
      "FAST": 1,
      "USENIXSEC": 0,
      "NSDI": 13
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 2,
        "2022": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "ATC": {},
      "ACSAC": {},
      "FAST": {
        "2012": 1
      },
      "USENIXSEC": {},
      "NSDI": {
        "2009": 1,
        "2024": 1,
        "2023": 1,
        "2010": 1,
        "2016": 1,
        "2020": 4,
        "2008": 1,
        "2011": 1,
        "2015": 2
      }
    },
    "artifact_rate": 17.6,
    "repro_rate": 66.7,
    "functional_rate": 66.7,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Horcrux: Automatic JavaScript Parallelism for Resource-Efficient Web Computation",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Oort: Efficient Federated Learning via Guided Participant Selection",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Jawa: Web Archival in the Era of JavaScript",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sprinter speeding up highfidelity crawling of the modern web",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "modelkeeper accelerating dnn training via automated training warmup",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "finegrained replicated state machines for a cluster storage system",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "sol fast distributed computation over slow networks",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "network error logging clientside measurement of endtoend web service reliability",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "nearoptimal latency versus cost tradeoffs in geodistributed storage",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "sibyl a practical internet route oracle",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "costlo costeffective redundancy for lower latency variance on cloud storage services",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "klotski reprioritizing web content to improve user experience on mobile devices",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "scc cluster storage provisioning informed by application characteristics and slas",
        "conference": "FAST",
        "year": 2012
      },
      {
        "title": "tritonsort a balanced largescale sorting system",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "reverse traceroute",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "iplane nano path prediction for peertopeer applications",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "studying black holes in the internet with hubble",
        "conference": "NSDI",
        "year": 2008
      }
    ],
    "author_id": 741,
    "paper_ids": [
      2609,
      1947,
      2610
    ],
    "papers_without_artifact_ids": [
      2616,
      1951,
      3433,
      1954,
      3434,
      1955,
      3435,
      3436,
      3437,
      3438,
      3439,
      3440,
      3441,
      3442
    ]
  },
  {
    "name": "Zixuan Ma",
    "display_name": "Zixuan Ma",
    "affiliation": "Tsinghua University",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 3,
      "SC": 0,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2022": 1,
        "2023": 1
      },
      "SC": {},
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "PET: Optimizing Tensor Programs with Partially Equivalent Transformations and Automated Corrections",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TriCache: A User-Transparent Block Cache Enabling High-Performance Out-of-Core Processing with In-Memory Programs",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "EINNET: Optimizing Tensor Programs with Derivation-Based Transformations",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "smartmoe efficiently training sparselyactivated models through combining offline and online parallelization",
        "conference": "ATC",
        "year": 2023
      }
    ],
    "author_id": 742,
    "paper_ids": [
      1616,
      2817,
      1619
    ],
    "papers_without_artifact_ids": [
      2100
    ]
  },
  {
    "name": "Yifan Qiao 0002",
    "display_name": "Yifan Qiao",
    "affiliation": "College of William and Mary",
    "artifact_count": 3,
    "total_papers": 8,
    "total_papers_by_conf": {
      "OSDI": 4,
      "SOSP": 0,
      "NSDI": 4
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2022": 1,
        "2024": 2
      },
      "SOSP": {},
      "NSDI": {
        "2024": 1,
        "2023": 3
      }
    },
    "artifact_rate": 37.5,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021,
      2022,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "MemLiner: Lining up Tracing and Application for a Far-Memory-Friendly Runtime",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DRust: Language-Guided Distributed Shared Memory with Fine Granularity, Full Transparency, and Ultra Efficiency",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "harvesting idle memory for applicationmanaged soft state with midas",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "a tale of two paths toward a hybrid data plane for efficient farmemory applications",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "bamboo making preemptible instances resilient for affordable training of large dnns",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "canvas isolated and adaptive swapping for multiapplications on remote memory",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "hermit lowlatency highthroughput and transparent remote memory via feedbackdirected asynchrony",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 743,
    "paper_ids": [
      1617,
      2940,
      2088
    ],
    "papers_without_artifact_ids": [
      2638,
      1377,
      1621,
      2619,
      2641
    ]
  },
  {
    "name": "Miryung Kim",
    "display_name": "Miryung Kim",
    "affiliation": "Univ. of California - Los Angeles",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "OSDI": 3,
      "SOSP": 0,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2024": 1,
        "2020": 1
      },
      "SOSP": {},
      "NSDI": {
        "2024": 1,
        "2023": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2021,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DRust: Language-Guided Distributed Shared Memory with Fine Granularity, Full Transparency, and Ultra Efficiency",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Semeru: A Memory-Disaggregated Managed Runtime",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "harvesting idle memory for applicationmanaged soft state with midas",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "canvas isolated and adaptive swapping for multiapplications on remote memory",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "hermit lowlatency highthroughput and transparent remote memory via feedbackdirected asynchrony",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 744,
    "paper_ids": [
      1617,
      2088,
      2611
    ],
    "papers_without_artifact_ids": [
      2638,
      2619,
      2641
    ]
  },
  {
    "name": "Guoqing Harry Xu",
    "display_name": "Guoqing Harry Xu",
    "affiliation": "Univ. of California - Los Angeles",
    "artifact_count": 3,
    "total_papers": 8,
    "total_papers_by_conf": {
      "OSDI": 4,
      "SOSP": 0,
      "EUROSYS": 0,
      "NSDI": 4
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2022": 2,
        "2020": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "NSDI": {
        "2023": 4
      }
    },
    "artifact_rate": 37.5,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2021,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "MemLiner: Lining up Tracing and Application for a Far-Memory-Friendly Runtime",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Semeru: A Memory-Disaggregated Managed Runtime",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bamboo making preemptible instances resilient for affordable training of large dnns",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "canvas isolated and adaptive swapping for multiapplications on remote memory",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "gemel model merging for memoryefficient realtime video analytics at the edge",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "hermit lowlatency highthroughput and transparent remote memory via feedbackdirected asynchrony",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "upgradvisor early adopting dependency updates using hybrid program analysis and hardware tracing",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 745,
    "paper_ids": [
      1617,
      2940,
      2611
    ],
    "papers_without_artifact_ids": [
      1621,
      2619,
      2621,
      2641,
      2004
    ]
  },
  {
    "name": "Amy Tai",
    "display_name": "Amy Tai",
    "affiliation": "Google, USA",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 3,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 2,
        "2022": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2017": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Optimizing Storage Performance with Calibrated Interrupts",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "NrOS: Effective Replication and Sharing in an Operating System",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "XRP: In-Kernel Storage Functions with eBPF",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vcorfu a cloudscale object store on a shared log",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 746,
    "paper_ids": [
      3443,
      527,
      1355
    ],
    "papers_without_artifact_ids": [
      3444
    ]
  },
  {
    "name": "Ryan Stutsman",
    "display_name": "Ryan Stutsman",
    "affiliation": "University of Utah",
    "artifact_count": 3,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 3,
      "SOSP": 0,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2022": 1,
        "2023": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 75.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021,
      2022,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "NrOS: Effective Replication and Sharing in an Operating System",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "XRP: In-Kernel Storage Functions with eBPF",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Sharding the State Machine: Automated Modular Reasoning for Complex Concurrent Systems",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flashield a hybrid keyvalue cache that controls flash write amplification",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 747,
    "paper_ids": [
      527,
      1355,
      721
    ],
    "papers_without_artifact_ids": [
      1363
    ]
  },
  {
    "name": "Haoran Ma",
    "display_name": "Haoran Ma",
    "affiliation": "University of California, Los Angeles",
    "artifact_count": 3,
    "total_papers": 6,
    "total_papers_by_conf": {
      "OSDI": 4,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2024": 2,
        "2020": 1
      },
      "NSDI": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2022,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "MemLiner: Lining up Tracing and Application for a Far-Memory-Friendly Runtime",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DRust: Language-Guided Distributed Shared Memory with Fine Granularity, Full Transparency, and Ultra Efficiency",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Semeru: A Memory-Disaggregated Managed Runtime",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "harvesting idle memory for applicationmanaged soft state with midas",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "a tale of two paths toward a hybrid data plane for efficient farmemory applications",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "canvas isolated and adaptive swapping for multiapplications on remote memory",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 748,
    "paper_ids": [
      2940,
      2088,
      2611
    ],
    "papers_without_artifact_ids": [
      2638,
      1377,
      2619
    ]
  },
  {
    "name": "Shi Liu",
    "display_name": "Shi Liu",
    "affiliation": "University of California, Los Angeles",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 4,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2024": 2,
        "2020": 1
      },
      "ATC": {},
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2022,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "MemLiner: Lining up Tracing and Application for a Far-Memory-Friendly Runtime",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DRust: Language-Guided Distributed Shared Memory with Fine Granularity, Full Transparency, and Ultra Efficiency",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Semeru: A Memory-Disaggregated Managed Runtime",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a tale of two paths toward a hybrid data plane for efficient farmemory applications",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "canvas isolated and adaptive swapping for multiapplications on remote memory",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 749,
    "paper_ids": [
      2940,
      2088,
      2611
    ],
    "papers_without_artifact_ids": [
      1377,
      2619
    ]
  },
  {
    "name": "Lalith Suresh 0001",
    "display_name": "Lalith Suresh",
    "affiliation": "Feldera.com, Sunnyvale, CA, USA",
    "artifact_count": 3,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 3,
      "ATC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2024": 1,
        "2020": 1
      },
      "ATC": {},
      "NSDI": {
        "2025": 1,
        "2022": 1
      }
    },
    "artifact_rate": 60.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2022,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 3,
    "papers": [
      {
        "title": "Automatic Reliability Testing For Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Anvil: Verifying Liveness of Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Building Scalable and Flexible Cluster Managers Using Declarative Programming",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "optireduce resilient and tailoptimal allreduce for distributed deep learning in the cloud",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "how to diagnose nanosecond network latencies in rich endhost stacks",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 750,
    "paper_ids": [
      621,
      622,
      3445
    ],
    "papers_without_artifact_ids": [
      3446,
      3447
    ]
  },
  {
    "name": "Weidong Cui",
    "display_name": "Weidong Cui",
    "affiliation": "",
    "artifact_count": 3,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 3,
      "SOSP": 0,
      "ATC": 0,
      "ACSAC": 0,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2023": 2
      },
      "SOSP": {},
      "ATC": {},
      "ACSAC": {},
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 33.3,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VeriSMo: A Verified Security Module for Confidential VMs",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Nimble: Rollback Protection for Confidential Cloud Services",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 751,
    "paper_ids": [
      2056,
      1079,
      3448
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marcos K. Aguilera",
    "display_name": "Marcos K. Aguilera",
    "affiliation": "VMware, Palo Alto, CA, USA",
    "artifact_count": 3,
    "total_papers": 8,
    "total_papers_by_conf": {
      "OSDI": 3,
      "SOSP": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 4
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2020": 2
      },
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2013": 1,
        "2025": 2,
        "2023": 1
      }
    },
    "artifact_rate": 37.5,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "DSig: Breaking the Barrier of Signatures in Data Centers",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AIFM: High-Performance, Application-Integrated Far Memory",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Microsecond Consensus for Microsecond Applications",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "quicksand harnessing stranded datacenter resources with granular computing",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "eden developerfriendly applicationintegrated far memory",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "nu achieving microsecondscale resource fungibility with logical processes",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "limited access the truth behind far memory",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "improving availability in distributed systems with failure informers",
        "conference": "NSDI",
        "year": 2013
      }
    ],
    "author_id": 752,
    "paper_ids": [
      1382,
      2632,
      1383
    ],
    "papers_without_artifact_ids": [
      2635,
      3449,
      2639,
      3450,
      2872
    ]
  },
  {
    "name": "Zhenyuan Ruan",
    "display_name": "Zhenyuan Ruan",
    "affiliation": "Moscow Institute of Thermal Technology",
    "artifact_count": 3,
    "total_papers": 7,
    "total_papers_by_conf": {
      "OSDI": 3,
      "SOSP": 0,
      "ATC": 0,
      "NSDI": 4
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 3
      },
      "SOSP": {},
      "ATC": {},
      "NSDI": {
        "2024": 1,
        "2025": 1,
        "2023": 2
      }
    },
    "artifact_rate": 42.9,
    "repro_rate": 66.7,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 3,
    "badges_functional": 3,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Semeru: A Memory-Disaggregated Managed Runtime",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AIFM: High-Performance, Application-Integrated Far Memory",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Caladan: Mitigating Interference at Microsecond Timescales",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "quicksand harnessing stranded datacenter resources with granular computing",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "harvesting idle memory for applicationmanaged soft state with midas",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "nu achieving microsecondscale resource fungibility with logical processes",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "hermit lowlatency highthroughput and transparent remote memory via feedbackdirected asynchrony",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 753,
    "paper_ids": [
      2611,
      2632,
      2633
    ],
    "papers_without_artifact_ids": [
      2635,
      2638,
      2639,
      2641
    ]
  },
  {
    "name": "Ralf Jung 0002",
    "display_name": "Ralf Jung",
    "affiliation": "ETH Zurich",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2021": 1,
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Grove: a Separation-Logic Library for Verifying Distributed Systems",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "GoJournal: a verified, concurrent, crash-safe journaling system",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "verifying vmvcc a highperformance transaction library using multiversion concurrency control",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 755,
    "paper_ids": [
      979,
      983
    ],
    "papers_without_artifact_ids": [
      986
    ]
  },
  {
    "name": "Young Ik Eom",
    "display_name": "Young Ik Eom",
    "affiliation": "Sungkyunkwan University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 2,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "ATC": {},
      "FAST": {
        "2012": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MEMTIS: Efficient Memory Tiering with Dynamic Page Classification and Page Size Determination",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "FragPicker: A New Defragmentation Tool for Modern Storage Devices",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sfs random write considered harmful in solid state drives",
        "conference": "FAST",
        "year": 2012
      }
    ],
    "author_id": 756,
    "paper_ids": [
      1583,
      3451
    ],
    "papers_without_artifact_ids": [
      1592
    ]
  },
  {
    "name": "Zhuang Wang",
    "display_name": "Zhuang Wang",
    "affiliation": "Department of Computer Science, Rice University, Houston, Texas, United States of America",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GEMINI: Fast Failure Recovery in Distributed Training with In-Memory Checkpoints",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Hi-Speed DNN Training with Espresso: Unleashing the Full Potential of Gradient Compression with Near-Optimal Usage Strategies",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 758,
    "paper_ids": [
      2649,
      2828
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhen Jia 0001",
    "display_name": "Zhen Jia",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "GEMINI: Fast Failure Recovery in Distributed Training with In-Memory Checkpoints",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DynaPipe: Optimizing Multi-task Training through Dynamic Pipelines",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 759,
    "paper_ids": [
      2649,
      2650
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuai Zheng 0004",
    "display_name": "Shuai Zheng",
    "affiliation": "IIT Bombay",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "GEMINI: Fast Failure Recovery in Distributed Training with In-Memory Checkpoints",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DynaPipe: Optimizing Multi-task Training through Dynamic Pipelines",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "distmm accelerating distributed multimodal model training",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 760,
    "paper_ids": [
      2649,
      2650
    ],
    "papers_without_artifact_ids": [
      2651
    ]
  },
  {
    "name": "Zhen Zhang 0063",
    "display_name": "Zhen Zhang",
    "affiliation": "Amazon Web Services, Seattle, WA, USA",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 2,
      "NSDI": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2
      },
      "NSDI": {
        "2024": 1
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "GEMINI: Fast Failure Recovery in Distributed Training with In-Memory Checkpoints",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Oobleck: Resilient Distributed Training of Large Models Using Pipeline Templates",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "distmm accelerating distributed multimodal model training",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "pipeswitch fast pipelined context switching for deep learning applications",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 761,
    "paper_ids": [
      2649,
      993
    ],
    "papers_without_artifact_ids": [
      2651,
      1013
    ]
  },
  {
    "name": "T. S. Eugene Ng",
    "display_name": "T. S. Eugene Ng",
    "affiliation": "Rice University",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 5,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {},
      "NSDI": {
        "2023": 1,
        "2022": 2,
        "2007": 2
      },
      "OSDI": {}
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GEMINI: Fast Failure Recovery in Distributed Training with In-Memory Checkpoints",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Hi-Speed DNN Training with Espresso: Unleashing the Full Potential of Gradient Compression with Near-Optimal Usage Strategies",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "poseidon efficient robust and practical datacenter cc via deployable int",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "closedloop network performance monitoring and diagnosis with spidermon",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "rdc energyefficient data center network congestion relief with topological reconfigurability at the edge",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "saar a shared control plane for overlay multicast",
        "conference": "NSDI",
        "year": 2007
      },
      {
        "title": "tesseract a 4d network control plane",
        "conference": "NSDI",
        "year": 2007
      }
    ],
    "author_id": 762,
    "paper_ids": [
      2649,
      2828
    ],
    "papers_without_artifact_ids": [
      3452,
      704,
      705,
      517,
      3453
    ]
  },
  {
    "name": "Gongqi Huang",
    "display_name": "Gongqi Huang",
    "affiliation": "Johns Hopkins University, Baltimore, MD, USA",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pushing Performance Isolation Boundaries into Application with pBox",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Automated Reasoning and Detection of Specious Configuration in Large Systems with Symbolic Execution",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bridge a leakfree hardwaresoftware architecture for parallel embedded systems",
        "conference": "SOSP",
        "year": 2024
      }
    ],
    "author_id": 763,
    "paper_ids": [
      1921,
      1924
    ],
    "papers_without_artifact_ids": [
      3454
    ]
  },
  {
    "name": "Ziyi Zhang",
    "display_name": "Ziyi Zhang",
    "affiliation": "Department of Computer Science, University of Chicago, Chicago, IL, USA",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "USENIXSEC": {
        "2020": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bagpipe: Accelerating Deep Recommendation Model Training",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "grace lossresilient realtime video through neural codecs",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 764,
    "paper_ids": [
      1304,
      1527
    ],
    "papers_without_artifact_ids": [
      3379
    ]
  },
  {
    "name": "Amy Ousterhout",
    "display_name": "Amy Ousterhout",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1,
      "EUROSYS": 0,
      "NSDI": 5
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2
      },
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {},
      "NSDI": {
        "2017": 1,
        "2019": 1,
        "2025": 2,
        "2022": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Cornflakes: Zero-Copy Serialization for Microsecond-Scale Networking",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Caladan: Mitigating Interference at Microsecond Timescales",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the benefits and limitations of user interrupts for preemptive userspace scheduling",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "eden developerfriendly applicationintegrated far memory",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "limited access the truth behind far memory",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "efficient scheduling policies for microsecondscale tasks",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "shenango achieving high cpu efficiency for latencysensitive datacenter workloads",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "flexplane an experimentation platform for resource management in datacenters",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 766,
    "paper_ids": [
      2652,
      2633
    ],
    "papers_without_artifact_ids": [
      3455,
      3449,
      3450,
      3456,
      2643,
      3457
    ]
  },
  {
    "name": "Zhuohan Li 0001",
    "display_name": "Zhuohan Li",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2022": 1,
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Memory Management for Large Language Model Serving with PagedAttention",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fairness in Serving Large Language Models",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "alpaserve statistical multiplexing with model parallelism for deep learning serving",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "alpa automating inter and intraoperator parallelism for distributed deep learning",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 767,
    "paper_ids": [
      465,
      469
    ],
    "papers_without_artifact_ids": [
      484,
      488
    ]
  },
  {
    "name": "Siyuan Zhuang",
    "display_name": "Siyuan Zhuang",
    "affiliation": "UC Berkeley, Berkeley, USA",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2023": 1
      },
      "ATC": {
        "2024": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Efficient Memory Management for Large Language Model Serving with PagedAttention",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ExoFlow: A Universal Workflow System for Exactly-Once DAGs",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "starburst a costaware scheduler for hybrid cloud",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "skypilot an intercloud broker for sky computing",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 768,
    "paper_ids": [
      465,
      470
    ],
    "papers_without_artifact_ids": [
      476,
      482
    ]
  },
  {
    "name": "Ying Sheng 0007",
    "display_name": "Ying Sheng",
    "affiliation": "Ontario Tech University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Memory Management for Large Language Model Serving with PagedAttention",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fairness in Serving Large Language Models",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "alpaserve statistical multiplexing with model parallelism for deep learning serving",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 769,
    "paper_ids": [
      465,
      469
    ],
    "papers_without_artifact_ids": [
      484
    ]
  },
  {
    "name": "Lianmin Zheng",
    "display_name": "Lianmin Zheng",
    "affiliation": "University of California, Berkeley",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2022": 1,
        "2023": 1,
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Efficient Memory Management for Large Language Model Serving with PagedAttention",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Ansor: Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "alpaserve statistical multiplexing with model parallelism for deep learning serving",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "alpa automating inter and intraoperator parallelism for distributed deep learning",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 770,
    "paper_ids": [
      465,
      472
    ],
    "papers_without_artifact_ids": [
      484,
      488
    ]
  },
  {
    "name": "Cody Hao Yu",
    "display_name": "Cody Hao Yu",
    "affiliation": "University of California, Los Angeles",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Efficient Memory Management for Large Language Model Serving with PagedAttention",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Ansor: Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 771,
    "paper_ids": [
      465,
      472
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hao Zhang 0025",
    "display_name": "Hao Zhang",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 4,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2021": 1,
        "2022": 1,
        "2024": 1,
        "2023": 1
      },
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Efficient Memory Management for Large Language Model Serving with PagedAttention",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pollux: Co-adaptive Cluster Scheduling for Goodput-Optimized Deep Learning",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "distserve disaggregating prefill and decoding for goodputoptimized large language model serving",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "alpaserve statistical multiplexing with model parallelism for deep learning serving",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "alpa automating inter and intraoperator parallelism for distributed deep learning",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 772,
    "paper_ids": [
      465,
      1323
    ],
    "papers_without_artifact_ids": [
      1005,
      484,
      488
    ]
  },
  {
    "name": "Zheng Liu",
    "display_name": "Zheng Liu",
    "affiliation": "Zhejiang University, Hangzhou, CN",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 2,
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "ATC": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Partial Failure Resilient Memory Management System for (CXL-based) Distributed Shared Memory",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TrEnv: Transparently Share Serverless Execution Environments Across Different Functions and Nodes",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hydrarpc rpc in the cxl era",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "diagnosing applicationnetwork anomalies for millions of ips in production clouds",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 773,
    "paper_ids": [
      637,
      639
    ],
    "papers_without_artifact_ids": [
      1934,
      1935
    ]
  },
  {
    "name": "Jinlei Jiang",
    "display_name": "Jinlei Jiang",
    "affiliation": "Tsinghua University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 2,
      "EUROSYS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Partial Failure Resilient Memory Management System for (CXL-based) Distributed Shared Memory",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TrEnv: Transparently Share Serverless Execution Environments Across Different Functions and Nodes",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tea a generalpurpose temporal graph random walk engine",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 379,
    "paper_ids": [
      637,
      639
    ],
    "papers_without_artifact_ids": [
      644
    ]
  },
  {
    "name": "Ping Gong 0009",
    "display_name": "Ping Gong",
    "affiliation": "University of Science and Technology of China",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "gSampler: General and Efficient GPU-based Graph Sampling for Graph Learning",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Gradient Compression Supercharged High-Performance Data Parallel DNN Training",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 774,
    "paper_ids": [
      1601,
      1602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiao Yan 0002",
    "display_name": "Xiao Yan",
    "affiliation": "Macquarie University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "gSampler: General and Efficient GPU-based Graph Sampling for Graph Learning",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DGCL: an efficient communication library for distributed GNN training",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 775,
    "paper_ids": [
      1601,
      2662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Henri Maxime Demoulin",
    "display_name": "Henri Maxime Demoulin",
    "affiliation": "DBOS, inc, Sunnyvale, California, USA",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 2,
      "ACSAC": 1,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "ACSAC": {
        "2018": 1
      },
      "ATC": {},
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "SOSP"
    ],
    "years": [
      2018,
      2023
    ],
    "year_range": "2018-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Paella: Low-latency Model Serving with Software-defined GPU Scheduling",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DeDoS: Defusing DoS with Dispersion Oriented Software",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rajomon decentralized and coordinated overload control for latencysensitive microservices",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "when idling is ideal optimizing taillatency for heavytailed datacenter workloads with perséphone",
        "conference": "SOSP",
        "year": 2021
      }
    ],
    "author_id": 776,
    "paper_ids": [
      1937,
      696
    ],
    "papers_without_artifact_ids": [
      3458,
      3459
    ]
  },
  {
    "name": "Xiaoniu Song",
    "display_name": "Xiaoniu Song",
    "affiliation": "Shanghai Jiao Tong University, Shanghai, China",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "UGACHE: A Unified GPU Cache for Embedding-based Deep Learning",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "GNNLab: a factored system for sample-based GNN training over GPUs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 777,
    "paper_ids": [
      31,
      1316
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yao Yue",
    "display_name": "Yao Yue",
    "affiliation": "Pelikan Foundation, San Francisco, United States of America",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "FAST": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2020": 1
      },
      "FAST": {
        "2023": 1
      },
      "NSDI": {
        "2021": 1,
        "2024": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "FIFO queues are all you need for cache eviction",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "A large scale analysis of hundreds of in-memory cache clusters at Twitter",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sieve is simpler than lru an efficient turnkey eviction algorithm for web caches",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "glcache grouplevel learning for efficient and highperformance caching",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "segcache a memoryefficient and scalable inmemory keyvalue cache for small objects",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 778,
    "paper_ids": [
      1958,
      1959
    ],
    "papers_without_artifact_ids": [
      1960,
      1961,
      1963
    ]
  },
  {
    "name": "Shuotao Xu",
    "display_name": "Shuotao Xu",
    "affiliation": "Microsoft Research, Shanghai, China",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2023": 1
      },
      "FAST": {
        "2016": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SPFresh: Incremental In-Place Update for Billion-Scale Vector Search",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "VBASE: Unifying Online Vector Similarity Search and Relational Queries via Relaxed Monotonicity",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "applicationmanaged flash",
        "conference": "FAST",
        "year": 2016
      }
    ],
    "author_id": 779,
    "paper_ids": [
      145,
      154
    ],
    "papers_without_artifact_ids": [
      2082
    ]
  },
  {
    "name": "Qianxi Zhang",
    "display_name": "Qianxi Zhang",
    "affiliation": "Microsoft Research, Beijing, China",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2023": 1
      },
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SPFresh: Incremental In-Place Update for Billion-Scale Vector Search",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "VBASE: Unifying Online Vector Similarity Search and Relational Queries via Relaxed Monotonicity",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "silod a codesign of caching and scheduling for deep learning clusters",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 780,
    "paper_ids": [
      145,
      154
    ],
    "papers_without_artifact_ids": [
      160
    ]
  },
  {
    "name": "Ziyue Yang",
    "display_name": "Ziyue Yang",
    "affiliation": "Microsoft Research",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SPFresh: Incremental In-Place Update for Billion-Scale Vector Search",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Daredevil: Rescue Your Flash Storage from Inflexible Kernel Storage Stack",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "superbench improving cloud ai infrastructure reliability with proactive validation",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 781,
    "paper_ids": [
      145,
      2778
    ],
    "papers_without_artifact_ids": [
      290
    ]
  },
  {
    "name": "Peng Cheng 0005",
    "display_name": "Peng Cheng",
    "affiliation": "University of Michigan",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 2,
      "EUROSYS": 0,
      "NSDI": 4
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "ATC": {
        "2022": 1,
        "2024": 1
      },
      "EUROSYS": {},
      "NSDI": {
        "2014": 1,
        "2019": 1,
        "2023": 1,
        "2018": 1
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SPFresh: Incremental In-Place Update for Billion-Scale Vector Search",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PilotFish: Harvesting Free Cycles of Cloud Gaming with Deep Learning Training",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "superbench improving cloud ai infrastructure reliability with proactive validation",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "ark gpudriven code execution for distributed deep learning",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "direct universal access making data center resources available to fpga",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "multipath transport for rdma in datacenters",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "catch the whole lot in an action rapid precise packet loss notification in data center",
        "conference": "NSDI",
        "year": 2014
      }
    ],
    "author_id": 782,
    "paper_ids": [
      145,
      149
    ],
    "papers_without_artifact_ids": [
      290,
      3460,
      3461,
      3462,
      3463
    ]
  },
  {
    "name": "Jiazhen Gu",
    "display_name": "Jiazhen Gu",
    "affiliation": "Department of Computer Science and Engineering, The Chinese University of Hong Kong, Hong Kong, Hong Kong",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Ditto: An Elastic and Adaptive Memory-Disaggregated Caching System",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SMART: A High-Performance Adaptive Radix Tree for Disaggregated Memory",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 783,
    "paper_ids": [
      1608,
      1611
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yanyan Jiang 0001",
    "display_name": "Yanyan Jiang",
    "affiliation": "Nanjing University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Validating JIT Compilers via Compilation Space Exploration",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Understanding the Linux Kernel, Visually",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the hitchhikers guide to operating systems",
        "conference": "ATC",
        "year": 2023
      }
    ],
    "author_id": 785,
    "paper_ids": [
      1027,
      3464
    ],
    "papers_without_artifact_ids": [
      3465
    ]
  },
  {
    "name": "Chang Xu 0001",
    "display_name": "Chang Xu",
    "affiliation": "Nanjing University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Validating JIT Compilers via Compilation Space Exploration",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Understanding the Linux Kernel, Visually",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 786,
    "paper_ids": [
      1027,
      3464
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aurick Qiao",
    "display_name": "Aurick Qiao",
    "affiliation": "Petuum, Inc., Boston, USA",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Sia: Heterogeneity-aware, goodput-optimized ML-cluster scheduling",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pollux: Co-adaptive Cluster Scheduling for Goodput-Optimized Deep Learning",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 787,
    "paper_ids": [
      1319,
      1323
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kevin Loughlin",
    "display_name": "Kevin Loughlin",
    "affiliation": "University of Michigan, Ann Arbor, Michigan, United States",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DOLMA: Securing Speculation with the Principle of Transient Non-Observability",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 788,
    "paper_ids": [
      1623,
      1625
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Antoine Kaufmann",
    "display_name": "Antoine Kaufmann",
    "affiliation": "Max Planck Society",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "EUROSYS": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {},
      "NSDI": {
        "2017": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Blueprint: A Toolchain for Highly-Reconfigurable Microservice Applications",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Serving DNNs like Clockwork: Performance Predictability from the Bottom Up",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flextoe flexible tcp offload with finegrained parallelism",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "evaluating the power of flexible packet processing for network resource allocation",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 790,
    "paper_ids": [
      1964,
      1969
    ],
    "papers_without_artifact_ids": [
      1370,
      1372
    ]
  },
  {
    "name": "Chengruidong Zhang",
    "display_name": "Chengruidong Zhang",
    "affiliation": "Microsoft Research, Shanghai, China",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2024": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "PIT: Optimization of Dynamic Sparse Deep Learning Models via Permutation Invariant Transformation",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Parrot: Efficient Serving of LLM-based Applications with Semantic Variable",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "litepred transferable and scalable latency prediction for hardwareaware neural architecture search",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 791,
    "paper_ids": [
      146,
      152
    ],
    "papers_without_artifact_ids": [
      1025
    ]
  },
  {
    "name": "Jian Huang 0006",
    "display_name": "Jian Huang",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 2,
      "SC": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "FAST": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "SC": {
        "2021": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "FAST": {
        "2017": 1
      },
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC",
      "SOSP"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RackBlox: A Software-Defined Rack-Scale Storage System with Network-Storage Co-Design",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pinpointing crash-consistency bugs in the HPC I/O stack: a cross-layer approach",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scaling deep learning computation over the intercore connected intelligence processor with t10",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "blockflex enabling storage harvesting with softwaredefined flash in modern cloud platforms",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "flashblox achieving both performance isolation and uniform lifetime for virtualized ssds",
        "conference": "FAST",
        "year": 2017
      }
    ],
    "author_id": 792,
    "paper_ids": [
      3466,
      3467
    ],
    "papers_without_artifact_ids": [
      1035,
      3468,
      3469
    ]
  },
  {
    "name": "Malte Schwarzkopf",
    "display_name": "Malte Schwarzkopf",
    "affiliation": "Brown University",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 2,
      "EUROSYS": 0,
      "USENIXSEC": 1,
      "NSDI": 4
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2023": 1,
        "2020": 1
      },
      "EUROSYS": {},
      "USENIXSEC": {
        "2025": 1
      },
      "NSDI": {
        "2025": 1,
        "2023": 1,
        "2011": 1,
        "2015": 1
      }
    },
    "artifact_rate": 22.2,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Edna: Disguising and Revealing User Data in Web Applications",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AIFM: High-Performance, Application-Integrated Far Memory",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "quicksand harnessing stranded datacenter resources with granular computing",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "a stakeholderbased framework to highlight tensions when implementing privacy features",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "sesame practical endtoend privacy compliance with policy containers and privacy regions",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "nu achieving microsecondscale resource fungibility with logical processes",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "k9db privacycompliant storage for web applications by construction",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "queues dont matter when you can jump them",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "ciel a universal execution engine for distributed dataflow computing",
        "conference": "NSDI",
        "year": 2011
      }
    ],
    "author_id": 394,
    "paper_ids": [
      1292,
      2632
    ],
    "papers_without_artifact_ids": [
      2635,
      3470,
      3471,
      2639,
      3472,
      3473,
      3474
    ]
  },
  {
    "name": "Yiying Zhang 0005",
    "display_name": "Yiying Zhang",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "FAST": 3,
      "USENIXSEC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2024": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "FAST": {
        "2012": 1,
        "2013": 2
      },
      "USENIXSEC": {},
      "NSDI": {
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Mira: A Program-Behavior-Guided Far Memory System",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DRust: Language-Guided Distributed Shared Memory with Fine Granularity, Full Transparency, and Ultra Efficiency",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enabling portable and highperformance smartnic programs with alkali",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "hermit lowlatency highthroughput and transparent remote memory via feedbackdirected asynchrony",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "getting real lessons in transitioning research simulations into hardware systems",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "warming up storagelevel caches with bonfire",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "deindirection for flashbased ssds with nameless writes",
        "conference": "FAST",
        "year": 2012
      }
    ],
    "author_id": 793,
    "paper_ids": [
      3475,
      2088
    ],
    "papers_without_artifact_ids": [
      2893,
      2641,
      2029,
      2031,
      2032
    ]
  },
  {
    "name": "Vojtech Aschenbrenner",
    "display_name": "Vojtech Aschenbrenner",
    "affiliation": "EPFL",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling High-Performance and Secure Userspace NVM File Systems with the Trio Architecture",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Beating the I/O bottleneck: a case for log-structured virtual disks",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 794,
    "paper_ids": [
      523,
      3476
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tao Lyu 0004",
    "display_name": "Tao Lyu",
    "affiliation": "Shenzhen University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Enabling High-Performance and Secure Userspace NVM File Systems with the Trio Architecture",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Monarch: A Fuzzing Framework for Distributed File Systems",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 795,
    "paper_ids": [
      523,
      1
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dinglan Peng",
    "display_name": "Dinglan Peng",
    "affiliation": "Purdue University, West Lafayette, IN, USA",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Snowcat: Efficient Kernel Concurrency Testing using a Learned Coverage Predictor",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pegasus: Transparent and Unified Kernel-Bypass Networking for Fast Local and Remote Communication",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 796,
    "paper_ids": [
      1973,
      1975
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Deniz Altinbüken",
    "display_name": "Deniz Altinbüken",
    "affiliation": "Google",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Snowcat: Efficient Kernel Concurrency Testing using a Learned Coverage Predictor",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Snowboard: Finding Kernel Concurrency Bugs through Systematic Inter-thread Communication Analysis",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "halp heuristic aided learned preference eviction policy for youtube content delivery network",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 7924,
    "paper_ids": [
      1973,
      1974
    ],
    "papers_without_artifact_ids": [
      3477
    ]
  },
  {
    "name": "Petros Maniatis",
    "display_name": "Petros Maniatis",
    "affiliation": "Google DeepMind, Mountain View, CA, USA",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "SOSP": 2,
      "EUROSYS": 0,
      "ATC": 0,
      "FAST": 2,
      "USENIXSEC": 0,
      "NSDI": 4,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "FAST": {
        "2009": 1,
        "2002": 1
      },
      "USENIXSEC": {},
      "NSDI": {
        "2009": 2,
        "2008": 1,
        "2007": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Snowcat: Efficient Kernel Concurrency Testing using a Learned Coverage Predictor",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Snowboard: Finding Kernel Concurrency Bugs through Systematic Inter-thread Communication Analysis",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tiered fault tolerance for longterm integrity",
        "conference": "FAST",
        "year": 2009
      },
      {
        "title": "zeno eventually consistent byzantinefault tolerance",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "notabot improving service availability in the face of botnet attacks",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "bft protocols under fire",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "friday global comprehension for distributed replay",
        "conference": "NSDI",
        "year": 2007
      },
      {
        "title": "enabling the archival storage of signed documents",
        "conference": "FAST",
        "year": 2002
      }
    ],
    "author_id": 798,
    "paper_ids": [
      1973,
      1974
    ],
    "papers_without_artifact_ids": [
      3478,
      1981,
      3479,
      2827,
      518,
      3480
    ]
  },
  {
    "name": "Kelly Kostopoulou",
    "display_name": "Kelly Kostopoulou",
    "affiliation": "Columbia University, New York, USA",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 2,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Turbo: Effective Caching in Differentially-Private Databases",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Cookie Monster: Efficient On-Device Budgeting for Differentially-Private Ad-Measurement Systems",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dpack efficiencyoriented privacy budget scheduling",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 799,
    "paper_ids": [
      1352,
      1353
    ],
    "papers_without_artifact_ids": [
      1357
    ]
  },
  {
    "name": "Yongle Zhang 0007",
    "display_name": "Yongle Zhang",
    "affiliation": "Purdue University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Understanding and Detecting Software Upgrade Failures in Distributed Systems",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fail through the Cracks: Cross-System Interaction Failures in Modern Cloud Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 800,
    "paper_ids": [
      1630,
      619
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhuqi Jin",
    "display_name": "Zhuqi Jin",
    "affiliation": "University of Toronto",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Understanding and Detecting Software Upgrade Failures in Distributed Systems",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Relational Debugging - Pinpointing Root Causes of Performance Problems",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 801,
    "paper_ids": [
      1630,
      623
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kirk Rodrigues",
    "display_name": "Kirk Rodrigues",
    "affiliation": "University of Toronto",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2021": 1,
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Understanding and Detecting Software Upgrade Failures in Distributed Systems",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CLP: Efficient and Scalable Search on Compressed Text Logs",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "μslope high compression and fast search on semistructured logs",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "hubble performance debugging with inproduction justintime method tracing on android",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 802,
    "paper_ids": [
      1630,
      1633
    ],
    "papers_without_artifact_ids": [
      1634,
      1636
    ]
  },
  {
    "name": "Shan Lu 0001",
    "display_name": "Shan Lu",
    "affiliation": "IIT Bombay",
    "artifact_count": 2,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 4,
      "EUROSYS": 2,
      "ATC": 0,
      "FAST": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1,
        "2024": 1
      },
      "OSDI": {
        "2022": 2,
        "2024": 2
      },
      "EUROSYS": {
        "2025": 1,
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2013": 1,
        "2019": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 18.2,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Understanding and Detecting Software Upgrade Failures in Distributed Systems",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "MemLiner: Lining up Tracing and Application for a Far-Memory-Friendly Runtime",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cacheblend fast large language model serving for rag with cached knowledge fusion",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "exchain exception dependency analysis for root cause diagnosis",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "a tale of two paths toward a hybrid data plane for efficient farmemory applications",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "chameleonapi automatic and efficient customization of neural networks for ml applications",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "if at first you dont succeed try try again insights and llminformed tooling for detecting retry bugs in software systems",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "waffle exposing memory ordering bugs efficiently with active delay injection",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "cancellation in systems an empirical study of task cancellation patterns and failures",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "scalecheck a singlemachine approach for discovering scalability bugs in large distributed systems",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "a study of linux file system evolution",
        "conference": "FAST",
        "year": 2013
      }
    ],
    "author_id": 803,
    "paper_ids": [
      1630,
      2940
    ],
    "papers_without_artifact_ids": [
      3481,
      3482,
      1377,
      3483,
      1970,
      3484,
      3485,
      3486,
      2030
    ]
  },
  {
    "name": "Saurabh Kadekodi",
    "display_name": "Saurabh Kadekodi",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 2,
      "ATC": 1,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1,
        "2024": 1
      },
      "OSDI": {
        "2022": 1,
        "2020": 1
      },
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2023": 1,
        "2019": 1
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "WineFS: a hugepage-aware file system for persistent memory that ages gracefully",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PACEMAKER: Avoiding HeART attacks in storage clusters with disk-adaptive redundancy",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fastcommit resourceefficient performant and costeffective file system journaling",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "morph efficient filelifetime redundancy management for cluster file systems",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "practical design considerations for wide locally recoverable codes lrcs",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "tiger diskadaptive redundancy without placement restrictions",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "cluster storage systems gotta have heart improving storage efficiency by exploiting diskreliability heterogeneity",
        "conference": "FAST",
        "year": 2019
      }
    ],
    "author_id": 804,
    "paper_ids": [
      1320,
      1324
    ],
    "papers_without_artifact_ids": [
      3487,
      1327,
      3488,
      1329,
      1333
    ]
  },
  {
    "name": "Florian Suri-Payer",
    "display_name": "Florian Suri-Payer",
    "affiliation": "Cornell University, Ithaca, US",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 2,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1,
        "2024": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Basil: Breaking up BFT with ACID (transactions)",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Autobahn: Seamless high speed BFT",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shoal high throughput dag bft can be fast and robust",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "morty scaling concurrency control with reexecution",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 805,
    "paper_ids": [
      1990,
      1991
    ],
    "papers_without_artifact_ids": [
      3489,
      1995
    ]
  },
  {
    "name": "Matthew Burke 0001",
    "display_name": "Matthew Burke",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 3,
      "EUROSYS": 1,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 3
      },
      "EUROSYS": {
        "2023": 1
      },
      "NSDI": {
        "2020": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Basil: Breaking up BFT with ACID (transactions)",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Regular Sequential Serializability and Regular Sequential Consistency",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "morty scaling concurrency control with reexecution",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "prism rethinking the rdma interface for distributed systems",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "gryff unifying consensus and shared registers",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 806,
    "paper_ids": [
      1990,
      2741
    ],
    "papers_without_artifact_ids": [
      1995,
      3490,
      2745
    ]
  },
  {
    "name": "Yunhao Zhang",
    "display_name": "Yunhao Zhang",
    "affiliation": "Cornell University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Basil: Breaking up BFT with ACID (transactions)",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Byzantine Ordered Consensus without Byzantine Oligarchy",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 807,
    "paper_ids": [
      1990,
      289
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Divyakant Agrawal",
    "display_name": "Divyakant Agrawal",
    "affiliation": "Univ. of California - Santa Barbara",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "PETS": 1,
      "USENIXSEC": 1,
      "NSDI": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "PETS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2022": 1
      },
      "NSDI": {
        "2024": 1
      },
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "PETS",
      "SOSP"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Coeus: A System for Oblivious Document Ranking and Retrieval",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "QUICKeR: Quicker Updates Involving Continuous Key Rotation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the bedrock of byzantine fault tolerance a unified platform for bft protocols analysis implementation and experimentation",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "quoram a quorumreplicated fault tolerant oram datastore",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "addra metadataprivate voice communication over fully untrusted infrastructure",
        "conference": "OSDI",
        "year": 2021
      }
    ],
    "author_id": 808,
    "paper_ids": [
      3491,
      3492
    ],
    "papers_without_artifact_ids": [
      3493,
      3494,
      3495
    ]
  },
  {
    "name": "Amr El Abbadi",
    "display_name": "Amr El Abbadi",
    "affiliation": "Univ. of California - Santa Barbara",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "PETS": 1,
      "USENIXSEC": 1,
      "NSDI": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "PETS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2022": 1
      },
      "NSDI": {
        "2024": 1
      },
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "PETS",
      "SOSP"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Coeus: A System for Oblivious Document Ranking and Retrieval",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "QUICKeR: Quicker Updates Involving Continuous Key Rotation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the bedrock of byzantine fault tolerance a unified platform for bft protocols analysis implementation and experimentation",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "quoram a quorumreplicated fault tolerant oram datastore",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "addra metadataprivate voice communication over fully untrusted infrastructure",
        "conference": "OSDI",
        "year": 2021
      }
    ],
    "author_id": 809,
    "paper_ids": [
      3491,
      3492
    ],
    "papers_without_artifact_ids": [
      3493,
      3494,
      3495
    ]
  },
  {
    "name": "Trinabh Gupta",
    "display_name": "Trinabh Gupta",
    "affiliation": "Univ. of California - Santa Barbara",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SOSP": 1,
      "PETS": 1,
      "EUROSYS": 0,
      "NSDI": 3,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "PETS": {
        "2024": 1
      },
      "EUROSYS": {},
      "NSDI": {
        "2013": 1,
        "2014": 1,
        "2016": 1
      },
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "PETS",
      "SOSP"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Coeus: A System for Oblivious Document Ranking and Retrieval",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "QUICKeR: Quicker Updates Involving Continuous Key Rotation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "addra metadataprivate voice communication over fully untrusted infrastructure",
        "conference": "OSDI",
        "year": 2021
      },
      {
        "title": "scalable and private media consumption with popcorn",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "bolt data management for connected homes",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "improving availability in distributed systems with failure informers",
        "conference": "NSDI",
        "year": 2013
      }
    ],
    "author_id": 810,
    "paper_ids": [
      3491,
      3492
    ],
    "papers_without_artifact_ids": [
      3495,
      1998,
      3496,
      2872
    ]
  },
  {
    "name": "Feng Yan 0001",
    "display_name": "Feng Yan",
    "affiliation": "University of Houston",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "SC": 2,
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "SC": {
        "2021": 2
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {},
      "FAST": {
        "2020": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "SC",
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Gradient Compression Supercharged High-Performance Data Parallel DNN Training",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Lunule: an agile and judicious metadata load balancer for CephFS",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "noctua towards automated and practical finegrained consistency analysis",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "baash lightweight efficient and reliable blockchainasaservice for hpc systems",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "infinicache exploiting ephemeral serverless functions to build a costeffective memory cache",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 811,
    "paper_ids": [
      1602,
      1603
    ],
    "papers_without_artifact_ids": [
      643,
      3497,
      3498
    ]
  },
  {
    "name": "Ruichuan Chen",
    "display_name": "Ruichuan Chen",
    "affiliation": "Nokia Bell Labs",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 2,
      "ATC": 0,
      "USENIXSEC": 1,
      "NSDI": 3,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2024": 2
      },
      "ATC": {},
      "USENIXSEC": {
        "2024": 1
      },
      "NSDI": {
        "2023": 1,
        "2012": 1,
        "2016": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Gradient Compression Supercharged High-Performance Data Parallel DNN Training",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Dordis: Efficient Federated Learning with Dropout-Resilient Differential Privacy",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "noctua towards automated and practical finegrained consistency analysis",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "lotto secure participant selection against adversarial servers in federated learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "following the data not the function rethinking function orchestration in serverless computing",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "anonrep towards trackingresistant anonymous reputation",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "towards statistical queries over distributed private user data",
        "conference": "NSDI",
        "year": 2012
      }
    ],
    "author_id": 812,
    "paper_ids": [
      1602,
      2800
    ],
    "papers_without_artifact_ids": [
      643,
      2803,
      2804,
      2669,
      3499
    ]
  },
  {
    "name": "Yinlong Xu 0001",
    "display_name": "Yinlong Xu",
    "affiliation": "IISc Bangalore",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "SOSP": 1,
      "SC": 1,
      "EUROSYS": 2,
      "ATC": 0,
      "FAST": 5,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "SC": {
        "2021": 1
      },
      "EUROSYS": {
        "2023": 2
      },
      "ATC": {},
      "FAST": {
        "2024": 1,
        "2021": 1,
        "2026": 1,
        "2023": 1,
        "2022": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 22.2,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "SC",
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Gradient Compression Supercharged High-Performance Data Parallel DNN Training",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Lunule: an agile and judicious metadata load balancer for CephFS",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dmtree towards efficient tree indexing on disaggregated memory via computeside collaborative design",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "minflow highperformance and costefficient data passing for iointensive stateful serverless analytics",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "frozenhot cache rethinking cache management for modern hardware",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "cfs scaling metadata service for distributed file system via pruned scope of critical sections",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "revitalizing the forgotten onchip dma to expedite data movement in nvmbased storage systems",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "depart replica decoupling for distributed keyvalue storage",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "spandb a fast costeffective lsmtree based kv store on hybrid storage",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 227,
    "paper_ids": [
      1602,
      1603
    ],
    "papers_without_artifact_ids": [
      1661,
      3500,
      1026,
      1605,
      1606,
      3501,
      1607
    ]
  },
  {
    "name": "Wook-Hee Kim",
    "display_name": "Wook-Hee Kim",
    "affiliation": "Virginia Tech",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SOSP": 2,
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 2
      },
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {},
      "FAST": {
        "2018": 1,
        "2014": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Witcher: Systematic Crash Consistency Testing for Non-Volatile Memory Key-Value Stores",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PACTree: A High Performance Persistent Range Index Using PAC Guidelines",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tenet memory safe and fault tolerant persistent transactional memory",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "fireworks a fast efficient and safe serverless framework using vmlevel postjit snapshot",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "endurable transient inconsistency in byteaddressable persistent btree",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "resolving journaling of journal anomaly in android io multiversion btree with lazy split",
        "conference": "FAST",
        "year": 2014
      }
    ],
    "author_id": 813,
    "paper_ids": [
      1584,
      524
    ],
    "papers_without_artifact_ids": [
      532,
      1588,
      3502,
      3503
    ]
  },
  {
    "name": "Mohannad Ismail",
    "display_name": "Mohannad Ismail",
    "affiliation": "Virginia Tech",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2024": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Witcher: Systematic Crash Consistency Testing for Non-Volatile Memory Key-Value Stores",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "IntOS: Persistent Embedded Operating System and Language Support for Multi-threaded Intermittent Computing",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tightly seal your sensitive pointers with pactight",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 814,
    "paper_ids": [
      1584,
      3504
    ],
    "papers_without_artifact_ids": [
      1590
    ]
  },
  {
    "name": "Dongyoon Lee",
    "display_name": "Dongyoon Lee",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3,
      "SC": 0,
      "EUROSYS": 0,
      "ATC": 0,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2022": 1,
        "2024": 1,
        "2023": 1
      },
      "SC": {},
      "EUROSYS": {},
      "ATC": {},
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Witcher: Systematic Crash Consistency Testing for Non-Volatile Memory Key-Value Stores",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "IntOS: Persistent Embedded Operating System and Language Support for Multi-threaded Intermittent Computing",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dacapo automatic bootstrapping management for efficient fully homomorphic encryption",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "tailcheck a lightweight heap overflow detection mechanism with page protection and tagged pointers",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "elasm errorlatencyaware scale management for fully homomorphic encryption",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "durinn adversarial memory and thread interleaving for detecting durable linearizability bugs",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 815,
    "paper_ids": [
      1584,
      3504
    ],
    "papers_without_artifact_ids": [
      3505,
      3506,
      3507,
      1589
    ]
  },
  {
    "name": "Yechan Bae",
    "display_name": "Yechan Bae",
    "affiliation": "Georgia Institute of Technology, USA",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "SOSP"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rudra: Finding Memory Safety Bugs in Rust at the Ecosystem Scale",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Spacelord: Private and Secure Smart Space Sharing",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 816,
    "paper_ids": [
      651,
      3508
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Amanda Raybuck",
    "display_name": "Amanda Raybuck",
    "affiliation": "Univ. of California - Davis",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 2
      },
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HeMem: Scalable Tiered Memory Management for Big Data Applications and Real NVM",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "zIO: Accelerating IO-Intensive Applications with Transparent Zero-Copy IO",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the demikernel datapath os architecture for microsecondscale datacenter systems",
        "conference": "SOSP",
        "year": 2021
      }
    ],
    "author_id": 817,
    "paper_ids": [
      1366,
      1368
    ],
    "papers_without_artifact_ids": [
      3509
    ]
  },
  {
    "name": "Wei Zhang",
    "display_name": "Wei Zhang",
    "affiliation": "Microsoft",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "SC": 0,
      "ATC": 0,
      "ACSAC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2022": 1
      },
      "SC": {},
      "ATC": {},
      "ACSAC": {},
      "NSDI": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HeMem: Scalable Tiered Memory Management for Big Data Applications and Real NVM",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "zIO: Accelerating IO-Intensive Applications with Transparent Zero-Copy IO",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "netcastle network infrastructure testing at scale",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "nethint whitebox networking for multitenant data centers",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 818,
    "paper_ids": [
      1366,
      1368
    ],
    "papers_without_artifact_ids": [
      3510,
      486
    ]
  },
  {
    "name": "Jongyul Kim 0001",
    "display_name": "Jongyul Kim",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LineFS: Efficient SmartNIC Offload of a Distributed File System with Pipeline Parallelism",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Assise: Performance and Availability via Client-local NVM in a Distributed File System",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 403,
    "paper_ids": [
      344,
      352
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Waleed Reda",
    "display_name": "Waleed Reda",
    "affiliation": "KTH Royal Institute of Technology, Université catholique de Louvain",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "EUROSYS": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {},
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LineFS: Efficient SmartNIC Offload of a Distributed File System with Pipeline Parallelism",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Assise: Performance and Availability via Client-local NVM in a Distributed File System",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rdma is turing complete we just did not know it yet",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 821,
    "paper_ids": [
      344,
      352
    ],
    "papers_without_artifact_ids": [
      1371
    ]
  },
  {
    "name": "Dejan Kostic",
    "display_name": "Dejan Kostic",
    "affiliation": "KTH Royal Inst. of Technology",
    "artifact_count": 2,
    "total_papers": 12,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "EUROSYS": 2,
      "ATC": 0,
      "NSDI": 8
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2024": 2
      },
      "ATC": {},
      "NSDI": {
        "2009": 1,
        "2023": 1,
        "2012": 1,
        "2020": 1,
        "2022": 2,
        "2004": 1,
        "2018": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LineFS: Efficient SmartNIC Offload of a Distributed File System with Pipeline Parallelism",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Assise: Performance and Availability via Client-local NVM in a Distributed File System",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "toward gpucentric networking on commodity hardware",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "deploying stateful network functions efficiently using large language models",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "a highspeed stateful packet processing approach for tbps programmable switches",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "packet order matters improving application performance by deliberately delaying packets",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "rdma is turing complete we just did not know it yet",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "a highspeed loadbalancer design with guaranteed perconnectionconsistency",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "metron nfv service chains at the true speed of the underlying hardware",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "a nice way to test openflow applications",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "crystalball predicting and preventing inconsistencies in deployed distributed systems",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "macedon methodology for automatically creating evaluating and designing overlay networks",
        "conference": "NSDI",
        "year": 2004
      }
    ],
    "author_id": 822,
    "paper_ids": [
      344,
      352
    ],
    "papers_without_artifact_ids": [
      3511,
      3512,
      3513,
      3514,
      1371,
      3515,
      3516,
      1657,
      3517,
      3518
    ]
  },
  {
    "name": "Zhe Yang 0012",
    "display_name": "Zhe Yang",
    "affiliation": "Tsinghua University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 1,
      "EUROSYS": 1,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "FAST": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Crash Consistent Non-Volatile Memory Express",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AlNiCo: SmartNIC-accelerated Contention-aware Request Scheduling for Transaction Processing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "term extending rdmaattached memory with ssd",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "rio orderpreserving and cpuefficient remote storage access",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "λio a unified io stack for computational storage",
        "conference": "FAST",
        "year": 2023
      }
    ],
    "author_id": 404,
    "paper_ids": [
      1036,
      1037
    ],
    "papers_without_artifact_ids": [
      1056,
      1058,
      1061
    ]
  },
  {
    "name": "Yupeng Tang",
    "display_name": "Yupeng Tang",
    "affiliation": "Yale",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 2,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2024": 1,
        "2022": 1
      },
      "NSDI": {
        "2021": 1,
        "2023": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "MIND: In-Network Memory Management for Disaggregated Data Centers",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Jiffy: elastic far-memory for stateful serverless analytics",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploring performance and cost optimization with asicbased cxl memory",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "shepherd serving dnns in the wild",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "caerus nimble task scheduling for serverless analytics",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 827,
    "paper_ids": [
      2702,
      466
    ],
    "papers_without_artifact_ids": [
      3519,
      480,
      492
    ]
  },
  {
    "name": "Lin Zhong 0001",
    "display_name": "Lin Zhong",
    "affiliation": "Yale University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 3,
      "OSDI": 1,
      "EUROSYS": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2,
        "2021": 1
      },
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "MIND: In-Network Memory Management for Disaggregated Data Centers",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Theseus: an Experiment in Operating System Structure and State Management",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "blindfold confidential memory management by untrusted operating system",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "leveraging rust for lightweight os correctness",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "panic recovery in rustbased embedded systems",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 828,
    "paper_ids": [
      2702,
      3520
    ],
    "papers_without_artifact_ids": [
      3521,
      3522,
      3523
    ]
  },
  {
    "name": "Ji Qi 0002",
    "display_name": "Ji Qi",
    "affiliation": "University of Rochester",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SOTER: Guarding Black-box Inference for General Neural Networks at the Edge",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 829,
    "paper_ids": [
      1658,
      770
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tianxiang Shen",
    "display_name": "Tianxiang Shen",
    "affiliation": "The University of Hong Kong",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SOTER: Guarding Black-box Inference for General Neural Networks at the Edge",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 830,
    "paper_ids": [
      1658,
      770
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gong Zhang 0001",
    "display_name": "Gong Zhang",
    "affiliation": "IIIT Bangalore",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 2,
      "SC": 0,
      "FAST": 2,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2021": 1
      },
      "SC": {},
      "FAST": {
        "2026": 1,
        "2025": 1
      },
      "NSDI": {
        "2021": 1,
        "2024": 1
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Achieving low tail-latency and high scalability for serializable transactions in edge computing",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rosenbridge a framework for enabling express io paths across the virtualization boundary",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "atlas towards realtime verification in largescale networks via a native distributed architecture",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "geminifs a companion file system for gpus",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "autosketch automatic sketchoriented compiler for querydriven network telemetry",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "toward nearlyzeroerror sketching via compressive sensing",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 831,
    "paper_ids": [
      1658,
      1604
    ],
    "papers_without_artifact_ids": [
      1047,
      3524,
      3525,
      3526,
      3527
    ]
  },
  {
    "name": "Angela Demke Brown",
    "display_name": "Angela Demke Brown",
    "affiliation": "University of Toronto",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 3,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2012": 1,
        "2018": 1,
        "2014": 1
      },
      "NSDI": {
        "2009": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Caracal: Contention Management with Deterministic Concurrency Control",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Integrating Non-Volatile Main Memory in a Deterministic Database",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "spiffy enabling filesystem aware storage applications",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "checking the integrity of transactional mechanisms",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "recon verifying file system consistency at runtime",
        "conference": "FAST",
        "year": 2012
      },
      {
        "title": "bunker a privacyoriented platform for network tracing",
        "conference": "NSDI",
        "year": 2009
      }
    ],
    "author_id": 832,
    "paper_ids": [
      2719,
      2720
    ],
    "papers_without_artifact_ids": [
      2724,
      2725,
      2726,
      3528
    ]
  },
  {
    "name": "Vivian Fang",
    "display_name": "Vivian Fang",
    "affiliation": "UC Berkeley",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Secret Key Recovery in a Global-Scale End-to-End Encryption System",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 833,
    "paper_ids": [
      668,
      673
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Runhuai Li",
    "display_name": "Runhuai Li",
    "affiliation": "Zhejiang University, Microsoft Research",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Forerunner: Constraint-based Speculative Transaction Execution for Ethereum",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SlimArchive: A Lightweight Architecture for Ethereum Archive Nodes",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 834,
    "paper_ids": [
      287,
      685
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Edo Roth",
    "display_name": "Edo Roth",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Mycelium: Large-Scale Distributed Graph Queries with Differential Privacy",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Orchard: Differentially Private Analytics at Scale",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "arboretum a planner for largescale federated analytics with differential privacy",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "rebound defending distributed systems against attacks with boundedtime recovery",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 835,
    "paper_ids": [
      1074,
      2727
    ],
    "papers_without_artifact_ids": [
      2729,
      2730
    ]
  },
  {
    "name": "Yiping Ma 0001",
    "display_name": "Yiping Ma",
    "affiliation": "IISc Bangalore",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "USENIXSEC": {
        "2022": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Mycelium: Large-Scale Distributed Graph Queries with Differential Privacy",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Incremental Offline/Online PIR",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "addax a fast private and accountable ad exchange infrastructure",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 836,
    "paper_ids": [
      1074,
      1077
    ],
    "papers_without_artifact_ids": [
      1083
    ]
  },
  {
    "name": "Ke Zhong",
    "display_name": "Ke Zhong",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 1,
      "ACSAC": 1,
      "NSDI": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "USENIXSEC": {
        "2022": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "NSDI": {
        "2023": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Mycelium: Large-Scale Distributed Graph Queries with Differential Privacy",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Incremental Offline/Online PIR",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oryx private detection of cycles in federated graphs",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "addax a fast private and accountable ad exchange infrastructure",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "towards practical applicationlevel support for privilege separation",
        "conference": "ACSAC",
        "year": 2022
      }
    ],
    "author_id": 837,
    "paper_ids": [
      1074,
      1077
    ],
    "papers_without_artifact_ids": [
      1081,
      1083,
      3529
    ]
  },
  {
    "name": "Kuo-Feng Hsu",
    "display_name": "Kuo-Feng Hsu",
    "affiliation": "Rice University, Houston, TX, USA",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "USENIXSEC": {
        "2022": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "NSDI": {
        "2020": 1,
        "2022": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated SmartNIC Offloading Insights for Network Functions",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Bedrock: Programmable Network Support for Secure RDMA Systems",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "occam a programming system for reliable network management",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "runtime programmable switches",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "contra a programmable system for performanceaware routing",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 838,
    "paper_ids": [
      693,
      700
    ],
    "papers_without_artifact_ids": [
      702,
      706,
      709
    ]
  },
  {
    "name": "Zhipeng Jia",
    "display_name": "Zhipeng Jia",
    "affiliation": "Google LLC, Seattle, Washington, United States",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 2,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1,
        "2024": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Boki: Stateful Serverless Computing with Shared Logs",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Impeller: Stream Processing on Shared Logs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lupin tolerating partial failures in a cxl pod",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "telekine secure computing with cloud gpus",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 839,
    "paper_ids": [
      2051,
      2052
    ],
    "papers_without_artifact_ids": [
      2053,
      2054
    ]
  },
  {
    "name": "Jing Liu 0074",
    "display_name": "Jing Liu",
    "affiliation": "Microsoft Research",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "FAST": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "FAST": {
        "2024": 1,
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Scale and Performance in a Filesystem Semi-Microkernel",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Revealing the Unstable Foundations of eBPF-Based Kernel Extensions",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fast transparent filesystem microkernel recovery with ananke",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "symbiosis the art of application and kernel cache cooperation",
        "conference": "FAST",
        "year": 2024
      }
    ],
    "author_id": 414,
    "paper_ids": [
      2008,
      2009
    ],
    "papers_without_artifact_ids": [
      2013,
      2015
    ]
  },
  {
    "name": "Yifan Dai",
    "display_name": "Yifan Dai",
    "affiliation": "University of Wisconsin-Madison",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2020": 1
      },
      "FAST": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Scale and Performance in a Filesystem Semi-Microkernel",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "From WiscKey to Bourbon: A Learned Index for Log-Structured Merge Trees",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fast transparent filesystem microkernel recovery with ananke",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "symbiosis the art of application and kernel cache cooperation",
        "conference": "FAST",
        "year": 2024
      }
    ],
    "author_id": 415,
    "paper_ids": [
      2008,
      1640
    ],
    "papers_without_artifact_ids": [
      2013,
      2015
    ]
  },
  {
    "name": "Yu Jiang 0001",
    "display_name": "Yu Jiang",
    "affiliation": "Tsinghua University",
    "artifact_count": 2,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 3,
      "EUROSYS": 3,
      "ATC": 2,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "EUROSYS": {
        "2025": 2,
        "2024": 1
      },
      "ATC": {
        "2022": 1,
        "2024": 1
      },
      "NDSS": {
        "2024": 2
      }
    },
    "artifact_rate": 18.2,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HEALER: Relation Learning Guided Kernel Fuzzing",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Finding Metadata Inconsistencies in Distributed File Systems via Cross-Node Operation Modeling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "themis finding imbalance failures in distributed file systems via a load variance model",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "understanding and detecting sql function bugs using simple boundary arguments to trigger hundreds of dbms bugs",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "wingfuzz implementing continuous fuzzing for dbmss",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "finding correctness bugs in ebpf verifier with structured and sanitized program",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "automatic policy synthesis and enforcement for protecting untrusted deserialization",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "dynpre protocol reverse engineering via dynamic inference",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "data coverage for guided fuzzing",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "bleem packet sequence oriented fuzzing for protocol implementations",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "ksg augmenting kernel fuzzing with system call specification generation",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 841,
    "paper_ids": [
      2737,
      2738
    ],
    "papers_without_artifact_ids": [
      3530,
      3531,
      3532,
      2739,
      3533,
      3534,
      3535,
      3297,
      2740
    ]
  },
  {
    "name": "Ting Chen 0002",
    "display_name": "Ting Chen",
    "affiliation": "UESTC",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 2,
      "FAST": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "FAST": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HEALER: Relation Learning Guided Kernel Fuzzing",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "maat analyzing and optimizing overcharge on blockchain storage",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "bleem packet sequence oriented fuzzing for protocol implementations",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 842,
    "paper_ids": [
      2737,
      774
    ],
    "papers_without_artifact_ids": [
      775,
      3297
    ]
  },
  {
    "name": "Deepak Narayanan",
    "display_name": "Deepak Narayanan",
    "affiliation": "Stanford University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 2,
      "SC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2023": 1,
        "2020": 1
      },
      "SC": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Solving Large-Scale Granular Resource Allocation Problems Efficiently with POP",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Heterogeneity-Aware Cluster Scheduling Policies for Deep Learning Workloads",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "kerveros efficient and scalable cloud admission control",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "efficient largescale language model training on gpu clusters using megatronlm",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 843,
    "paper_ids": [
      2653,
      2654
    ],
    "papers_without_artifact_ids": [
      2889,
      2658
    ]
  },
  {
    "name": "Fiodar Kazhamiaka",
    "display_name": "Fiodar Kazhamiaka",
    "affiliation": "Stanford University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2020": 1
      },
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Solving Large-Scale Granular Resource Allocation Problems Efficiently with POP",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Heterogeneity-Aware Cluster Scheduling Policies for Deep Learning Workloads",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dataparallel actors a programming model for scalable query serving systems",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 844,
    "paper_ids": [
      2653,
      2654
    ],
    "papers_without_artifact_ids": [
      2656
    ]
  },
  {
    "name": "Amit Levy 0001",
    "display_name": "Amit Levy",
    "affiliation": "University of Kentucky",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 3,
      "ATC": 1,
      "ACSAC": 0,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1,
        "2024": 1
      },
      "ATC": {
        "2022": 1
      },
      "ACSAC": {},
      "NSDI": {
        "2023": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Regular Sequential Serializability and Regular Sequential Consistency",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Speculative Recovery: Cheap, Highly Available Fault Tolerance with Disaggregated Storage",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bridge a leakfree hardwaresoftware architecture for parallel embedded systems",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "doing more with less orchestrating serverless applications without an orchestrator",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "encapsulated functions fortifying rusts ffi in embedded systems",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 417,
    "paper_ids": [
      2741,
      2742
    ],
    "papers_without_artifact_ids": [
      3454,
      3536,
      3537
    ]
  },
  {
    "name": "Patrick Tser Jern Kon",
    "display_name": "Patrick Tser Jern Kon",
    "affiliation": "University of Michigan, Ann Arbor, US",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unearthing Semantic Checks for Cloud Infrastructure-as-Code Programs",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SpotProxy: Rediscovering the Cloud for Censorship Circumvention",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 845,
    "paper_ids": [
      694,
      698
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ryan Beckett",
    "display_name": "Ryan Beckett",
    "affiliation": "Microsoft, Redmond, US",
    "artifact_count": 2,
    "total_papers": 14,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "ATC": 1,
      "NSDI": 11
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2020": 1
      },
      "ATC": {
        "2024": 1
      },
      "NSDI": {
        "2024": 3,
        "2025": 1,
        "2023": 3,
        "2020": 2,
        "2022": 2
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unearthing Semantic Checks for Cloud Infrastructure-as-Code Programs",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Aragog: Scalable Runtime Verification of Shardable Networked Systems",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "efficient multiwan transport for 5g with otter",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "kivi verification for cluster management",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "messi behavioral testing of bgp implementations",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "sequence abstractions for flexible linerate network monitoring",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "finding adversarial inputs for heuristics using multilevel optimization",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "test coverage for network configurations",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "synthesizing runtime programmable switch updates",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "formal methods for network performance analysis",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "scale automatically finding rfc compliance bugs in dns nameservers",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "katra realtime verification for multilayer networks",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "contra a programmable system for performanceaware routing",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "finding network misconfigurations by automatic template inference",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 846,
    "paper_ids": [
      694,
      1939
    ],
    "papers_without_artifact_ids": [
      3538,
      3539,
      3540,
      3541,
      3542,
      3543,
      703,
      2757,
      3544,
      3545,
      709,
      3546
    ]
  },
  {
    "name": "Clément Burgelin",
    "display_name": "Clément Burgelin",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SWARM: Replicating Shared Disaggregated-Memory Data in No Time",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DSig: Breaking the Barrier of Signatures in Data Centers",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7925,
    "paper_ids": [
      1378,
      1382
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kumar Kartikeya Dwivedi",
    "display_name": "Kumar Kartikeya Dwivedi",
    "affiliation": "EPFL, Lausanne, Switzerland",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Fast, Flexible, and Practical Kernel Extensions",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Ship your Critical Section, Not Your Data: Enabling Transparent Delegation with TCLOCKS",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 848,
    "paper_ids": [
      525,
      530
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bingyang Wu",
    "display_name": "Bingyang Wu",
    "affiliation": "School of Computer Science, Peking University, Beijing, China",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1
      },
      "NSDI": {
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "LoongServe: Efficiently Serving Long-Context Large Language Models with Elastic Sequence Parallelism",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "dLoRA: Dynamically Orchestrating Requests and Adapters for LoRA LLM Serving",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "optimizing rlhf training for large language models with stage fusion",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "transparent gpu sharing in container clouds for deep learning workloads",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 849,
    "paper_ids": [
      995,
      997
    ],
    "papers_without_artifact_ids": [
      999,
      1007
    ]
  },
  {
    "name": "Xuhao Luo",
    "display_name": "Xuhao Luo",
    "affiliation": "University of Illinois Urbana-Champaign, Urbana, US",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ATC": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2022": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LazyLog: A New Shared Log Abstraction for Low-Latency Applications",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SplitFT: Fault Tolerance for Disaggregated Datacenters via Remote Memory Logging",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "depfast orchestrating code of quorum systems",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 422,
    "paper_ids": [
      1638,
      1639
    ],
    "papers_without_artifact_ids": [
      628
    ]
  },
  {
    "name": "Kaushik Rajan",
    "display_name": "Kaushik Rajan",
    "affiliation": "IIIT Hyderabad",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2020": 1
      },
      "FAST": {
        "2019": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SilvanForge: A Schedule-Guided Retargetable Compiler for Decision Tree Inference",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Generalized Sub-Query Fusion for Eliminating Redundant I/O from Big-Data Queries",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "instalytics cluster filesystem codesign for bigdata analytics",
        "conference": "FAST",
        "year": 2019
      }
    ],
    "author_id": 854,
    "paper_ids": [
      3547,
      3548
    ],
    "papers_without_artifact_ids": [
      3549
    ]
  },
  {
    "name": "Midhul Vuppalapati",
    "display_name": "Midhul Vuppalapati",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3,
      "FAST": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2021": 1,
        "2022": 1,
        "2023": 1
      },
      "FAST": {
        "2019": 1
      },
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Tiered Memory Management: Access Latency is the Key!",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rearchitecting Linux Storage Stack for µs Latency and High Throughput",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "karma resource allocation for dynamic demands",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "shortstack distributed faulttolerant oblivious data access",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "building an elastic query engine on disaggregated storage",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "instalytics cluster filesystem codesign for bigdata analytics",
        "conference": "FAST",
        "year": 2019
      }
    ],
    "author_id": 2061,
    "paper_ids": [
      2752,
      1367
    ],
    "papers_without_artifact_ids": [
      1359,
      2706,
      2760,
      3549
    ]
  },
  {
    "name": "Insik Shin",
    "display_name": "Insik Shin",
    "affiliation": "KAIST",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 2,
      "EUROSYS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "USENIXSEC": {
        "2022": 1,
        "2021": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OZZ: Identifying Kernel Out-of-Order Concurrency Bugs with In-Vivo Memory Access Reordering",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diagnosing kernel concurrency failures with aitia",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "adcube webvr ad fraud and practical confinement of thirdparty ads",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 856,
    "paper_ids": [
      345,
      2274
    ],
    "papers_without_artifact_ids": [
      355,
      1719
    ]
  },
  {
    "name": "Lazar Cvetkovic",
    "display_name": "Lazar Cvetkovic",
    "affiliation": "ETH Zurich, Zurich, Switzerland",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 3,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2,
        "2024": 1
      },
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Dirigent: Lightweight Serverless Orchestration",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PaSh: light-touch data-parallel shell processing",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding the neglected cost of serverless cluster management",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "enabling invitro serverless systems research",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 857,
    "paper_ids": [
      1663,
      3550
    ],
    "papers_without_artifact_ids": [
      1671,
      1672
    ]
  },
  {
    "name": "Yong-Hao Zou",
    "display_name": "Yong-Hao Zou",
    "affiliation": "EPFL, Lausanne, Vaud, CH",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NDSS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "NDSS",
      "SOSP"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Verification of System-Software Components Written in Standard C",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 858,
    "paper_ids": [
      646,
      648
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiazhen Lin",
    "display_name": "Jiazhen Lin",
    "affiliation": "Tsinghua University, Beijing, China",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 1,
      "SC": 0,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "ATC": {
        "2022": 1
      },
      "SC": {},
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Fast Core Scheduling with Userspace Process Abstraction",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AlNiCo: SmartNIC-accelerated Contention-aware Request Scheduling for Transaction Processing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fleche an efficient gpu embedding cache for personalized recommendations",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 859,
    "paper_ids": [
      1373,
      1037
    ],
    "papers_without_artifact_ids": [
      1067
    ]
  },
  {
    "name": "Luoxi Meng",
    "display_name": "Luoxi Meng",
    "affiliation": "University of California, San Diego, San Diego, CA, United States",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "SOSP",
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Reducing Energy Bloat in Large Model Training",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Stateful Least Privilege Authorization for the Cloud",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 861,
    "paper_ids": [
      1946,
      3196
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shushu Yi",
    "display_name": "Shushu Yi",
    "affiliation": "Peking University, Beijing, China",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2026": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BIZA: Design of Self-Governing Block-Interface ZNS AFA for Endurance and Performance",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ScalaAFA: Constructing User-Space All-Flash Array Engine with Holistic Designs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "xerxes extensive exploration of scalable hardware systems with cxlbased simulation framework",
        "conference": "FAST",
        "year": 2026
      }
    ],
    "author_id": 862,
    "paper_ids": [
      2773,
      2779
    ],
    "papers_without_artifact_ids": [
      649
    ]
  },
  {
    "name": "Qiao Li 0001",
    "display_name": "Qiao Li",
    "affiliation": "Xiamen University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 2,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "ATC": {
        "2024": 2
      },
      "FAST": {
        "2016": 1,
        "2026": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BIZA: Design of Self-Governing Block-Interface ZNS AFA for Endurance and Performance",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ScalaAFA: Constructing User-Space All-Flash Array Engine with Holistic Designs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "xerxes extensive exploration of scalable hardware systems with cxlbased simulation framework",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "scalacache scalable userspace page cache management with softwarehardware coordination",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "access characteristic guided read and write cost regulation for performance improvement on flash memory",
        "conference": "FAST",
        "year": 2016
      }
    ],
    "author_id": 863,
    "paper_ids": [
      2773,
      2779
    ],
    "papers_without_artifact_ids": [
      649,
      2781,
      3551
    ]
  },
  {
    "name": "Myoungsoo Jung",
    "display_name": "Myoungsoo Jung",
    "affiliation": "KAIST",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 4,
      "SC": 0,
      "EUROSYS": 0,
      "FAST": 4,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "ATC": {
        "2022": 2,
        "2024": 1,
        "2023": 1
      },
      "SC": {},
      "EUROSYS": {},
      "FAST": {
        "2020": 2,
        "2018": 1,
        "2022": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 22.2,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BIZA: Design of Self-Governing Block-Interface ZNS AFA for Endurance and Performance",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ScalaAFA: Constructing User-Space All-Flash Array Engine with Holistic Designs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cxlanns softwarehardware collaborative memory disaggregation and computation for billionscale approximate nearest neighbor search",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "vigilkv hardwaresoftware codesign to integrate strong latency determinism into logstructured merge keyvalue stores",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "direct access highperformance memory disaggregation with directcxl",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "hardwaresoftware coprogrammable framework for computational ssds to accelerate deep learning service on largescale graphs",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "scalable parallel flash firmware for manycore architectures",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "dcstore eliminating noisy neighbor containers using deterministic io performance and resource isolation",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "pen design and evaluation of partialerase for 3d nandbased high density ssds",
        "conference": "FAST",
        "year": 2018
      }
    ],
    "author_id": 864,
    "paper_ids": [
      2773,
      2779
    ],
    "papers_without_artifact_ids": [
      3552,
      3553,
      3554,
      3555,
      2782,
      3556,
      3557
    ]
  },
  {
    "name": "Ke Zhou 0001",
    "display_name": "Ke Zhou",
    "affiliation": "HUST",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "SC": {},
      "ATC": {},
      "FAST": {
        "2026": 1,
        "2007": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BIZA: Design of Self-Governing Block-Interface ZNS AFA for Endurance and Performance",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "FLOWS: Balanced MRC Profiling for Heterogeneous Object-Size Cache",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "xerxes extensive exploration of scalable hardware systems with cxlbased simulation framework",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "pro a popularitybased multithreaded reconstruction optimization for raidstructured storage systems",
        "conference": "FAST",
        "year": 2007
      }
    ],
    "author_id": 865,
    "paper_ids": [
      2773,
      2103
    ],
    "papers_without_artifact_ids": [
      649,
      2115
    ]
  },
  {
    "name": "Yuekai Jia",
    "display_name": "Yuekai Jia",
    "affiliation": "Tsinghua University, Beijing, China",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Skyloft: A General High-Efficient Scheduling Framework in User Space",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "HyperEnclave: An Open and Cross-platform Trusted Execution Environment",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 866,
    "paper_ids": [
      640,
      2929
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu Chen 0004",
    "display_name": "Yu Chen",
    "affiliation": "University of South Florida",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 1,
      "USENIXSEC": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "ATC": {
        "2022": 1
      },
      "USENIXSEC": {},
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Skyloft: A General High-Efficient Scheduling Framework in User Space",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "HyperEnclave: An Open and Cross-platform Trusted Execution Environment",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 867,
    "paper_ids": [
      640,
      2929
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xin Wang 0002",
    "display_name": "Xin Wang",
    "affiliation": "Fudan University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2023": 1
      },
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "CHIME: A Cache-Efficient and High-Performance Hybrid Index on Disaggregated Memory",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SMART: A High-Performance Adaptive Radix Tree for Disaggregated Memory",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flexhttp an intelligent and scalable http version selection system",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 868,
    "paper_ids": [
      1609,
      1611
    ],
    "papers_without_artifact_ids": [
      3558
    ]
  },
  {
    "name": "Marcel Wagenländer",
    "display_name": "Marcel Wagenländer",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tenplex: Dynamic Parallelism for Deep Learning using Parallelizable Tensor Collections",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "KungFu: Making Training in Distributed Machine Learning Adaptive",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7926,
    "paper_ids": [
      1385,
      1390
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bo Zhao 0019",
    "display_name": "Bo Zhao",
    "affiliation": "Aalto University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tenplex: Dynamic Parallelism for Deep Learning using Parallelizable Tensor Collections",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "MSRL: Distributed Reinforcement Learning with Dataflow Fragments",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 870,
    "paper_ids": [
      1385,
      1388
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Luo Mai",
    "display_name": "Luo Mai",
    "affiliation": "University of Edinburgh",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 3,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2022": 1,
        "2024": 1,
        "2020": 1
      },
      "ATC": {},
      "NSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tenplex: Dynamic Parallelism for Deep Learning using Parallelizable Tensor Collections",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "KungFu: Making Training in Distributed Machine Learning Adaptive",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "serverlessllm lowlatency serverless inference for large language models",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "ekko a largescale deep learning recommender system with lowlatency model update",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "move fast and meet deadlines finegrained realtime stream processing with cameo",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 871,
    "paper_ids": [
      1385,
      1390
    ],
    "papers_without_artifact_ids": [
      3559,
      3560,
      1312
    ]
  },
  {
    "name": "Junliang Hu",
    "display_name": "Junliang Hu",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Aceso: Achieving Efficient Fault Tolerance in Memory-Disaggregated Key-Value Stores",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SEPH: Scalable, Efficient, and Predictable Hashing on Persistent Memory",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 873,
    "paper_ids": [
      1610,
      2774
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hayley LeBlanc",
    "display_name": "Hayley LeBlanc",
    "affiliation": "University of Texas at Austin, Austin, TX, US",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1
      },
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Verus: A Practical Foundation for Systems Verification",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SquirrelFS: using the Rust compiler to check file-system crash consistency",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "chipmunk investigating crashconsistency in persistentmemory file systems",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 427,
    "paper_ids": [
      715,
      2685
    ],
    "papers_without_artifact_ids": [
      2686
    ]
  },
  {
    "name": "Oded Padon",
    "display_name": "Oded Padon",
    "affiliation": "Weizmann Institute of Science, Rehovot, Israel",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Verus: A Practical Foundation for Systems Verification",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Anvil: Verifying Liveness of Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 429,
    "paper_ids": [
      715,
      622
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muhammad Shahbaz 0001",
    "display_name": "Muhammad Shahbaz",
    "affiliation": "University of Michigan",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2024": 1
      },
      "SOSP": {
        "2024": 1
      },
      "NSDI": {
        "2025": 1,
        "2015": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Caravan: Practical Online Learning of In-Network ML Models with Labeling Agents",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "The nanoPU: A Nanosecond Network Stack for Datacenters",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "optireduce resilient and tailoptimal allreduce for distributed deep learning in the cloud",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "kinetic verifiable dynamic network control",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 875,
    "paper_ids": [
      3561,
      3562
    ],
    "papers_without_artifact_ids": [
      3446,
      3383
    ]
  },
  {
    "name": "Kun Li 0016",
    "display_name": "Kun Li",
    "affiliation": "Microsoft Research",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Reducing redundancy in data organization and arithmetic calculation for stencil computations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Temporal vectorization for stencils",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 876,
    "paper_ids": [
      3563,
      3564
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Liang Yuan",
    "display_name": "Liang Yuan",
    "affiliation": "Chinese Academy of Sciences, Beijing, China",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 2,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Reducing redundancy in data organization and arithmetic calculation for stencil computations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Temporal vectorization for stencils",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hourglass enabling efficient split federated learning with data parallelism",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 877,
    "paper_ids": [
      3563,
      3564
    ],
    "papers_without_artifact_ids": [
      1099
    ]
  },
  {
    "name": "Yunquan Zhang",
    "display_name": "Yunquan Zhang",
    "affiliation": "Chinese Academy of Sciences",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SC": 5
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 5
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Reducing redundancy in data organization and arithmetic calculation for stencil computations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Temporal vectorization for stencils",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "accelerating allelectron",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "tensorkmc kinetic monte carlo simulation of 50 trillion atoms driven by deep learning on a new generation of sunway supercomputer",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "extremescale",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 878,
    "paper_ids": [
      3563,
      3564
    ],
    "papers_without_artifact_ids": [
      3565,
      3566,
      3567
    ]
  },
  {
    "name": "Yue Yue",
    "display_name": "Yue Yue",
    "affiliation": "University of Chinese Academy of Sciences, Beijing, China",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Reducing redundancy in data organization and arithmetic calculation for stencil computations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Temporal vectorization for stencils",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 879,
    "paper_ids": [
      3563,
      3564
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Bader",
    "display_name": "Michael Bader",
    "affiliation": "TU Munich",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "3D acoustic-elastic coupling with gravity: the dynamics of the 2018 palu, sulawesi earthquake and tsunami",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "High performance uncertainty quantification with parallelized multilevel Markov chain Monte Carlo",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 880,
    "paper_ids": [
      3568,
      3569
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhaodong Chen 0001",
    "display_name": "Zhaodong Chen",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Efficient tensor core-based GPU kernels for structured sparsity under reduced precision",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Faith: An Efficient Framework for Transformer Verification on GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 881,
    "paper_ids": [
      1673,
      1675
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tirthak Patel",
    "display_name": "Tirthak Patel",
    "affiliation": "Rice University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SC": 2,
      "ATC": 0,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      },
      "ATC": {},
      "FAST": {
        "2020": 3
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "RIBBON: cost-effective and qos-aware deep learning model inference using a diverse pool of cloud computing instances",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Systematically inferring I/O performance variability by examining repetitive job behavior",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "making disk failure predictions smarter",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "uncovering access reuse and sharing characteristics of iointensive files on largescale production hpc systems",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "gift a coupon based throttleandreward mechanism for fair and efficient io bandwidth management on parallel storage systems",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 882,
    "paper_ids": [
      3570,
      3571
    ],
    "papers_without_artifact_ids": [
      3572,
      3573,
      3574
    ]
  },
  {
    "name": "Devesh Tiwari",
    "display_name": "Devesh Tiwari",
    "affiliation": "Northeastern University",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SC": 2,
      "ATC": 0,
      "FAST": 4
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      },
      "ATC": {},
      "FAST": {
        "2020": 3,
        "2013": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "RIBBON: cost-effective and qos-aware deep learning model inference using a diverse pool of cloud computing instances",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Systematically inferring I/O performance variability by examining repetitive job behavior",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "making disk failure predictions smarter",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "uncovering access reuse and sharing characteristics of iointensive files on largescale production hpc systems",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "gift a coupon based throttleandreward mechanism for fair and efficient io bandwidth management on parallel storage systems",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "active flash towards energyefficient insitu data analytics on extremescale machines",
        "conference": "FAST",
        "year": 2013
      }
    ],
    "author_id": 883,
    "paper_ids": [
      3570,
      3571
    ],
    "papers_without_artifact_ids": [
      3572,
      3573,
      3574,
      3575
    ]
  },
  {
    "name": "Yonggang Wen 0001",
    "display_name": "Yonggang Wen",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 1,
      "NSDI": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2024": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Characterization and prediction of deep learning workloads in large-scale GPU datacenters",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Primo: Practical Learning-Augmented Systems with Interpretable Models",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "characterization of large language model development in the datacenter",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "hydro surrogatebased hyperparameter tuning service in datacenters",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 884,
    "paper_ids": [
      730,
      731
    ],
    "papers_without_artifact_ids": [
      741,
      744
    ]
  },
  {
    "name": "Martin Schulz 0001",
    "display_name": "Martin Schulz",
    "affiliation": "TU Munich",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A next-generation discontinuous galerkin fluid dynamics solver with application to high-resolution lung airflow simulations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Every Mapping Counts in Large Amounts: Folio Accounting",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 885,
    "paper_ids": [
      3576,
      3577
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Evangelos Georganas",
    "display_name": "Evangelos Georganas",
    "affiliation": "Intel Corporation",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DistGNN: scalable distributed training for large-scale graph neural networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 886,
    "paper_ids": [
      3578,
      3579
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dhiraj D. Kalamkar",
    "display_name": "Dhiraj D. Kalamkar",
    "affiliation": "Intel Corporation",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DistGNN: scalable distributed training for large-scale graph neural networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 887,
    "paper_ids": [
      3578,
      3579
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sasikanth Avancha",
    "display_name": "Sasikanth Avancha",
    "affiliation": "Intel Corporation",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DistGNN: scalable distributed training for large-scale graph neural networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 888,
    "paper_ids": [
      3578,
      3579
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Md. Vasimuddin",
    "display_name": "Md. Vasimuddin",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DistGNN: scalable distributed training for large-scale graph neural networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 889,
    "paper_ids": [
      3578,
      3579
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sanchit Misra",
    "display_name": "Sanchit Misra",
    "affiliation": "Intel Corporation",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DistGNN: scalable distributed training for large-scale graph neural networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 890,
    "paper_ids": [
      3578,
      3579
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ramanarayan Mohanty",
    "display_name": "Ramanarayan Mohanty",
    "affiliation": "Intel Corporation",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DistGNN: scalable distributed training for large-scale graph neural networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 891,
    "paper_ids": [
      3578,
      3579
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexander Heinecke",
    "display_name": "Alexander Heinecke",
    "affiliation": "Intel Corporation",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DistGNN: scalable distributed training for large-scale graph neural networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 892,
    "paper_ids": [
      3578,
      3579
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniele De Sensi",
    "display_name": "Daniele De Sensi",
    "affiliation": "Sapienza University of Rome",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {
        "2024": 1
      },
      "NSDI": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Flare: flexible in-network allreduce",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "OSMOSIS: Enabling Multi-Tenancy in Datacenter SmartNICs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a highperformance design implementation deployment and evaluation of the slim fly network",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "swing shortcutting rings for higher bandwidth allreduce",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 893,
    "paper_ids": [
      747,
      753
    ],
    "papers_without_artifact_ids": [
      756,
      757
    ]
  },
  {
    "name": "Salvatore Di Girolamo",
    "display_name": "Salvatore Di Girolamo",
    "affiliation": "ETH Zurich, Zurich, Switzerland",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Flare: flexible in-network allreduce",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "OSMOSIS: Enabling Multi-Tenancy in Datacenter SmartNICs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 894,
    "paper_ids": [
      747,
      753
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shigang Li 0002",
    "display_name": "Shigang Li",
    "affiliation": "Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flare: flexible in-network allreduce",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Chimera: efficiently training large-scale neural networks with bidirectional pipelines",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a highperformance design implementation deployment and evaluation of the slim fly network",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 895,
    "paper_ids": [
      747,
      749
    ],
    "papers_without_artifact_ids": [
      756
    ]
  },
  {
    "name": "Olatunji Ruwase",
    "display_name": "Olatunji Ruwase",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZeRO-infinity: breaking the GPU memory wall for extreme scale deep learning",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Quant-LLM: Accelerating the Serving of Large Language Models via FP6-Centric Algorithm-System Co-Design on Modern GPUs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 896,
    "paper_ids": [
      3580,
      2788
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuxiong He",
    "display_name": "Yuxiong He",
    "affiliation": "Microsoft Research (United Kingdom)",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {
        "2024": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZeRO-infinity: breaking the GPU memory wall for extreme scale deep learning",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Quant-LLM: Accelerating the Serving of Large Language Models via FP6-Centric Algorithm-System Co-Design on Modern GPUs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 897,
    "paper_ids": [
      3580,
      2788
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ang Li 0006",
    "display_name": "Ang Li",
    "affiliation": "Pacific Northwest National Laboratory, Richland, WA, USA",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SC": 2,
      "ATC": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      },
      "ATC": {
        "2024": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "APNN-TC: accelerating arbitrary precision neural networks on ampere GPU tensor cores",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SV-sim: scalable PGAS-based state vector simulation of quantum circuits",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oper optimalityguided embedding table parallelization for largescale recommendation model",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "mgg accelerating graph neural networks with finegrained intrakernel communicationcomputation pipelining on multigpu platforms",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 898,
    "paper_ids": [
      1674,
      3581
    ],
    "papers_without_artifact_ids": [
      1678,
      1679
    ]
  },
  {
    "name": "Alexandros Nikolaos Ziogas",
    "display_name": "Alexandros Nikolaos Ziogas",
    "affiliation": "ETH Zurich, Switzerland",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Productivity, portability, performance: data-centric Python",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "On the parallel I/O optimality of linear algebra kernels: near-optimal matrix factorizations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 899,
    "paper_ids": [
      748,
      751
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexandru Calotoiu",
    "display_name": "Alexandru Calotoiu",
    "affiliation": "ETH Zurich, Switzerland",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 1,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Productivity, portability, performance: data-centric Python",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SeBS-Flow: Benchmarking Serverless Cloud Function Workflows",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sebs 20 keeping up with the clouds",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 900,
    "paper_ids": [
      748,
      752
    ],
    "papers_without_artifact_ids": [
      755
    ]
  },
  {
    "name": "Han Zhao 0005",
    "display_name": "Han Zhao",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enable simultaneous DNN services based on deterministic operator overlap and precise latency prediction",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DVABatch: Diversity-aware Multi-Entry Multi-Exit Batching for Efficient Processing of DNN Services on GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improving gpu sharing performance through adaptive bubbleless spatialtemporal sharing",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 901,
    "paper_ids": [
      1084,
      1086
    ],
    "papers_without_artifact_ids": [
      1089
    ]
  },
  {
    "name": "Yong Yang 0013",
    "display_name": "Yong Yang",
    "affiliation": "Alibaba Group, Alibaba Cloud, Hangzhou, China",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Enable simultaneous DNN services based on deterministic operator overlap and precise latency prediction",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Help Rather Than Recycle: Alleviating Cold Startup in Serverless Computing Through Inter-Function Container Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diagnosing applicationnetwork anomalies for millions of ips in production clouds",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 902,
    "paper_ids": [
      1084,
      1085
    ],
    "papers_without_artifact_ids": [
      1935
    ]
  },
  {
    "name": "Dan Feng 0001",
    "display_name": "Dan Feng",
    "affiliation": "HUST",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 2,
      "EUROSYS": 0,
      "ACSAC": 0,
      "FAST": 6
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {
        "2023": 2
      },
      "EUROSYS": {},
      "ACSAC": {},
      "FAST": {
        "2009": 1,
        "2015": 1,
        "2007": 1,
        "2023": 1,
        "2019": 1,
        "2025": 1
      }
    },
    "artifact_rate": 22.2,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LogECMem: coupling erasure-coded in-memory key-value stores with parity logging",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SOWalker: An I/O-Optimized Out-of-Core Graph Processing System for Second-Order Random Walks",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "revisiting network coding for warm blob storage",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "loopdelta embedding localityaware opportunistic delta compression in inline deduplication for highly efficient data reduction",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "pararc embracing subpacketization for repair parallelization in msrcoded storage",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "finesse finegrained feature locality based fast resemblance detection for postdeduplication delta compression",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "design tradeoffs for data deduplication performance in backup workloads",
        "conference": "FAST",
        "year": 2015
      },
      {
        "title": "workout io workload outsourcing for boosting raid reconstruction performance",
        "conference": "FAST",
        "year": 2009
      },
      {
        "title": "pro a popularitybased multithreaded reconstruction optimization for raidstructured storage systems",
        "conference": "FAST",
        "year": 2007
      }
    ],
    "author_id": 439,
    "paper_ids": [
      3582,
      3583
    ],
    "papers_without_artifact_ids": [
      3584,
      2109,
      3585,
      2066,
      2067,
      2114,
      2115
    ]
  },
  {
    "name": "Yanan Yang",
    "display_name": "Yanan Yang",
    "affiliation": "Yale University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding, predicting and scheduling serverless workloads under partial interference",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Tetris: Memory-efficient Serverless Inference through Tensor Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 903,
    "paper_ids": [
      2790,
      2791
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yiming Li",
    "display_name": "Yiming Li",
    "affiliation": "Tianjin University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding, predicting and scheduling serverless workloads under partial interference",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AlloyStack: A Library Operating System for Serverless Workflow Applications",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 904,
    "paper_ids": [
      2790,
      641
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haikun Liu",
    "display_name": "Haikun Liu",
    "affiliation": "HUST",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SC": 2,
      "ATC": 1,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      },
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2025": 2
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Hardware-supported remote persistence for distributed persistent memory",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "LCCG: a locality-centric hardware accelerator for high throughput of concurrent graph processing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aegonkv a high bandwidth low tail latency and low storage cost kvseparated lsm store with smartssdbased gc offloading",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "towards highthroughput and lowlatency billionscale vector search via cpugpu collaborative filtering and reranking",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "scalable billionpoint approximate nearest neighbor search using smartssds",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 442,
    "paper_ids": [
      1091,
      1093
    ],
    "papers_without_artifact_ids": [
      1101,
      1102,
      1103
    ]
  },
  {
    "name": "Xiaofei Liao",
    "display_name": "Xiaofei Liao",
    "affiliation": "HUST",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "SC": 2,
      "EUROSYS": 2,
      "ATC": 2,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      },
      "EUROSYS": {
        "2025": 2
      },
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "FAST": {
        "2025": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Hardware-supported remote persistence for distributed persistent memory",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "LCCG: a locality-centric hardware accelerator for high throughput of concurrent graph processing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "metahg enhancing hgnn systems leveraging advanced metapath graph abstraction",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "ohminer an overlapcentric system for efficient hypergraph pattern mining",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "aegonkv a high bandwidth low tail latency and low storage cost kvseparated lsm store with smartssdbased gc offloading",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "towards highthroughput and lowlatency billionscale vector search via cpugpu collaborative filtering and reranking",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "scalable billionpoint approximate nearest neighbor search using smartssds",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "cyclosa redundancyfree graph pattern mining via set dataflow",
        "conference": "ATC",
        "year": 2023
      }
    ],
    "author_id": 443,
    "paper_ids": [
      1091,
      1093
    ],
    "papers_without_artifact_ids": [
      1098,
      1100,
      1101,
      1102,
      1103,
      1108
    ]
  },
  {
    "name": "Yu Zhang 0027",
    "display_name": "Yu Zhang",
    "affiliation": "HUST",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SC": 2,
      "EUROSYS": 2,
      "ATC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      },
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      },
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Hardware-supported remote persistence for distributed persistent memory",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "LCCG: a locality-centric hardware accelerator for high throughput of concurrent graph processing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ohminer an overlapcentric system for efficient hypergraph pattern mining",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "towards highthroughput and lowlatency billionscale vector search via cpugpu collaborative filtering and reranking",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "scalable billionpoint approximate nearest neighbor search using smartssds",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "lsgraph a localitycentric highperformance streaming graph engine",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 906,
    "paper_ids": [
      1091,
      1093
    ],
    "papers_without_artifact_ids": [
      1100,
      1102,
      1103,
      1105
    ]
  },
  {
    "name": "Hang Liu 0001",
    "display_name": "Hang Liu",
    "affiliation": "Boğaziçi University",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SC": 2,
      "EUROSYS": 3,
      "ATC": 0,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      },
      "EUROSYS": {
        "2025": 1,
        "2023": 1,
        "2021": 1
      },
      "ATC": {},
      "FAST": {
        "2017": 1,
        "2018": 1
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Dr. Top-k: delegate-centric Top-k on GPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Tahoe: tree structure-aware high performance inference engine for decision tree ensemble on GPU",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bingo radixbased bias factorization for random walk on dynamic graphs",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "tea a generalpurpose temporal graph random walk engine",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "et rethinking selfattention for transformer models on gpus",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "uksm swift memory deduplication via hierarchical and adaptive memory region distilling",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "graphene finegrained io management for graph computing",
        "conference": "FAST",
        "year": 2017
      }
    ],
    "author_id": 907,
    "paper_ids": [
      2787,
      3586
    ],
    "papers_without_artifact_ids": [
      3587,
      644,
      3588,
      3589,
      3590
    ]
  },
  {
    "name": "Wei Xue 0003",
    "display_name": "Wei Xue",
    "affiliation": "University of Massachusetts Boston",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 1,
      "FAST": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2023": 1,
        "2019": 1
      },
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LMFF: efficient and scalable layered materials force field on heterogeneous many-core processors",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Full Lifecycle Data Analysis on a Large-scale and Leadership Supercomputer: What Can We Learn from It?",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hadafs a file system bridging the local and shared burst buffer for exascale supercomputers",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "automatic applicationaware io forwarding resource allocation",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "endtoend io monitoring on a leading supercomputer",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 909,
    "paper_ids": [
      3591,
      3592
    ],
    "papers_without_artifact_ids": [
      3593,
      2101,
      2102
    ]
  },
  {
    "name": "Weiguo Liu",
    "display_name": "Weiguo Liu",
    "affiliation": "Shandong University, Jinan, China and National Supercomputing Center in Wuxi, Wuxi, China",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 1,
      "FAST": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2023": 1,
        "2019": 1
      },
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "SC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LMFF: efficient and scalable layered materials force field on heterogeneous many-core processors",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Full Lifecycle Data Analysis on a Large-scale and Leadership Supercomputer: What Can We Learn from It?",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hadafs a file system bridging the local and shared burst buffer for exascale supercomputers",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "automatic applicationaware io forwarding resource allocation",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "endtoend io monitoring on a leading supercomputer",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 910,
    "paper_ids": [
      3591,
      3592
    ],
    "papers_without_artifact_ids": [
      3593,
      2101,
      2102
    ]
  },
  {
    "name": "Jiacheng Ma 0002",
    "display_name": "Jiacheng Ma",
    "affiliation": "EPFL",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "OSDI": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "OSDI": {
        "2024": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Paths to OpenMP in the kernel",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Performance Interfaces for Hardware Accelerators",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 911,
    "paper_ids": [
      3594,
      1594
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simone Campanoni",
    "display_name": "Simone Campanoni",
    "affiliation": "Northwestern University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "SC",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Paths to OpenMP in the kernel",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CAMP: Compiler and Allocator-based Heap Memory Protection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the case for an interwoven parallel hardwaresoftware stack",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 912,
    "paper_ids": [
      3594,
      931
    ],
    "papers_without_artifact_ids": [
      3595
    ]
  },
  {
    "name": "Peter A. Dinda",
    "display_name": "Peter A. Dinda",
    "affiliation": "Northwestern University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 2,
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      },
      "USENIXSEC": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "SC",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Paths to OpenMP in the kernel",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CAMP: Compiler and Allocator-based Heap Memory Protection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the case for an interwoven parallel hardwaresoftware stack",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 913,
    "paper_ids": [
      3594,
      931
    ],
    "papers_without_artifact_ids": [
      3595
    ]
  },
  {
    "name": "Patrick S. McCormick",
    "display_name": "Patrick S. McCormick",
    "affiliation": "Los Alamos National Laboratory",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Index launches: scalable, flexible representation of parallel task groups",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Unity: Accelerating DNN Training Through Joint Optimization of Algebraic Transformations and Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 914,
    "paper_ids": [
      3596,
      1618
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alex Aiken",
    "display_name": "Alex Aiken",
    "affiliation": "Stanford University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "OSDI": 1,
      "SOSP": 0,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "OSDI": {
        "2022": 1
      },
      "SOSP": {},
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI",
      "SC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Index launches: scalable, flexible representation of parallel task groups",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Unity: Accelerating DNN Training Through Joint Optimization of Algebraic Transformations and Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 915,
    "paper_ids": [
      3596,
      1618
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei Wang",
    "display_name": "Wei Wang",
    "affiliation": "ByteDance, Singapore",
    "artifact_count": 2,
    "total_papers": 10,
    "total_papers_by_conf": {
      "SC": 1,
      "USENIXSEC": 3,
      "ATC": 4,
      "ACSAC": 0,
      "FAST": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      },
      "ATC": {
        "2022": 4
      },
      "ACSAC": {},
      "FAST": {
        "2014": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "SC",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Online evolutionary batch size orchestration for scheduling deep learning workloads in GPU clusters",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "RollingEvidence: Autoregressive Video Evidence via Rolling Shutter Effect",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "adversary is on the road attacks on visual slam using unnoticeable adversarial patch",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "leveraging semantic relations in code and data to enhance taint analysis of embedded systems",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "flash towards a highperformance hardware acceleration architecture for crosssilo federated learning",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "discrete artificial bee colony algorithm for prefabricated building resource scheduling based on neural network",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "design of prefabricated building performance detection system based on optimized ant colony algorithm",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "risk detection system of bridge construction based on fast ica algorithm",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "3d printing floating body balance optimization system based on comet data analysis",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "reconfs a reconstructable file system on flash storage",
        "conference": "FAST",
        "year": 2014
      }
    ],
    "author_id": 916,
    "paper_ids": [
      3597,
      3598
    ],
    "papers_without_artifact_ids": [
      3599,
      3366,
      3600,
      3601,
      3602,
      3603,
      3604,
      1072
    ]
  },
  {
    "name": "Timothy Roscoe",
    "display_name": "Timothy Roscoe",
    "affiliation": "ETH Zurich",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "SOSP": 2,
      "ATC": 0,
      "NSDI": 5
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "ATC": {},
      "NSDI": {
        "2022": 1,
        "2008": 1,
        "2004": 1,
        "2018": 1,
        "2007": 1
      }
    },
    "artifact_rate": 22.2,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Efeu: generating efficient, verified, hybrid hardware/software drivers for I2C devices",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Do OS abstractions make sense on FPGAs?",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "specifying the defacto os of a production soc",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "how to diagnose nanosecond network latencies in rich endhost stacks",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "generating correct initial page tables from formal hardware descriptions",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "snailtrail generalizing critical paths for online analysis of distributed dataflows",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "bft protocols under fire",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "friday global comprehension for distributed replay",
        "conference": "NSDI",
        "year": 2007
      },
      {
        "title": "operating systems support for planetaryscale network services",
        "conference": "NSDI",
        "year": 2004
      }
    ],
    "author_id": 917,
    "paper_ids": [
      3605,
      3606
    ],
    "papers_without_artifact_ids": [
      3607,
      3447,
      2785,
      2055,
      2827,
      518,
      3608
    ]
  },
  {
    "name": "Tapti Palit",
    "display_name": "Tapti Palit",
    "affiliation": "Univ. of California - Davis",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pegasus: Transparent and Unified Kernel-Bypass Networking for Fast Local and Remote Communication",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Temporal System Call Specialization for Attack Surface Reduction",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mitigating data leakage by protecting memoryresident sensitive data",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 918,
    "paper_ids": [
      1975,
      2988
    ],
    "papers_without_artifact_ids": [
      2995
    ]
  },
  {
    "name": "Anjo Vahldiek-Oberwagner",
    "display_name": "Anjo Vahldiek-Oberwagner",
    "affiliation": "Intel Labs",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "EUROSYS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Pegasus: Transparent and Unified Kernel-Bypass Networking for Fast Local and Remote Communication",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "swivel hardening webassembly against spectre",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 919,
    "paper_ids": [
      1975,
      3609
    ],
    "papers_without_artifact_ids": [
      3201
    ]
  },
  {
    "name": "Haoran Lin",
    "display_name": "Haoran Lin",
    "affiliation": "Zhejiang University, Hangzhou, China",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "ParallelEVM: Operation-Level Concurrent Transaction Execution for EVM-Compatible Blockchains",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 920,
    "paper_ids": [
      684,
      687
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hang Feng",
    "display_name": "Hang Feng",
    "affiliation": "Zhejiang University, Hangzhou, China",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ParallelEVM: Operation-Level Concurrent Transaction Execution for EVM-Compatible Blockchains",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SlimArchive: A Lightweight Architecture for Ethereum Archive Nodes",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 921,
    "paper_ids": [
      684,
      685
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lei Wu 0012",
    "display_name": "Lei Wu",
    "affiliation": "Zhejiang University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1,
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ParallelEVM: Operation-Level Concurrent Transaction Execution for EVM-Compatible Blockchains",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SlimArchive: A Lightweight Architecture for Ethereum Archive Nodes",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dissecting payloadbased transaction phishing on ethereum",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "eosafe security analysis of eosio smart contracts",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 922,
    "paper_ids": [
      684,
      685
    ],
    "papers_without_artifact_ids": [
      690,
      791
    ]
  },
  {
    "name": "Gyeongchan Yun",
    "display_name": "Gyeongchan Yun",
    "affiliation": "UNIST",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "JABAS: Joint Adaptive Batching and Automatic Scaling for DNN Training on Heterogeneous GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DyTIS: A Dynamic Dataset Targeted Index Structure Simultaneously Efficient for Search, Insert, and Scan",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 923,
    "paper_ids": [
      3610,
      3611
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Young-ri Choi",
    "display_name": "Young-ri Choi",
    "affiliation": "UNIST",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 0,
      "FAST": 3,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2023": 1,
        "2019": 2
      },
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "JABAS: Joint Adaptive Batching and Automatic Scaling for DNN Training on Heterogeneous GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DyTIS: A Dynamic Dataset Targeted Index Structure Simultaneously Efficient for Search, Insert, and Scan",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "adoc automatically harmonizing dataflow between components in logstructured keyvalue stores for improved performance",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "listdb union of writeahead logs and persistent skiplists for incremental checkpointing on persistent memory",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "slmdb singlelevel keyvalue store with persistent memory",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "writeoptimized dynamic hashing for persistent memory",
        "conference": "FAST",
        "year": 2019
      }
    ],
    "author_id": 924,
    "paper_ids": [
      3610,
      3611
    ],
    "papers_without_artifact_ids": [
      3612,
      3613,
      3614,
      3615
    ]
  },
  {
    "name": "Haiying Shen",
    "display_name": "Haiying Shen",
    "affiliation": "University of Virginia",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Flex: Fast, Accurate DNN Inference on Low-Cost Edges Using Heterogeneous Accelerator Execution",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "USHER: Holistic Interference Avoidance for Resource Optimized ML Inference",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 925,
    "paper_ids": [
      3616,
      3617
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chuqi Zhang",
    "display_name": "Chuqi Zhang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Erebor: A Drop-In Sandbox Solution for Private Data Processing in Untrusted Confidential Virtual Machines",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fuzzing the PHP Interpreter via Dataflow Fusion",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 926,
    "paper_ids": [
      2794,
      2571
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Philip Shilane",
    "display_name": "Philip Shilane",
    "affiliation": "Dell Technologies, Boston, USA",
    "artifact_count": 2,
    "total_papers": 12,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1,
      "FAST": 10
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2024": 1,
        "2021": 1,
        "2011": 1,
        "2016": 1,
        "2012": 2,
        "2017": 1,
        "2014": 1,
        "2013": 1,
        "2022": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Garbage Collection Does Not Only Collect Garbage: Piggybacking-Style Defragmentation for Deduplicated Backup Storage",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Building a High-performance Fine-grained Deduplication Framework for Backup Storage with High Deduplication Ratio",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "physical vs logical indexing with idea inverted deduplicationaware index",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "dedupsearch twophase deduplication aware keyword search",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "the dilemma between deduplication and locality can both be achieved",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "the logic of physical garbage collection in deduplicating storage",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "using hints to improve inline blocklayer deduplication",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "migratory compression coarsegrained data reordering to improve compressibility",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "memory efficient sanitization of a deduplicated storage system",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "characteristics of backup workloads in production systems",
        "conference": "FAST",
        "year": 2012
      },
      {
        "title": "wan optimized replication of backup datasets using streaminformed delta compression",
        "conference": "FAST",
        "year": 2012
      },
      {
        "title": "tradeoffs in scalable data routing for deduplication clusters",
        "conference": "FAST",
        "year": 2011
      }
    ],
    "author_id": 448,
    "paper_ids": [
      2059,
      2061
    ],
    "papers_without_artifact_ids": [
      3618,
      3619,
      2065,
      3620,
      3621,
      3622,
      3623,
      3624,
      3625,
      3626
    ]
  },
  {
    "name": "Lars Wrenger",
    "display_name": "Lars Wrenger",
    "affiliation": "Leibniz Universität Hannover, Hannover, Germany",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1,
      "SOSP": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2023": 1
      },
      "SOSP": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "HyperAlloc: Efficient VM Memory De/Inflation via Hypervisor-Shared Page-Frame Allocators",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "LLFree: Scalable and Optionally-Persistent Page-Frame Allocation",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the new costs of physical memory fragmentation",
        "conference": "SOSP",
        "year": 2024
      }
    ],
    "author_id": 449,
    "paper_ids": [
      2806,
      2807
    ],
    "papers_without_artifact_ids": [
      2809
    ]
  },
  {
    "name": "João Gonçalves",
    "display_name": "João Gonçalves",
    "affiliation": "INESC-ID & IST U. Lisboa",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HawkSet: Automatic, Application-Agnostic, and Efficient Concurrent PM Bug Detection",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Mumak: Efficient and Black-Box Bug Detection for Persistent Memory",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7927,
    "paper_ids": [
      2736,
      1983
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Brian Kroth",
    "display_name": "Brian Kroth",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TUNA: Tuning Unstable and Noisy Cloud Applications",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "From WiscKey to Bourbon: A Learned Index for Log-Structured Merge Trees",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 930,
    "paper_ids": [
      1306,
      1640
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haonan Wu",
    "display_name": "Haonan Wu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "CHES": 1,
      "ATC": 1,
      "FAST": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "CHES": {
        "2025": 1
      },
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2026": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "CHES",
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hey Hey, My My, Skewness Is Here to Stay: Challenges and Opportunities in Cloud Block Store Traffic",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how soon is now preloading images for virtual disks with thinkahead",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "ransom access memories achieving practical ransomware protection in cloud with deftpunk",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "deploying userspace tcp at cloud scale with luna",
        "conference": "ATC",
        "year": 2023
      }
    ],
    "author_id": 931,
    "paper_ids": [
      2813,
      3117
    ],
    "papers_without_artifact_ids": [
      2090,
      2092,
      2093
    ]
  },
  {
    "name": "Guangtao Xue",
    "display_name": "Guangtao Xue",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 2,
    "total_papers": 13,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1,
      "FAST": 7,
      "USENIXSEC": 1,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2020": 1,
        "2026": 5,
        "2023": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "NSDI": {
        "2025": 2,
        "2023": 1
      }
    },
    "artifact_rate": 15.4,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Hey Hey, My My, Skewness Is Here to Stay: Challenges and Opportunities in Cloud Block Store Traffic",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "NVMe SSD Failures in the Field: the Fail-Stop and the Fail-Slow",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "skysync accelerating file synchronization with collaborative delta generation",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "how soon is now preloading images for virtual disks with thinkahead",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "cacheslide unlocking cross positionaware kv cache reuse for accelerating llm serving",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "parasync exploiting finegrained parallelism for efficient file synchronization",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "here there and everywhere the past the present and the future of local storage in cloud",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "onesizefitsnone understanding and enhancing slowfault tolerance in modern distributed systems",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "vegeta enabling parallel smart contract execution in leaderless blockchains",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "perseus a failslow detection framework for cloud storage systems",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "acoustic sensing and communication using metasurface",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "remote attacks on speech recognition systems using sound from power supply",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "mapx controlled data migration in the expansion of decentralized objectbased storage systems",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 932,
    "paper_ids": [
      2813,
      2087
    ],
    "papers_without_artifact_ids": [
      1044,
      2090,
      1090,
      1046,
      2089,
      1925,
      3627,
      1062,
      2674,
      3628,
      3629
    ]
  },
  {
    "name": "Shengqi Chen 0001",
    "display_name": "Shengqi Chen",
    "affiliation": "IIT Bombay",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MEPipe: Democratizing LLM Training with Memory-Efficient Slice-Level Pipeline Scheduling on Cost-Effective Accelerators",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TriCache: A User-Transparent Block Cache Enabling High-Performance Out-of-Core Processing with In-Memory Programs",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 933,
    "paper_ids": [
      2815,
      2817
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuanwei Wang",
    "display_name": "Yuanwei Wang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MEPipe: Democratizing LLM Training with Memory-Efficient Slice-Level Pipeline Scheduling on Cost-Effective Accelerators",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TriCache: A User-Transparent Block Cache Enabling High-Performance Out-of-Core Processing with In-Memory Programs",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 934,
    "paper_ids": [
      2815,
      2817
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guanyu Feng",
    "display_name": "Guanyu Feng",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MEPipe: Democratizing LLM Training with Memory-Efficient Slice-Level Pipeline Scheduling on Cost-Effective Accelerators",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TriCache: A User-Transparent Block Cache Enabling High-Performance Out-of-Core Processing with In-Memory Programs",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 935,
    "paper_ids": [
      2815,
      2817
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haryadi S. Gunawi",
    "display_name": "Haryadi S. Gunawi",
    "affiliation": "University of Chicago",
    "artifact_count": 2,
    "total_papers": 11,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "SOSP": 1,
      "SC": 0,
      "ATC": 0,
      "FAST": 7,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "SOSP": {
        "2021": 1
      },
      "SC": {},
      "ATC": {},
      "FAST": {
        "2008": 1,
        "2016": 1,
        "2017": 1,
        "2018": 2,
        "2013": 1,
        "2019": 1
      },
      "NSDI": {
        "2011": 1
      }
    },
    "artifact_rate": 18.2,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Heimdall: Optimizing Storage I/O Admission with Extensive Machine Learning Pipeline",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "LinnOS: Predictability on Unpredictable Flash Storage with a Light Neural Network",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "loda a hostdevice codesign for strong predictability contract on modern flash storage",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "scalecheck a singlemachine approach for discovering scalability bugs in large distributed systems",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "the case of femu cheap accurate scalable and extensible flash emulator",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "failslow at scale evidence of hardware performance faults in large production systems",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "tinytail flash nearperfect elimination of garbage collection tail latencies in nand ssds",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "the tail at store a revelation from millions of hours of disk and ssd deployments",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "hardfs hardening hdfs with selective and lightweight versioning",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "fate and destini a framework for cloud recovery testing",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "eio error handling is occasionally correct",
        "conference": "FAST",
        "year": 2008
      }
    ],
    "author_id": 937,
    "paper_ids": [
      3630,
      3631
    ],
    "papers_without_artifact_ids": [
      1330,
      3486,
      3632,
      3633,
      3634,
      3635,
      2028,
      2036,
      2040
    ]
  },
  {
    "name": "Christina Giannoula",
    "display_name": "Christina Giannoula",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      },
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Mist: Efficient Distributed Training of Large Language Models via Memory-Parallelism Co-Optimization",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Minuet: Accelerating 3D Sparse Convolutions on GPUs",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "benchmarking memorycentric computing systems analysis of real processinginmemory hardware",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 938,
    "paper_ids": [
      2068,
      2069
    ],
    "papers_without_artifact_ids": [
      3636
    ]
  },
  {
    "name": "Yuanli Wang",
    "display_name": "Yuanli Wang",
    "affiliation": "Boston University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 3
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2021": 1,
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "CAPSys: Contention-aware task placement for data stream processing",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "A new benchmark harness for systematic and robust evaluation of streaming state stores",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "accelerated training via device similarity in federated learning",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 939,
    "paper_ids": [
      2818,
      2819
    ],
    "papers_without_artifact_ids": [
      3637
    ]
  },
  {
    "name": "Jianyu Niu",
    "display_name": "Jianyu Niu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 2
      },
      "ACSAC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ladon: High-Performance Multi-BFT Consensus via Dynamic Global Ordering",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Achilles: Efficient TEE-Assisted BFT Consensus via Rollback Resilient Recovery",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i know what you asked prompt leakage via kvcache sharing in multitenant llm serving",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "breaking the privacy barrier on the feasibility of reorganization attacks on ethereum private transactions",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 940,
    "paper_ids": [
      359,
      360
    ],
    "papers_without_artifact_ids": [
      369,
      371
    ]
  },
  {
    "name": "Wanchun Jiang",
    "display_name": "Wanchun Jiang",
    "affiliation": "Central South University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 2
      },
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Introspective Congestion Control for Consistent High Performance",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Occamy: A Preemptive Buffer Management for On-chip Shared-memory Switches",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rearchitecting congestion management in lossless ethernet",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 941,
    "paper_ids": [
      3638,
      3639
    ],
    "papers_without_artifact_ids": [
      3640
    ]
  },
  {
    "name": "Fengyuan Ren",
    "display_name": "Fengyuan Ren",
    "affiliation": "Tsinghua University",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 1,
      "NSDI": 4
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 2
      },
      "ATC": {
        "2024": 1
      },
      "NSDI": {
        "2014": 1,
        "2024": 1,
        "2025": 1,
        "2020": 1
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Introspective Congestion Control for Consistent High Performance",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Occamy: A Preemptive Buffer Management for On-chip Shared-memory Switches",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "etran extensible kernel transport with ebpf",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "crossmapping harmonizing memory consistency in crossisa binary translation",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "revisiting congestion control for lossless ethernet",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "rearchitecting congestion management in lossless ethernet",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "catch the whole lot in an action rapid precise packet loss notification in data center",
        "conference": "NSDI",
        "year": 2014
      }
    ],
    "author_id": 942,
    "paper_ids": [
      3638,
      3639
    ],
    "papers_without_artifact_ids": [
      3641,
      3642,
      3643,
      3640,
      3463
    ]
  },
  {
    "name": "Jiangshan Yu",
    "display_name": "Jiangshan Yu",
    "affiliation": "University of Sydney",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2022": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Achilles: Efficient TEE-Assisted BFT Consensus via Rollback Resilient Recovery",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DAMYSUS: streamlined BFT consensus leveraging trusted components",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "janus enhancing asynchronous common subset with trusted hardware",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 944,
    "paper_ids": [
      360,
      3644
    ],
    "papers_without_artifact_ids": [
      3645
    ]
  },
  {
    "name": "Jianguo Yao 0002",
    "display_name": "Jianguo Yao",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 2
      },
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Samoyeds: Accelerating MoE Models with Structured Sparsity Leveraging Sparse Tensor Cores",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "LPNS: Scalable and Latency-Predictable Local Storage Virtualization for Unpredictable NVMe SSDs in Clouds",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "spacefusion advanced deep learning operator fusion via spacemapping graph",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 945,
    "paper_ids": [
      1680,
      1683
    ],
    "papers_without_artifact_ids": [
      1684
    ]
  },
  {
    "name": "Junsu Im",
    "display_name": "Junsu Im",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Solid State Drive Targeted Memory-Efficient Indexing for Universal I/O Patterns and Fragmentation Degrees",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Modernizing File System through In-Storage Indexing",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 946,
    "paper_ids": [
      2071,
      2074
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seonggyun Oh",
    "display_name": "Seonggyun Oh",
    "affiliation": "DGIST, Republic of Korea",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2023": 1
      },
      "FAST": {
        "2024": 1,
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Solid State Drive Targeted Memory-Efficient Indexing for Universal I/O Patterns and Fragmentation Degrees",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "All-Flash Array Key-Value Cache for Large Objects",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dogi data placement with oracleguided insights for logstructured systems",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "midas minimizing write amplification in logstructured systems through adaptive group number and size configuration",
        "conference": "FAST",
        "year": 2024
      }
    ],
    "author_id": 454,
    "paper_ids": [
      2071,
      2072
    ],
    "papers_without_artifact_ids": [
      2075,
      2077
    ]
  },
  {
    "name": "Sam H. Noh",
    "display_name": "Sam H. Noh",
    "affiliation": "Virginia Tech",
    "artifact_count": 2,
    "total_papers": 18,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SOSP": 0,
      "ATC": 0,
      "FAST": 16,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2023": 1
      },
      "SOSP": {},
      "ATC": {},
      "FAST": {
        "2024": 1,
        "2015": 1,
        "2012": 1,
        "2026": 4,
        "2017": 1,
        "2013": 1,
        "2023": 3,
        "2022": 1,
        "2019": 2,
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 11.1,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Solid State Drive Targeted Memory-Efficient Indexing for Universal I/O Patterns and Fragmentation Degrees",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DyTIS: A Dynamic Dataset Targeted Index Structure Simultaneously Efficient for Search, Insert, and Scan",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cylon fast and accurate fullsystem emulation of cxlssds",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "dogi data placement with oracleguided insights for logstructured systems",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "unicom a universally highperformant io completion mechanism for modern computer systems",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "characterizing and emulating fdp ssds with warp",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "awupf rediscovered atomic writes to unleash pivotal faulttolerance in ssds",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "midas minimizing write amplification in logstructured systems through adaptive group number and size configuration",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "on stacking a persistent memory file system on legacy file systems",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "revitalizing the forgotten onchip dma to expedite data movement in nvmbased storage systems",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "adoc automatically harmonizing dataflow between components in logstructured keyvalue stores for improved performance",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "a logstructured merge treeaware message authentication scheme for persistent keyvalue stores",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "slmdb singlelevel keyvalue store with persistent memory",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "writeoptimized dynamic hashing for persistent memory",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "wort write optimal radix tree for persistent memory storage systems",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "towards slo complying ssds through ops isolation",
        "conference": "FAST",
        "year": 2015
      },
      {
        "title": "unioning of the buffer cache and journaling layers with nonvolatile memory",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "caching less for better performance balancing cache size and update cost of flash memory cache in hybrid storage systems",
        "conference": "FAST",
        "year": 2012
      }
    ],
    "author_id": 457,
    "paper_ids": [
      2071,
      3611
    ],
    "papers_without_artifact_ids": [
      3646,
      2075,
      3647,
      3648,
      3649,
      2077,
      3650,
      1606,
      3612,
      3651,
      3614,
      3615,
      3652,
      3653,
      2844,
      3654
    ]
  },
  {
    "name": "Jiacheng Shi",
    "display_name": "Jiacheng Shi",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "A Hardware-Software Co-Design for Efficient Secure Containers",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Serverless Functions Made Confidential and Efficient with Split Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 947,
    "paper_ids": [
      1685,
      39
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ran Shu 0001",
    "display_name": "Ran Shu",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2014": 1,
        "2019": 1,
        "2023": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Daredevil: Rescue Your Flash Storage from Inflexible Kernel Storage Stack",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PilotFish: Harvesting Free Cycles of Cloud Gaming with Deep Learning Training",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ark gpudriven code execution for distributed deep learning",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "direct universal access making data center resources available to fpga",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "catch the whole lot in an action rapid precise packet loss notification in data center",
        "conference": "NSDI",
        "year": 2014
      }
    ],
    "author_id": 948,
    "paper_ids": [
      2778,
      149
    ],
    "papers_without_artifact_ids": [
      3460,
      3461,
      3463
    ]
  },
  {
    "name": "Yu Hua 0001",
    "display_name": "Yu Hua",
    "affiliation": "HUST",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1,
      "SC": 0,
      "FAST": 5,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2023": 1
      },
      "SC": {},
      "FAST": {
        "2015": 1,
        "2023": 1,
        "2022": 1,
        "2019": 1,
        "2025": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LOFT: A Lock-free and Adaptive Learned Index with High Scalability for Dynamic Workloads",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Light-Dedup: A Light-weight Inline Deduplication Framework for Non-Volatile Memory File Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gphash an efficient hash index for gpu with bytegranularity persistent memory",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "motor enabling multiversioning for distributed transactions on disaggregated memory",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "rolex a scalable rdmaoriented learned keyvalue store for disaggregated memory systems",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "ford fast onesided rdmabased distributed transactions for disaggregated persistent memory",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "finesse finegrained feature locality based fast resemblance detection for postdeduplication delta compression",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "design tradeoffs for data deduplication performance in backup workloads",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 460,
    "paper_ids": [
      3655,
      2062
    ],
    "papers_without_artifact_ids": [
      3656,
      3657,
      1614,
      1615,
      2066,
      2067
    ]
  },
  {
    "name": "Martin Kleppmann",
    "display_name": "Martin Kleppmann",
    "affiliation": "University of Cambridge",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 4,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2024": 2,
        "2022": 1
      },
      "PETS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Collaborative Text Editing with Eg-walker: Better, Faster, Smaller",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "undo and redo support for replicated registers",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "extending json crdts with move operations",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "making crdts byzantine fault tolerant",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 950,
    "paper_ids": [
      3658,
      3273
    ],
    "papers_without_artifact_ids": [
      3659,
      3660,
      3661
    ]
  },
  {
    "name": "Ziming Miao",
    "display_name": "Ziming Miao",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 3,
      "EUROSYS": 1,
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2023": 2
      },
      "EUROSYS": {
        "2025": 1
      },
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "NeuStream: Bridging Deep Learning Serving and Stream Processing",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Welder: Scheduling Deep Learning Memory Access via Tile-graph",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ladder enabling efficient lowprecision deep learning computing through hardwareaware tensor transformation",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "scaling deep learning computation over the intercore connected intelligence processor with t10",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "cocktailer analyzing and optimizing dynamic control flow in deep learning",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 951,
    "paper_ids": [
      1034,
      153
    ],
    "papers_without_artifact_ids": [
      159,
      1035,
      162
    ]
  },
  {
    "name": "Orran Krieger",
    "display_name": "Orran Krieger",
    "affiliation": "Boston University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 0,
      "FAST": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1,
        "2022": 1
      },
      "ATC": {},
      "FAST": {
        "2021": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unikernel Linux (UKL)",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Beating the I/O bottleneck: a case for log-structured virtual disks",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a community cache with complete information",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 952,
    "paper_ids": [
      3662,
      3476
    ],
    "papers_without_artifact_ids": [
      3663
    ]
  },
  {
    "name": "Gauthier Voron",
    "display_name": "Gauthier Voron",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Diablo: A Benchmark Suite for Blockchains",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Chop Chop: Byzantine Atomic Broadcast to the Network Limit",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 953,
    "paper_ids": [
      1379,
      1381
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Indranil Gupta",
    "display_name": "Indranil Gupta",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 3,
      "SOSP": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2023": 1,
        "2021": 1
      },
      "SOSP": {},
      "NSDI": {
        "2021": 1,
        "2024": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Fail through the Cracks: Cross-System Interaction Failures in Modern Cloud Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Home, safehome: smart home reliability with visibility and atomicity",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a house united within itself sloawareness for onpremises containerized ml inference clusters via faro",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "known knowns and unknowns nearrealtime earth observation via query bifurcation in serval",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "move fast and meet deadlines finegrained realtime stream processing with cameo",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 954,
    "paper_ids": [
      619,
      3664
    ],
    "papers_without_artifact_ids": [
      2646,
      3665,
      1312
    ]
  },
  {
    "name": "Jinwoo Jeong",
    "display_name": "Jinwoo Jeong",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Fast and Efficient Model Serving Using Multi-GPUs with Direct-Host-Access",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Memory Harvesting in Multi-GPU Systems with Hierarchical Unified Virtual Memory",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 955,
    "paper_ids": [
      2825,
      348
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Inho Cho",
    "display_name": "Inho Cho",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "NSDI": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "FlexPass: A Case for Flexible Credit-based Transport for Datacenter Networks",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Overload Control for µs-scale RPCs with Breakwater",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ldb an efficient latency profiling tool for multithreaded applications",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "protego overload control for applications with unpredictable lock contention",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 2527,
    "paper_ids": [
      3666,
      2634
    ],
    "papers_without_artifact_ids": [
      2637,
      2640
    ]
  },
  {
    "name": "Mohamed Alzayat",
    "display_name": "Mohamed Alzayat",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Groundhog: Efficient Request Isolation in FaaS",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 956,
    "paper_ids": [
      1965,
      1966
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junfeng Yang",
    "display_name": "Junfeng Yang",
    "affiliation": "Columbia University",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "OSDI": 3,
      "EUROSYS": 2,
      "SOSP": 0,
      "ATC": 0,
      "USENIXSEC": 0,
      "NSDI": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 2,
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2023": 1
      },
      "SOSP": {},
      "ATC": {},
      "USENIXSEC": {},
      "NSDI": {
        "2009": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Effective Performance Issue Diagnosis with Value-Assisted Cost Profiling",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "XRP: In-Kernel Storage Functions with eBPF",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dpack efficiencyoriented privacy budget scheduling",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "quack hindering deserialization attacks via static duck typing",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "chardonnay fast and general datacenter transactions for ondisk databases",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "upgradvisor early adopting dependency updates using hybrid program analysis and hardware tracing",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "modist transparent model checking of unmodified distributed systems",
        "conference": "NSDI",
        "year": 2009
      }
    ],
    "author_id": 957,
    "paper_ids": [
      1922,
      1355
    ],
    "papers_without_artifact_ids": [
      1357,
      3667,
      1360,
      2004,
      294
    ]
  },
  {
    "name": "Roger Waleffe",
    "display_name": "Roger Waleffe",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MariusGNN: Resource-Efficient Out-of-Core Training of Graph Neural Networks",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Marius: Learning Massive Graph Embeddings on a Single Machine",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 958,
    "paper_ids": [
      1308,
      1309
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jason Mohoney",
    "display_name": "Jason Mohoney",
    "affiliation": "University of Wisconsin-Madison, Madison, Wisconsin, USA",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MariusGNN: Resource-Efficient Out-of-Core Training of Graph Neural Networks",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Marius: Learning Massive Graph Embeddings on a Single Machine",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 466,
    "paper_ids": [
      1308,
      1309
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Theodoros Rekatsinas",
    "display_name": "Theodoros Rekatsinas",
    "affiliation": "ETH Zurich, Zurich, Switzerland",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MariusGNN: Resource-Efficient Out-of-Core Training of Graph Neural Networks",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Marius: Learning Massive Graph Embeddings on a Single Machine",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 467,
    "paper_ids": [
      1308,
      1309
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haibin Lin",
    "display_name": "Haibin Lin",
    "affiliation": "ByteDance Inc., Mountain View, California, USA",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "EUROSYS": 3,
      "SOSP": 0,
      "ATC": 0,
      "NSDI": 3,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2023": 1,
        "2024": 1
      },
      "SOSP": {},
      "ATC": {},
      "NSDI": {
        "2024": 1,
        "2025": 2
      },
      "OSDI": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hi-Speed DNN Training with Espresso: Unleashing the Full Potential of Gradient Compression with Near-Optimal Usage Strategies",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CDMPP: A Device-Model Agnostic Framework for Latency Prediction of Tensor Programs",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hybridflow a flexible and efficient rlhf framework",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "minder faulty machine detection for largescale distributed model training",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "bytecheckpoint a unified checkpointing system for large foundation model development",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "megascale scaling large language model training to more than 10 000 gpus",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 468,
    "paper_ids": [
      2828,
      2829
    ],
    "papers_without_artifact_ids": [
      2856,
      3668,
      2857,
      1001
    ]
  },
  {
    "name": "Guangyan Zhang",
    "display_name": "Guangyan Zhang",
    "affiliation": "Tsinghua University",
    "artifact_count": 2,
    "total_papers": 10,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1,
      "SOSP": 1,
      "FAST": 7
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {
        "2024": 1
      },
      "SOSP": {
        "2023": 1
      },
      "FAST": {
        "2021": 2,
        "2011": 1,
        "2026": 2,
        "2018": 1,
        "2022": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LogGrep: Fast and Cheap Cloud Log Storage by Exploiting both Static and Runtime Patterns",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "StreamCache: Revisiting Page Cache for File Scanning on Fast Storage Devices",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bidaw enhancing keyvalue caching for interactive llm serving via bidirectional computationstorage awareness",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "drboost boosting degraded read performance in msrcoded storage clusters",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "understanding silent data corruptions in a large production cpu population",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "aurogon taming aborts in all phases for distributed inmemory transactions",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "on the feasibility of parserbased log compression in largescale cloud systems",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "fusionraid achieving consistent low latency for commodity ssd arrays",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "raid deterministic and balanced data distribution for large disk enclosures",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "fastscale accelerate raid scaling by minimizing data migration",
        "conference": "FAST",
        "year": 2011
      }
    ],
    "author_id": 959,
    "paper_ids": [
      2085,
      3669
    ],
    "papers_without_artifact_ids": [
      3670,
      3671,
      2095,
      3672,
      3673,
      3674,
      3675,
      3676
    ]
  },
  {
    "name": "Yang Wang 0009",
    "display_name": "Yang Wang",
    "affiliation": "Ohio State University",
    "artifact_count": 2,
    "total_papers": 10,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SOSP": 2,
      "ATC": 0,
      "FAST": 1,
      "NSDI": 2,
      "OSDI": 3
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1,
        "2021": 1
      },
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "ATC": {},
      "FAST": {
        "2021": 1
      },
      "NSDI": {
        "2013": 1,
        "2014": 1
      },
      "OSDI": {
        "2024": 2,
        "2023": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LogGrep: Fast and Cheap Cloud Log Storage by Exploiting both Static and Runtime Patterns",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Finding heterogeneous-unsafe configuration parameters in cloud systems",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mast global scheduling of ml training across geodistributed datacenters at hyperscale",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "servicelab preventing tiny performance regressions at hyperscale through preproduction testing",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "fbdetect catching tiny performance regressions at hyperscale through inproduction monitoring",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "conveyor onetoolfitsall continuous software deployment at meta",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "understanding silent data corruptions in a large production cpu population",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "on the feasibility of parserbased log compression in largescale cloud systems",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "exalt empowering researchers to evaluate largescale storage systems",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "robustness in the salus scalable block store",
        "conference": "NSDI",
        "year": 2013
      }
    ],
    "author_id": 960,
    "paper_ids": [
      2085,
      3677
    ],
    "papers_without_artifact_ids": [
      3678,
      3679,
      3680,
      3681,
      2095,
      3673,
      2692,
      2693
    ]
  },
  {
    "name": "David Detweiler",
    "display_name": "David Detweiler",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 1,
      "SOSP": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "SOSP": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "DRAMHiT: A Hash Table Architected for the Speed of DRAM",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "KSplit: Automating Device Driver Isolation",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "extending rust with support for zero copy communication",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "isolation in rust what is missing",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "redleaf isolation and communication in a safe operating system",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 961,
    "paper_ids": [
      2834,
      2166
    ],
    "papers_without_artifact_ids": [
      2838,
      2841,
      2842
    ]
  },
  {
    "name": "Ahmed M. Abdelmoniem",
    "display_name": "Ahmed M. Abdelmoniem",
    "affiliation": "Queen Mary University of London",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 5
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1,
        "2024": 2,
        "2021": 1,
        "2022": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "REFL: Resource-Efficient Federated Learning",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "FLOAT: Federated Learning Optimizations with Automated Tuning",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "comparative profiling insights into latent diffusion model training",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "empirical analysis of federated learning in heterogeneous environments",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "towards mitigating device heterogeneity in federated learning via adaptive model quantization",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 962,
    "paper_ids": [
      1647,
      3682
    ],
    "papers_without_artifact_ids": [
      3683,
      1650,
      1652
    ]
  },
  {
    "name": "Ada Gavrilovska",
    "display_name": "Ada Gavrilovska",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "PETS": 1,
      "SOSP": 0,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "PETS": {
        "2024": 1
      },
      "SOSP": {},
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "PETS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pocket: ML Serving from the Edge",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Snail: Secure Single Iteration Localization",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 963,
    "paper_ids": [
      3684,
      3685
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Costin Lupu",
    "display_name": "Costin Lupu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1,
        "2021": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Nephele: Extending Virtualization Environments for Cloning Unikernel-based VMs",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Unikraft: fast, specialized unikernels the easy way",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 964,
    "paper_ids": [
      3686,
      3687
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Razvan Deaconescu",
    "display_name": "Razvan Deaconescu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1,
        "2021": 1
      },
      "NSDI": {
        "2015": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Nephele: Extending Virtualization Environments for Cloning Unikernel-based VMs",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Unikraft: fast, specialized unikernels the easy way",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "increasing datacenter network utilisation with grin",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 965,
    "paper_ids": [
      3686,
      3687
    ],
    "papers_without_artifact_ids": [
      3688
    ]
  },
  {
    "name": "Costin Raiciu",
    "display_name": "Costin Raiciu",
    "affiliation": "University Politehnica of Bucharest",
    "artifact_count": 2,
    "total_papers": 10,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SOSP": 0,
      "NSDI": 8
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1,
        "2021": 1
      },
      "SOSP": {},
      "NSDI": {
        "2014": 1,
        "2019": 1,
        "2012": 1,
        "2022": 1,
        "2018": 1,
        "2011": 1,
        "2015": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Nephele: Extending Virtualization Environments for Cloning Unikernel-based VMs",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Unikraft: fast, specialized unikernels the easy way",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an edgequeued datagram service for all datacenter traffic",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "dataplane equivalence and its applications",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "stateless datacenter loadbalancing with beamer",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "increasing datacenter network utilisation with grin",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "towards wifi mobility without fast handover",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "clickos and the art of network function virtualization",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "how hard can it be designing and implementing a deployable multipath tcp",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "design implementation and evaluation of congestion control for multipath tcp",
        "conference": "NSDI",
        "year": 2011
      }
    ],
    "author_id": 966,
    "paper_ids": [
      3686,
      3687
    ],
    "papers_without_artifact_ids": [
      3689,
      3690,
      3691,
      3688,
      3692,
      3693,
      3694,
      3695
    ]
  },
  {
    "name": "Mingyu Wu 0001",
    "display_name": "Mingyu Wu",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 4,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 3,
        "2021": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Characterization and Reclamation of Frozen Garbage in Managed FaaS Workloads",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Zero-Change Object Transmission for Distributed Big Data Analytics",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "serializationdeserializationfree state transfer in serverless workflows",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "jade a highthroughput concurrent copying garbage collector",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "bridging the performance gap for copybased garbage collectors atop nonvolatile memory",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 968,
    "paper_ids": [
      33,
      35
    ],
    "papers_without_artifact_ids": [
      54,
      55,
      70
    ]
  },
  {
    "name": "Michael Stumm",
    "display_name": "Michael Stumm",
    "affiliation": "University of Toronto",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1,
      "SOSP": 1,
      "SC": 0,
      "FAST": 3,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2022": 1
      },
      "SOSP": {
        "2021": 1
      },
      "SC": {},
      "FAST": {
        "2024": 1,
        "2021": 1,
        "2022": 1
      },
      "NSDI": {
        "2016": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 28.6,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "TTLs Matter: Efficient Cache Sizing with TTL-Aware Miss Ratio Curves and Working Set Sizes",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Investigating Managed Language Runtime Performance: Why JavaScript and Python are 8x and 29x slower than C++, yet Java and Go can be Faster?",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "kosmo efficient online miss ratio curve generation for eviction policy evaluation",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "ctfs replacing file indexing with hardware memory translation through contiguous file allocation for persistent memory",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "evolution of development priorities in keyvalue stores serving largescale applications the rocksdb experience",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "bladerunner stream processing at scale for a live view of backend data mutations at the edge",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "social hash an assignment framework for optimizing distributed systems operations on social networks",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 475,
    "paper_ids": [
      3696,
      1632
    ],
    "papers_without_artifact_ids": [
      3697,
      1635,
      3698,
      3699,
      3700
    ]
  },
  {
    "name": "Haoliang Wang",
    "display_name": "Haoliang Wang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GMorph: Accelerating Multi-DNN Inference via Model Fusion",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ALPS: An Adaptive Learning, Priority OS Scheduler for Serverless Functions",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 971,
    "paper_ids": [
      3701,
      3702
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marco Serafini",
    "display_name": "Marco Serafini",
    "affiliation": "Univ. of Massachusetts Amherst",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SOSP": 0,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2021": 1
      },
      "SOSP": {},
      "ATC": {},
      "NSDI": {
        "2015": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GMorph: Accelerating Multi-DNN Inference via Model Fusion",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Accelerating graph sampling for graph machine learning using GPUs",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scalable error isolation for distributed systems",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 972,
    "paper_ids": [
      3701,
      3703
    ],
    "papers_without_artifact_ids": [
      2681
    ]
  },
  {
    "name": "Ruiming Lu",
    "display_name": "Ruiming Lu",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1,
      "FAST": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2026": 1,
        "2023": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CSAL: the Next-Gen Local Disks for the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "NVMe SSD Failures in the Field: the Fail-Stop and the Fail-Slow",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "here there and everywhere the past the present and the future of local storage in cloud",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "onesizefitsnone understanding and enhancing slowfault tolerance in modern distributed systems",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "perseus a failslow detection framework for cloud storage systems",
        "conference": "FAST",
        "year": 2023
      }
    ],
    "author_id": 973,
    "paper_ids": [
      2086,
      2087
    ],
    "papers_without_artifact_ids": [
      2089,
      1925,
      1062
    ]
  },
  {
    "name": "Yuyang Jin 0001",
    "display_name": "Yuyang Jin",
    "affiliation": "IISc Bangalore",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "WiseGraph: Optimizing GNN with Joint Workload Partition of Graph and Operations",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PUZZLE: Efficiently Aligning Large Language Models through Light-Weight Context Switch",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 974,
    "paper_ids": [
      2097,
      2098
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bingyu Shen 0002",
    "display_name": "Bingyu Shen",
    "affiliation": "VU Amsterdam",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2,
        "2021": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective Bug Detection with Unused Definitions",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Improving Logging to Reduce Permission Over-Granting Mistakes",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "multiview finding blind spots in accessdeny issues diagnosis",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "can systems explain permissions better understanding users misperceptions under smartphone runtime permission model",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 975,
    "paper_ids": [
      3704,
      3705
    ],
    "papers_without_artifact_ids": [
      3706,
      3707
    ]
  },
  {
    "name": "Yuanyuan Zhou 0001",
    "display_name": "Yuanyuan Zhou",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "EUROSYS": 1,
      "SOSP": 0,
      "SC": 0,
      "ATC": 0,
      "ACSAC": 0,
      "FAST": 3,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2,
        "2021": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "SOSP": {},
      "SC": {},
      "ATC": {},
      "ACSAC": {},
      "FAST": {
        "2009": 1,
        "2008": 1,
        "2004": 1
      },
      "NSDI": {
        "2013": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective Bug Detection with Unused Definitions",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Improving Logging to Reduce Permission Over-Granting Mistakes",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "multiview finding blind spots in accessdeny issues diagnosis",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "can systems explain permissions better understanding users misperceptions under smartphone runtime permission model",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "edoctor automatically diagnosing abnormal battery drain issues on smartphones",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "understanding customer problem troubleshooting from storage system logs",
        "conference": "FAST",
        "year": 2009
      },
      {
        "title": "are disks the dominant contributor for storage failures a comprehensive study of storage subsystem failure characteristics",
        "conference": "FAST",
        "year": 2008
      },
      {
        "title": "cminer mining block correlations in storage systems",
        "conference": "FAST",
        "year": 2004
      }
    ],
    "author_id": 976,
    "paper_ids": [
      3704,
      3705
    ],
    "papers_without_artifact_ids": [
      3706,
      3707,
      1933,
      3708,
      3709,
      3710
    ]
  },
  {
    "name": "Yaodong Han",
    "display_name": "Yaodong Han",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLOWS: Balanced MRC Profiling for Heterogeneous Object-Size Cache",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "FAERY: An FPGA-accelerated Embedding-based Retrieval System",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 977,
    "paper_ids": [
      2103,
      3711
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qiang Wang",
    "display_name": "Qiang Wang",
    "affiliation": "Tencent",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Improving GPU Energy Efficiency through an Application-transparent Frequency Scaling Policy with Performance Assurance",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "RunD: A Lightweight Secure Container Runtime for High-density Deployment and High-concurrency Startup in Serverless Computing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 978,
    "paper_ids": [
      3712,
      1087
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Umesh Deshpande",
    "display_name": "Umesh Deshpande",
    "affiliation": "VNIT Nagpur",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Atlas: Hybrid Cloud Migration Advisor for Interactive Microservices",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DeepRest: deep resource estimation for interactive microservices",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 979,
    "paper_ids": [
      3713,
      3714
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sangeetha Seshadri",
    "display_name": "Sangeetha Seshadri",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SOSP": 0,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2022": 1
      },
      "SOSP": {},
      "FAST": {
        "2009": 1,
        "2008": 1,
        "2014": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Atlas: Hybrid Cloud Migration Advisor for Interactive Microservices",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DeepRest: deep resource estimation for interactive microservices",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "evaluating phase change memory for enterprise storage systems a study of caching and tiering approaches",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "a systematic approach to system state restoration during storage controller microrecovery",
        "conference": "FAST",
        "year": 2009
      },
      {
        "title": "enhancing storage system availability on multicore architectures with recoveryconscious scheduling",
        "conference": "FAST",
        "year": 2008
      }
    ],
    "author_id": 980,
    "paper_ids": [
      3713,
      3714
    ],
    "papers_without_artifact_ids": [
      3715,
      3716,
      3717
    ]
  },
  {
    "name": "Ling Liu 0001",
    "display_name": "Ling Liu",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SC": 0,
      "ATC": 0,
      "ACSAC": 0,
      "FAST": 2,
      "USENIXSEC": 0,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2022": 1
      },
      "SC": {},
      "ATC": {},
      "ACSAC": {},
      "FAST": {
        "2009": 1,
        "2008": 1
      },
      "USENIXSEC": {},
      "PETS": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Atlas: Hybrid Cloud Migration Advisor for Interactive Microservices",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DeepRest: deep resource estimation for interactive microservices",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diversitydriven privacy protection masks against unauthorized face recognition",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "a systematic approach to system state restoration during storage controller microrecovery",
        "conference": "FAST",
        "year": 2009
      },
      {
        "title": "enhancing storage system availability on multicore architectures with recoveryconscious scheduling",
        "conference": "FAST",
        "year": 2008
      }
    ],
    "author_id": 981,
    "paper_ids": [
      3713,
      3714
    ],
    "papers_without_artifact_ids": [
      3718,
      3716,
      3717
    ]
  },
  {
    "name": "Thomas E. Anderson",
    "display_name": "Thomas E. Anderson",
    "affiliation": "University of Washington",
    "artifact_count": 2,
    "total_papers": 22,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 0,
      "ACSAC": 1,
      "FAST": 1,
      "USENIXSEC": 0,
      "NSDI": 18
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "SOSP": {},
      "ATC": {},
      "ACSAC": {
        "2020": 1
      },
      "FAST": {
        "2021": 1
      },
      "USENIXSEC": {},
      "NSDI": {
        "2013": 1,
        "2009": 1,
        "2017": 2,
        "2019": 1,
        "2023": 1,
        "2010": 1,
        "2006": 1,
        "2022": 1,
        "2008": 4,
        "2005": 1,
        "2018": 1,
        "2011": 1,
        "2007": 2
      }
    },
    "artifact_rate": 9.1,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Enoki: High Velocity Linux Kernel Scheduler Development",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Assise: Performance and Availability via Client-local NVM in a Distributed File System",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scalable tail latency estimation for data center networks",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "backpressure flow control",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "high velocity kernel file systems with bento",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "talek private group messaging with hidden access patterns",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "slim os kernel support for a lowoverhead container overlay network",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "deepview virtual disk failure diagnosis and pattern detection for azure",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "rail a case for redundant arrays of inexpensive links in data center networks",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "evaluating the power of flexible packet processing for network resource allocation",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "f10 a faulttolerant engineered network",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "ettm a scalable fault tolerant network manager",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "reverse traceroute",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "iplane nano path prediction for peertopeer applications",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "consensus routing the internet as a distributed system best paper",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "one hop reputations for peer to peer file sharing workloads",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "phalanx withstanding multimillionnode botnets",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "studying black holes in the internet with hubble",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "mutually controlled routing with independent isps",
        "conference": "NSDI",
        "year": 2007
      },
      {
        "title": "do incentives build robustness in bittorrent awarded best student paper",
        "conference": "NSDI",
        "year": 2007
      },
      {
        "title": "pcp efficient endpoint congestion control",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "negotiationbased routing between neighboring isps",
        "conference": "NSDI",
        "year": 2005
      }
    ],
    "author_id": 982,
    "paper_ids": [
      695,
      352
    ],
    "papers_without_artifact_ids": [
      3719,
      3720,
      707,
      726,
      2122,
      3721,
      2123,
      1372,
      1945,
      3722,
      3440,
      3441,
      3723,
      3724,
      3725,
      3442,
      3726,
      3727,
      3728,
      3729
    ]
  },
  {
    "name": "Chen Tian 0001",
    "display_name": "Chen Tian",
    "affiliation": "Nanjing University",
    "artifact_count": 2,
    "total_papers": 13,
    "total_papers_by_conf": {
      "EUROSYS": 4,
      "ATC": 2,
      "FAST": 1,
      "NSDI": 5,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 3,
        "2024": 1
      },
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "FAST": {
        "2018": 1
      },
      "NSDI": {
        "2021": 1,
        "2025": 2,
        "2023": 1,
        "2015": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 15.4,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Unison: A Parallel-Efficient and User-Transparent Network Simulation Kernel",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "GLogS: Interactive Graph Pattern Matching Query At Large Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enabling virtual priority in data center congestion control",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "bingo radixbased bias factorization for random walk on dynamic graphs",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "marlin enabling highthroughput congestion control testing in largescale networks",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "when p4 meets runtocompletion architecture",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "pyrrha congestionrootbased flow control to eliminate headofline blocking in datacenter",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "cyberstar simple elastic and costeffective network functions management in cloud network at scale",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "norma towards practical network load testing",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "flor an open high performance rdma framework over heterogeneous rnics",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "when cloud storage meets rdma",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "uksm swift memory deduplication via hierarchical and adaptive memory region distilling",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "informationagnostic flow scheduling for commodity data centers",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 983,
    "paper_ids": [
      996,
      2146
    ],
    "papers_without_artifact_ids": [
      2876,
      3587,
      2878,
      2879,
      2881,
      3730,
      2883,
      1065,
      2096,
      3589,
      2718
    ]
  },
  {
    "name": "Noman Bashir",
    "display_name": "Noman Bashir",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2021": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "On the Limitations of Carbon-Aware Temporal and Spatial Workload Shifting in the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Take it to the limit: peak prediction-driven resource overcommitment in datacenters",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 984,
    "paper_ids": [
      3731,
      3732
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Irwin 0001",
    "display_name": "David Irwin",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SC": 0,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2021": 1
      },
      "SC": {},
      "ATC": {},
      "NSDI": {
        "2013": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "On the Limitations of Carbon-Aware Temporal and Spatial Workload Shifting in the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Take it to the limit: peak prediction-driven resource overcommitment in datacenters",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "yank enabling green data centers to pull the plug",
        "conference": "NSDI",
        "year": 2013
      }
    ],
    "author_id": 985,
    "paper_ids": [
      3731,
      3732
    ],
    "papers_without_artifact_ids": [
      3733
    ]
  },
  {
    "name": "Youshan Miao",
    "display_name": "Youshan Miao",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "SOSP": {},
      "ATC": {},
      "NSDI": {
        "2017": 1,
        "2025": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Aceso: Efficient Parallel DNN Training through Iterative Bottleneck Alleviation",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rammer: Enabling Holistic Deep Learning Compiler Optimizations with rTasks",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "autoccl automated collective communication tuning for accelerating distributed and parallel dnn training",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "nnscaler constraintguided parallelization plan generation for deep learning training",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "tux",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 986,
    "paper_ids": [
      148,
      156
    ],
    "papers_without_artifact_ids": [
      3734,
      158,
      291
    ]
  },
  {
    "name": "Steven Swanson",
    "display_name": "Steven Swanson",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 2,
    "total_papers": 13,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "SOSP": 0,
      "SC": 0,
      "ATC": 1,
      "FAST": 8,
      "NSDI": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "SOSP": {},
      "SC": {},
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2011": 1,
        "2016": 1,
        "2020": 1,
        "2012": 1,
        "2014": 2,
        "2019": 2
      },
      "NSDI": {
        "2017": 1,
        "2020": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 15.4,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Puddles: Application-Independent Recovery and Location-Independent Data for Persistent Memory",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "zhuque failure is not an option its an exception",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "an empirical guide to the behavior and use of scalable persistent memory",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "filemr rethinking rdma networking for scalable persistent memory",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "orion a distributed file system for nonvolatile main memory and rdmacapable networks",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "ziggurat a tiered file system for nonvolatile main memories and disks",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "vcorfu a cloudscale object store on a shared log",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "nova a logstructured file system for hybrid volatilenonvolatile main memories",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "on the energy overhead of mobile storage systems",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "dc express shortest latency protocol for reading phase change memory over pci express",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "the bleak future of nand flash memory",
        "conference": "FAST",
        "year": 2012
      },
      {
        "title": "reliably erasing data from flashbased solid state drives",
        "conference": "FAST",
        "year": 2011
      }
    ],
    "author_id": 987,
    "paper_ids": [
      3735,
      3221
    ],
    "papers_without_artifact_ids": [
      3736,
      3737,
      3738,
      3739,
      3740,
      3444,
      3741,
      3742,
      3743,
      3744,
      3745
    ]
  },
  {
    "name": "Sultan Mahmud Sajal",
    "display_name": "Sultan Mahmud Sajal",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2021": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TraceUpscaler: Upscaling Traces to Evaluate Systems at High Load",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TraceSplitter: a new paradigm for downscaling traces",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "kerveros efficient and scalable cloud admission control",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 988,
    "paper_ids": [
      2124,
      2125
    ],
    "papers_without_artifact_ids": [
      2889
    ]
  },
  {
    "name": "Bhuvan Urgaonkar",
    "display_name": "Bhuvan Urgaonkar",
    "affiliation": "Pennsylvania State University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SOSP": 0,
      "ATC": 0,
      "FAST": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2021": 1
      },
      "SOSP": {},
      "ATC": {},
      "FAST": {
        "2011": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TraceUpscaler: Upscaling Traces to Evaluate Systems at High Load",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TraceSplitter: a new paradigm for downscaling traces",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "leveraging value locality in optimizing nand flashbased ssds",
        "conference": "FAST",
        "year": 2011
      }
    ],
    "author_id": 989,
    "paper_ids": [
      2124,
      2125
    ],
    "papers_without_artifact_ids": [
      3746
    ]
  },
  {
    "name": "Keval Vora",
    "display_name": "Keval Vora",
    "affiliation": "Simon Fraser University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 3,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {
        "2023": 1,
        "2024": 1,
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DZiG: sparsity-aware incremental processing of streaming graphs",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "contigra graph mining with containment constraints",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "accelerating graph mining systems with subgraph morphing",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 990,
    "paper_ids": [
      3747,
      1617
    ],
    "papers_without_artifact_ids": [
      3748,
      3749
    ]
  },
  {
    "name": "Antonios Katsarakis",
    "display_name": "Antonios Katsarakis",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 3
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2021": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Zeus: locality-aware distributed transactions",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Odyssey: the impact of modern hardware on strongly-consistent replication protocols",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unanimous 2pc faulttolerant distributed transactions can be fast and simple",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 991,
    "paper_ids": [
      3750,
      3751
    ],
    "papers_without_artifact_ids": [
      3752
    ]
  },
  {
    "name": "Yidi Wu 0001",
    "display_name": "Yidi Wu",
    "affiliation": "IISc Bangalore",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 2
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Seastar: vertex-centric programming for graph neural networks",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DGCL: an efficient communication library for distributed GNN training",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 992,
    "paper_ids": [
      2661,
      2662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kaihao Ma",
    "display_name": "Kaihao Ma",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Seastar: vertex-centric programming for graph neural networks",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DGCL: an efficient communication library for distributed GNN training",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 993,
    "paper_ids": [
      2661,
      2662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "James Cheng",
    "display_name": "James Cheng",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 2
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Seastar: vertex-centric programming for graph neural networks",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DGCL: an efficient communication library for distributed GNN training",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 994,
    "paper_ids": [
      2661,
      2662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fan Yu",
    "display_name": "Fan Yu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 2
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Seastar: vertex-centric programming for graph neural networks",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DGCL: an efficient communication library for distributed GNN training",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 995,
    "paper_ids": [
      2661,
      2662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nikos Vasilakis",
    "display_name": "Nikos Vasilakis",
    "affiliation": "Brown University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 0,
      "ACSAC": 1,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "SOSP": {},
      "ATC": {},
      "ACSAC": {
        "2022": 1
      },
      "NSDI": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "PaSh: light-touch data-parallel shell processing",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Practically Correct, Just-in-Time Shell Script Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dish dynamic shellscript distribution",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "towards practical applicationlevel support for privilege separation",
        "conference": "ACSAC",
        "year": 2022
      }
    ],
    "author_id": 996,
    "paper_ids": [
      3550,
      3753
    ],
    "papers_without_artifact_ids": [
      3754,
      3529
    ]
  },
  {
    "name": "Konstantinos Kallas",
    "display_name": "Konstantinos Kallas",
    "affiliation": "Univ. of California - Los Angeles",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {},
      "NSDI": {
        "2024": 1,
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "PaSh: light-touch data-parallel shell processing",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Practically Correct, Just-in-Time Shell Script Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rajomon decentralized and coordinated overload control for latencysensitive microservices",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "mucache a general framework for caching in microservice graphs",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "dish dynamic shellscript distribution",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 997,
    "paper_ids": [
      3550,
      3753
    ],
    "papers_without_artifact_ids": [
      3458,
      1082,
      3754
    ]
  },
  {
    "name": "Jörg Thalheim",
    "display_name": "Jörg Thalheim",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1,
        "2022": 1
      },
      "ATC": {},
      "FAST": {
        "2019": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "rkt-io: a direct I/O stack for shielded execution",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "VMSH: hypervisor-agnostic guest overlays for VMs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "speicher securing lsmbased keyvalue stores using shielded execution",
        "conference": "FAST",
        "year": 2019
      }
    ],
    "author_id": 7928,
    "paper_ids": [
      1386,
      2134
    ],
    "papers_without_artifact_ids": [
      2138
    ]
  },
  {
    "name": "Michael D. Bond",
    "display_name": "Michael D. Bond",
    "affiliation": "Ohio State University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Finding heterogeneous-unsafe configuration parameters in cloud systems",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Semeru: A Memory-Disaggregated Managed Runtime",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 999,
    "paper_ids": [
      3677,
      2611
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohammad Alizadeh",
    "display_name": "Mohammad Alizadeh",
    "affiliation": "Massachusetts Inst. of Technology",
    "artifact_count": 2,
    "total_papers": 19,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "NSDI": 17
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "NSDI": {
        "2021": 1,
        "2013": 1,
        "2017": 1,
        "2024": 2,
        "2019": 2,
        "2023": 4,
        "2012": 1,
        "2016": 1,
        "2020": 2,
        "2022": 2
      }
    },
    "artifact_rate": 10.5,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Site-to-site internet traffic control",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Overload Control for µs-scale RPCs with Breakwater",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gemino practical and robust neural compression for video conferencing",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "ldb an efficient latency profiling tool for multithreaded applications",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "recl responsive resourceefficient continuous learning for video analytics",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "scalable tail latency estimation for data center networks",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "protego overload control for applications with unpredictable lock contention",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "causalsim a causal framework for unbiased tracedriven simulation",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "backpressure flow control",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "dispersedledger highthroughput byzantine consensus on variable bandwidth networks",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "breaking the transienceequilibrium nexus a new approach to datacenter packet transport",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "high throughput cryptocurrency routing in payment channel networks",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "abc a simple explicit congestion controller for wireless networks",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "flashield a hybrid keyvalue cache that controls flash write amplification",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "deter deterministic tcp replay for performance diagnosis",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "let it flow resilient asymmetric load balancing with flowlet switching",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "cliffhanger scaling performance cliffs in web memory caches",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "eyeq practical network performance isolation at the edge",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "less is more trading a little bandwidth for ultralow latency in the data center",
        "conference": "NSDI",
        "year": 2012
      }
    ],
    "author_id": 2754,
    "paper_ids": [
      3755,
      2634
    ],
    "papers_without_artifact_ids": [
      3756,
      2637,
      2623,
      3719,
      2640,
      3757,
      3720,
      3758,
      3759,
      3760,
      2628,
      1363,
      3761,
      3762,
      1365,
      3763,
      3764
    ]
  },
  {
    "name": "Nadav Amit",
    "display_name": "Nadav Amit",
    "affiliation": "Technion",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1,
      "SOSP": 0,
      "FAST": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {
        "2024": 1
      },
      "SOSP": {},
      "FAST": {
        "2015": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Characterizing, exploiting, and detecting DMA code injection vulnerabilities in the presence of an IOMMU",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Every Mapping Counts in Large Amounts: Folio Accounting",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "eden developerfriendly applicationintegrated far memory",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "efficient intraoperating system protection against harmful dmas",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 1000,
    "paper_ids": [
      3765,
      3577
    ],
    "papers_without_artifact_ids": [
      3449,
      3766
    ]
  },
  {
    "name": "Adam Morrison 0001",
    "display_name": "Adam Morrison",
    "affiliation": "Tel Aviv University",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 2,
      "SOSP": 1,
      "SC": 0,
      "USENIXSEC": 2,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {
        "2022": 1,
        "2023": 1
      },
      "SOSP": {
        "2021": 1
      },
      "SC": {},
      "USENIXSEC": {
        "2022": 1,
        "2021": 1
      },
      "OSDI": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "EUROSYS"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Characterizing, exploiting, and detecting DMA code injection vulnerabilities in the presence of an IOMMU",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Privbox: Faster System Calls Through Sandboxed Privileged Execution",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "prefix siphoning exploiting lsmtree range filters for information disclosure",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "shring networking with shared receive rings",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "occualizer optimistic concurrent search trees from sequential code",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "binoculars contentionbased sidechannel attacks exploiting the page walker",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "cuckoo trie exploiting memorylevel parallelism for efficient dram indexing",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "an analysis of speculative type confusion vulnerabilities in the wild",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1001,
    "paper_ids": [
      3765,
      3767
    ],
    "papers_without_artifact_ids": [
      3768,
      3769,
      3770,
      3135,
      3771,
      3772
    ]
  },
  {
    "name": "Dan Tsafrir",
    "display_name": "Dan Tsafrir",
    "affiliation": "Technion",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 0,
      "FAST": 3,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "SOSP": {},
      "ATC": {},
      "FAST": {
        "2008": 1,
        "2015": 1,
        "2018": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Characterizing, exploiting, and detecting DMA code injection vulnerabilities in the presence of an IOMMU",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Optimizing Storage Performance with Calibrated Interrupts",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shring networking with shared receive rings",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "stash in a flash",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "efficient intraoperating system protection against harmful dmas",
        "conference": "FAST",
        "year": 2015
      },
      {
        "title": "portably solving file tocttou races with hardness amplification",
        "conference": "FAST",
        "year": 2008
      }
    ],
    "author_id": 1002,
    "paper_ids": [
      3765,
      3443
    ],
    "papers_without_artifact_ids": [
      3769,
      3773,
      3766,
      3774
    ]
  },
  {
    "name": "Guerney D. H. Hunt",
    "display_name": "Guerney D. H. Hunt",
    "affiliation": "IBM Thomas J. Watson Research Center, Hawthorne, NY, USA",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Save what must be saved: Secure context switching with Sailor",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1003,
    "paper_ids": [
      2139,
      3775
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "John Liagouris",
    "display_name": "John Liagouris",
    "affiliation": "Boston University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "SOSP": 0,
      "NSDI": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "SOSP": {},
      "NSDI": {
        "2023": 1,
        "2018": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "A new benchmark harness for systematic and robust evaluation of streaming state stores",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TVA: A multi-party computation system for secure and expressive time series analytics",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secrecy secure collaborative analytics in untrusted clouds",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "snailtrail generalizing critical paths for online analysis of distributed dataflows",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 1004,
    "paper_ids": [
      2819,
      2443
    ],
    "papers_without_artifact_ids": [
      2446,
      2055
    ]
  },
  {
    "name": "Alex Conway 0001",
    "display_name": "Alex Conway",
    "affiliation": "Cornell University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "FAST": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "BetrFS: a compleat file system for commodity SSDs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Sharding the State Machine: Automated Modular Reasoning for Complex Concurrent Systems",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ionia highperformance replication for modern diskbased kv stores",
        "conference": "FAST",
        "year": 2024
      }
    ],
    "author_id": 1005,
    "paper_ids": [
      3776,
      721
    ],
    "papers_without_artifact_ids": [
      1641
    ]
  },
  {
    "name": "Rob Johnson 0001",
    "display_name": "Rob Johnson",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "ACSAC": 0,
      "FAST": 6,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {},
      "ACSAC": {},
      "FAST": {
        "2024": 1,
        "2015": 1,
        "2016": 1,
        "2020": 1,
        "2017": 1,
        "2018": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "BetrFS: a compleat file system for commodity SSDs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Storage Systems are Distributed Systems (So Verify Them That Way!)",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ionia highperformance replication for modern diskbased kv stores",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "how to copy files",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "the full path to fullpath indexing",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "file systems fated for senescence nonsense says science",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "optimizing every operation in a writeoptimized file system",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "betrfs a rightoptimized writeoptimized file system",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 1006,
    "paper_ids": [
      3776,
      722
    ],
    "papers_without_artifact_ids": [
      1641,
      3777,
      3778,
      3779,
      3780,
      3781
    ]
  },
  {
    "name": "Somali Chaterji",
    "display_name": "Somali Chaterji",
    "affiliation": "Purdue University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "LiteReconfig: cost and content aware reconfiguration of video object detection systems for mobile GPUs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ORION and the Three Rights: Sizing, Bundling, and Prewarming for Serverless DAGs",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1007,
    "paper_ids": [
      2912,
      2913
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bart Coppens 0001",
    "display_name": "Bart Coppens",
    "affiliation": "University of Texas at Dallas",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {},
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sharing is caring: secure and efficient shared memory support for MVEEs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Inference of Error Specifications and Bug Detection Using Structural Similarities",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1008,
    "paper_ids": [
      3782,
      3783
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stijn Volckaert",
    "display_name": "Stijn Volckaert",
    "affiliation": "KU Leuven",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "EUROSYS": 4,
      "ATC": 0,
      "ACSAC": 1,
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1,
        "2022": 3
      },
      "ATC": {},
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 2
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sharing is caring: secure and efficient shared memory support for MVEEs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PKRU-safe: automatically locking down the heap between safe and unsafe languages",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "moneta exvivo gpu driver fuzzing by recalling invivo execution states",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "ill be there for you perpetual availability in the a",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "swipe left for identity theft an analysis of user data privacy risks on locationbased dating apps",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "not quite write on the effectiveness of storeonly bounds checking",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "you shall not bypass practical secure and fast pkubased sandboxing",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "dmvx secure and efficient multivariant execution in a distributed setting",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 1009,
    "paper_ids": [
      3782,
      2149
    ],
    "papers_without_artifact_ids": [
      3784,
      3785,
      3786,
      3787,
      3788,
      3789
    ]
  },
  {
    "name": "Michael Franz",
    "display_name": "Michael Franz",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "EUROSYS": 3,
      "ATC": 0,
      "ACSAC": 1,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 2,
        "2021": 1
      },
      "EUROSYS": {
        "2024": 1,
        "2021": 1,
        "2022": 1
      },
      "ATC": {},
      "ACSAC": {
        "2024": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PKRU-safe: automatically locking down the heap between safe and unsafe languages",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ill be there for you perpetual availability in the a",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "polynima practical hybrid recompilation for multithreaded binaries",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "dmvx secure and efficient multivariant execution in a distributed setting",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "on the usability of authenticity checks for hardware security tokens",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "v0ltpwn attacking x86 processor integrity from software",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1010,
    "paper_ids": [
      2149,
      3790
    ],
    "papers_without_artifact_ids": [
      3785,
      3791,
      3789,
      1837,
      2321
    ]
  },
  {
    "name": "Baishakhi Ray",
    "display_name": "Baishakhi Ray",
    "affiliation": "Columbia University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "EUROSYS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Unicorn: reasoning about configurable system performance through the lens of causality",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1011,
    "paper_ids": [
      3792,
      3793
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ramachandran Ramjee",
    "display_name": "Ramachandran Ramjee",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 2,
      "ATC": 0,
      "NSDI": 5
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "EUROSYS": {
        "2024": 1,
        "2022": 1
      },
      "ATC": {},
      "NSDI": {
        "2014": 1,
        "2017": 1,
        "2010": 1,
        "2012": 1,
        "2011": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Varuna: scalable, low-cost training of massive deep learning models",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Taming Throughput-Latency Tradeoff in LLM Inference with Sarathi-Serve",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "justintime checkpointing low cost error recovery from deep learning training failures",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "skipcorrelation for multipower wireless carrier sensing",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "adtributor revenue debugging in advertising systems",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "wifinc wifi over narrow channels",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "specnet spectrum sensing sans frontières",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "endre an endsystem redundancy elimination service for enterprises",
        "conference": "NSDI",
        "year": 2010
      }
    ],
    "author_id": 1012,
    "paper_ids": [
      3794,
      3795
    ],
    "papers_without_artifact_ids": [
      3796,
      3797,
      3798,
      3799,
      3800,
      2909
    ]
  },
  {
    "name": "Nipun Kwatra",
    "display_name": "Nipun Kwatra",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "EUROSYS": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS",
      "OSDI"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Varuna: scalable, low-cost training of massive deep learning models",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Taming Throughput-Latency Tradeoff in LLM Inference with Sarathi-Serve",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "justintime checkpointing low cost error recovery from deep learning training failures",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 1013,
    "paper_ids": [
      3794,
      3795
    ],
    "papers_without_artifact_ids": [
      3796
    ]
  },
  {
    "name": "Jongse Park",
    "display_name": "Jongse Park",
    "affiliation": "KAIST",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Serving Heterogeneous Machine Learning Models on Multi-GPU Servers with Spatio-Temporal Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CoVA: Exploiting Compressed-Domain Analysis to Accelerate Video Analytics",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1014,
    "paper_ids": [
      347,
      3801
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zijun Li 0001",
    "display_name": "Zijun Li",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Help Rather Than Recycle: Alleviating Cold Startup in Serverless Computing Through Inter-Function Container Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "RunD: A Lightweight Secure Container Runtime for High-density Deployment and High-concurrency Startup in Serverless Computing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1015,
    "paper_ids": [
      1085,
      1087
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiagan Cheng",
    "display_name": "Jiagan Cheng",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Help Rather Than Recycle: Alleviating Cold Startup in Serverless Computing Through Inter-Function Container Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "RunD: A Lightweight Secure Container Runtime for High-density Deployment and High-concurrency Startup in Serverless Computing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1016,
    "paper_ids": [
      1085,
      1087
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Deze Zeng",
    "display_name": "Deze Zeng",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 2
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Help Rather Than Recycle: Alleviating Cold Startup in Serverless Computing Through Inter-Function Container Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "DVABatch: Diversity-aware Multi-Entry Multi-Exit Batching for Efficient Processing of DNN Services on GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1017,
    "paper_ids": [
      1085,
      1086
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nanqinqin Li",
    "display_name": "Nanqinqin Li",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Speculative Recovery: Cheap, Highly Available Fault Tolerance with Disaggregated Storage",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "LinnOS: Predictability on Unpredictable Flash Storage with a Light Neural Network",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1018,
    "paper_ids": [
      2742,
      3631
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael J. Freedman",
    "display_name": "Michael J. Freedman",
    "affiliation": "Princeton University",
    "artifact_count": 2,
    "total_papers": 15,
    "total_papers_by_conf": {
      "ATC": 2,
      "SOSP": 0,
      "EUROSYS": 0,
      "USENIXSEC": 0,
      "NSDI": 13,
      "PETS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2023": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "USENIXSEC": {},
      "NSDI": {
        "2013": 1,
        "2014": 1,
        "2017": 2,
        "2010": 2,
        "2006": 2,
        "2012": 1,
        "2016": 1,
        "2005": 1,
        "2004": 1,
        "2007": 1
      },
      "PETS": {},
      "OSDI": {}
    },
    "artifact_rate": 13.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Speculative Recovery: Cheap, Highly Available Fault Tolerance with Disaggregated Storage",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "VectorVisor: A Binary Translation Scheme for Throughput-Oriented GPU Acceleration",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "live video analytics at scale with approximation and delaytolerance",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "vcorfu a cloudscale object store on a shared log",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "be fast cheap and in control with switchkv",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "aggregation and degradation in jetstream streaming analytics in the wide area",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "stronger semantics for lowlatency georeplicated storage",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "serval an endhost stack for servicecentric networking",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "experiences with coralcdn a fiveyear operational view",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "prophecy using history for highthroughput fault tolerance",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "peering through the shroud the effect of edge opacity on ipbased client identification",
        "conference": "NSDI",
        "year": 2007
      },
      {
        "title": "oasis anycast for any service",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "re reliable email",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "shark scaling file servers via cooperative caching",
        "conference": "NSDI",
        "year": 2005
      },
      {
        "title": "democratizing content publication with coral",
        "conference": "NSDI",
        "year": 2004
      }
    ],
    "author_id": 1019,
    "paper_ids": [
      2742,
      2749
    ],
    "papers_without_artifact_ids": [
      3802,
      3444,
      3803,
      2131,
      2747,
      3181,
      3804,
      2133,
      3805,
      3806,
      3807,
      3808,
      3809
    ]
  },
  {
    "name": "Florian Holzbauer",
    "display_name": "Florian Holzbauer",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Not that Simple: Email Delivery in the 21st Century",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi Deployments",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1020,
    "paper_ids": [
      2925,
      2150
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junru Li",
    "display_name": "Junru Li",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2021": 1,
        "2026": 1,
        "2023": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "AlNiCo: SmartNIC-accelerated Contention-aware Request Scheduling for Transaction Processing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Nap: A Black-Box Approach to NUMA-Aware Persistent Memory Indexes",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "polarstore highperformance data compression for largescale cloudnative databases",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "λio a unified io stack for computational storage",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "concordia distributed shared memory with innetwork cache coherence",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 1021,
    "paper_ids": [
      1037,
      1042
    ],
    "papers_without_artifact_ids": [
      3810,
      1061,
      1069
    ]
  },
  {
    "name": "Dan Graur",
    "display_name": "Dan Graur",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Cachew: Machine Learning Input Data Processing as a Service",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pecan: Cost-Efficient ML Data Preprocessing with Automatic Transformation Ordering and Hybrid Placement",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1022,
    "paper_ids": [
      1666,
      1667
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chandramohan A. Thekkath",
    "display_name": "Chandramohan A. Thekkath",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 2,
      "SOSP": 0,
      "FAST": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2024": 1
      },
      "SOSP": {},
      "FAST": {
        "2003": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Cachew: Machine Learning Input Data Processing as a Service",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pecan: Cost-Efficient ML Data Preprocessing with Automatic Transformation Ordering and Hybrid Placement",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "blocklevel security for networkattached disks",
        "conference": "FAST",
        "year": 2003
      }
    ],
    "author_id": 1023,
    "paper_ids": [
      1666,
      1667
    ],
    "papers_without_artifact_ids": [
      3811
    ]
  },
  {
    "name": "Shuang Liu",
    "display_name": "Shuang Liu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "ATC",
      "NDSS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "HyperEnclave: An Open and Cross-platform Trusted Execution Environment",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "The Road to Trust: Building Enclaves within Confidential VMs",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1024,
    "paper_ids": [
      2929,
      602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shoumeng Yan",
    "display_name": "Shoumeng Yan",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "NDSS": 3,
      "ATC": 1,
      "SOSP": 0,
      "FAST": 2,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1,
        "2025": 2
      },
      "ATC": {
        "2022": 1
      },
      "SOSP": {},
      "FAST": {
        "2026": 1,
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "ATC",
      "NDSS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "HyperEnclave: An Open and Cross-platform Trusted Execution Environment",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "The Road to Trust: Building Enclaves within Confidential VMs",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mlsdisk trusted block storage for tees based on layered secure logging",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "atomicdisk a secure virtual disk for tees against eviction attacks",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "scrutinizer towards secure forensics on compromised trustzone",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "cage complementing arm cca with gpu extensions",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "cipherh automated detection of ciphertext sidechannel vulnerabilities in cryptographic implementations",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "shelter extending arm cca with isolation in user space",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1025,
    "paper_ids": [
      2929,
      602
    ],
    "papers_without_artifact_ids": [
      1045,
      2814,
      776,
      2154,
      375,
      784
    ]
  },
  {
    "name": "Sangjin Choi",
    "display_name": "Sangjin Choi",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Memory Harvesting in Multi-GPU Systems with Hierarchical Unified Virtual Memory",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "EnvPipe: Performance-preserving DNN Training Framework for Saving Energy",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1026,
    "paper_ids": [
      348,
      349
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shai Bergman",
    "display_name": "Shai Bergman",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 2,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZNSwap: un-Block your Swap",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Translation Pass-Through for Near-Native Paging Performance in VMs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "slashing the disaggregation tax in heterogeneous data centers with fractos",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 1027,
    "paper_ids": [
      3812,
      1387
    ],
    "papers_without_artifact_ids": [
      2683
    ]
  },
  {
    "name": "Mark Silberstein",
    "display_name": "Mark Silberstein",
    "affiliation": "Technion",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "ATC": 2,
      "SOSP": 0,
      "SC": 0,
      "EUROSYS": 1,
      "USENIXSEC": 2,
      "NSDI": 4,
      "PETS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2023": 1
      },
      "SOSP": {},
      "SC": {},
      "EUROSYS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2023": 1
      },
      "NSDI": {
        "2024": 1,
        "2022": 3
      },
      "PETS": {},
      "OSDI": {}
    },
    "artifact_rate": 22.2,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZNSwap: un-Block your Swap",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Translation Pass-Through for Near-Native Paging Performance in VMs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "multitenant innetwork acceleration with switchvm",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "aexnotify thwarting precise singlestepping attacks through interrupt awareness for intel sgx enclaves",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "slashing the disaggregation tax in heterogeneous data centers with fractos",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "swish distributed shared state abstractions for programmable switches",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "an edgequeued datagram service for all datacenter traffic",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "scaling open vswitch with a computational cache",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "specfuzz bringing spectretype vulnerabilities to the surface",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1028,
    "paper_ids": [
      3812,
      1387
    ],
    "papers_without_artifact_ids": [
      3813,
      663,
      2683,
      3814,
      3689,
      3815,
      3816
    ]
  },
  {
    "name": "Beom Heyn Kim",
    "display_name": "Beom Heyn Kim",
    "affiliation": "University of Massachusetts Lowell",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "ATC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Modulo: Finding Convergence Failure Bugs in Distributed Systems with Divergence Resync Models",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1029,
    "paper_ids": [
      653,
      1121
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zheng Wang 0075",
    "display_name": "Zheng Wang",
    "affiliation": "University of California, San Diego",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 3,
      "SC": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2024": 1,
        "2023": 1
      },
      "SC": {},
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Faith: An Efficient Framework for Transformer Verification on GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "TC-GNN: Bridging Sparse GNN Computation and Dense Tensor Cores on GPUs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oper optimalityguided embedding table parallelization for largescale recommendation model",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "mgg accelerating graph neural networks with finegrained intrakernel communicationcomputation pipelining on multigpu platforms",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 505,
    "paper_ids": [
      1675,
      1676
    ],
    "papers_without_artifact_ids": [
      1678,
      1679
    ]
  },
  {
    "name": "Eli Goldweber",
    "display_name": "Eli Goldweber",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sift: Using Refinement-guided Automation to Verify Complex Distributed Systems",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "IronSpec: Increasing the Reliability of Formal Specifications",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1032,
    "paper_ids": [
      1624,
      3817
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Manos Kapritsos",
    "display_name": "Manos Kapritsos",
    "affiliation": "University of Michigan",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 2,
      "ATC": 1,
      "SOSP": 0,
      "USENIXSEC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 2
      },
      "ATC": {
        "2022": 1
      },
      "SOSP": {},
      "USENIXSEC": {},
      "NSDI": {
        "2013": 1,
        "2014": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sift: Using Refinement-guided Automation to Verify Complex Distributed Systems",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "IronSpec: Increasing the Reliability of Formal Specifications",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "inductive invariants that spark joy using invariant taxonomies to streamline distributed protocol proofs",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "exalt empowering researchers to evaluate largescale storage systems",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "robustness in the salus scalable block store",
        "conference": "NSDI",
        "year": 2013
      }
    ],
    "author_id": 256,
    "paper_ids": [
      1624,
      3817
    ],
    "papers_without_artifact_ids": [
      723,
      2692,
      2693
    ]
  },
  {
    "name": "Wencong Xiao",
    "display_name": "Wencong Xiao",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 2,
      "ATC": 1,
      "SOSP": 0,
      "SC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2020": 1
      },
      "ATC": {
        "2022": 1
      },
      "SOSP": {},
      "SC": {},
      "NSDI": {
        "2017": 1,
        "2022": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Whale: Efficient Giant Model Training over Heterogeneous GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Llumnix: Dynamic Scheduling for Large Language Model Serving",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mlaas in the wild workload analysis and scheduling in largescale heterogeneous gpu clusters",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "antman dynamic scaling on gpu clusters for deep learning",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "tux",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 1033,
    "paper_ids": [
      2858,
      2885
    ],
    "papers_without_artifact_ids": [
      2805,
      2887,
      291
    ]
  },
  {
    "name": "Yong Li 0045",
    "display_name": "Yong Li",
    "affiliation": "Alibaba Group, Beijing, China",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 2,
      "ATC": 1,
      "SC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2020": 1
      },
      "ATC": {
        "2022": 1
      },
      "SC": {},
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Whale: Efficient Giant Model Training over Heterogeneous GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Llumnix: Dynamic Scheduling for Large Language Model Serving",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mlaas in the wild workload analysis and scheduling in largescale heterogeneous gpu clusters",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "antman dynamic scaling on gpu clusters for deep learning",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 1034,
    "paper_ids": [
      2858,
      2885
    ],
    "papers_without_artifact_ids": [
      2805,
      2887
    ]
  },
  {
    "name": "Xingda Wei",
    "display_name": "Xingda Wei",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "OSDI": 3,
      "ATC": 1,
      "SOSP": 0,
      "EUROSYS": 1,
      "FAST": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 2,
        "2020": 1
      },
      "ATC": {
        "2022": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2024": 1
      },
      "FAST": {
        "2026": 1
      },
      "NSDI": {
        "2021": 1,
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "KRCORE: A Microsecond-scale RDMA Control Plane for Elastic Computing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fast RDMA-based Ordered Key-Value Store using Remote Learned Cache",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fast cloud storage for ai jobs via grouped io api with transparent readwrite optimizations",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "odrp ondemand remote paging with programmable rdma",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "serializationdeserializationfree state transfer in serverless workflows",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "characterizing offpath smartnic for accelerating distributed systems",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "no provisioned concurrency fast rdmacodesigned remote fork for serverless computing",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "unifying timestamp with transaction ordering for mvcc with decentralized scalar timestamp",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 506,
    "paper_ids": [
      34,
      46
    ],
    "papers_without_artifact_ids": [
      1317,
      51,
      54,
      63,
      62,
      71
    ]
  },
  {
    "name": "Rong Gu 0001",
    "display_name": "Rong Gu",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 2,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Meces: Latency-efficient Rescaling via Prioritized State Migration for Stateful Distributed Stream Processing Systems",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Adaptive Online Cache Capacity Optimization via Lightweight Working Set Size Estimation at Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "wormhole filters caching your hash on persistent memory",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 1035,
    "paper_ids": [
      3818,
      2875
    ],
    "papers_without_artifact_ids": [
      1375
    ]
  },
  {
    "name": "Yihua Huang 0001",
    "display_name": "Yihua Huang",
    "affiliation": "Nanjing University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Meces: Latency-efficient Rescaling via Prioritized State Migration for Stateful Distributed Stream Processing Systems",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Adaptive Online Cache Capacity Optimization via Lightweight Working Set Size Estimation at Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1036,
    "paper_ids": [
      3818,
      2875
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jingwei Li 0001",
    "display_name": "Jingwei Li",
    "affiliation": "UESTC",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 1,
      "EUROSYS": 0,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {},
      "FAST": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Secure and Lightweight Deduplicated Storage via Shielded Deduplication-Before-Encryption",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "maat analyzing and optimizing overcharge on blockchain storage",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "elect enabling erasure coding tiering for lsmtreebased storage",
        "conference": "FAST",
        "year": 2024
      }
    ],
    "author_id": 508,
    "paper_ids": [
      3819,
      774
    ],
    "papers_without_artifact_ids": [
      775,
      3820
    ]
  },
  {
    "name": "Patrick P. C. Lee",
    "display_name": "Patrick P. C. Lee",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 2,
    "total_papers": 15,
    "total_papers_by_conf": {
      "ATC": 2,
      "EUROSYS": 0,
      "ACSAC": 0,
      "FAST": 13
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2023": 1
      },
      "EUROSYS": {},
      "ACSAC": {},
      "FAST": {
        "2024": 1,
        "2021": 2,
        "2012": 1,
        "2026": 3,
        "2014": 2,
        "2023": 1,
        "2022": 2,
        "2019": 1
      }
    },
    "artifact_rate": 13.3,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Secure and Lightweight Deduplicated Storage via Shielded Deduplication-Before-Encryption",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "FarReach: Write-back Caching in Programmable Switches",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "less is more for ioefficient repairs in erasurecoded storage",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "holistic and automated task scheduling for distributed lsmtreebased storage",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "how soon is now preloading images for virtual disks with thinkahead",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "elect enabling erasure coding tiering for lsmtreebased storage",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "pararc embracing subpacketization for repair parallelization in msrcoded storage",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "depart replica decoupling for distributed keyvalue storage",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "separating data via block invalidation time inference for write amplification reduction in logstructured storage",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "exploiting combined locality for widestripe erasure coding in distributed storage",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "an indepth study of correlated failures in production ssdbased data centers",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "openec toward unified and configurable erasure coding management in distributed storage systems",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "stair codes a general family of erasure codes for tolerating device and sector failures in practical storage systems",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "parity logging with reserved space towards efficient updates and recovery in erasurecoded clustered storage",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "nccloud applying network coding for the storage repair in a cloudofclouds",
        "conference": "FAST",
        "year": 2012
      }
    ],
    "author_id": 509,
    "paper_ids": [
      3819,
      3821
    ],
    "papers_without_artifact_ids": [
      3822,
      3823,
      2090,
      3820,
      3585,
      3501,
      3824,
      3825,
      3826,
      3827,
      3828,
      3829,
      3830
    ]
  },
  {
    "name": "Hao Wei",
    "display_name": "Hao Wei",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DVABatch: Diversity-aware Multi-Entry Multi-Exit Batching for Efficient Processing of DNN Services on GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Full Lifecycle Data Analysis on a Large-scale and Leadership Supercomputer: What Can We Learn from It?",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1037,
    "paper_ids": [
      1086,
      3592
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiawei Wang",
    "display_name": "Jiawei Wang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "BBQ: A Block-based Bounded Queue for Exchanging Data and Profiling",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "BWoS: Formally Verified Block-based Work Stealing for Parallel Processing",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1038,
    "paper_ids": [
      36,
      44
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jitang Lei",
    "display_name": "Jitang Lei",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "BBQ: A Block-based Bounded Queue for Exchanging Data and Profiling",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "BWoS: Formally Verified Block-based Work Stealing for Parallel Processing",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1039,
    "paper_ids": [
      36,
      44
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kang Li",
    "display_name": "Kang Li",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      },
      "ATC": {
        "2022": 1
      },
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "A Verified Confidential Computing as a Service Framework for Privacy Preservation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tlb poisoning attacks on amd secure encrypted virtualization",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "cipherleaks breaking constanttime cryptography on amd sev via the ciphertext side channel",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1040,
    "paper_ids": [
      760,
      597
    ],
    "papers_without_artifact_ids": [
      377,
      378
    ]
  },
  {
    "name": "Miao Cai 0001",
    "display_name": "Miao Cai",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "FlatFS: Flatten Hierarchical File System Namespace on Non-volatile Memories",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Ethane: An Asymmetric File System for Disaggregated Persistent Memory",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1041,
    "paper_ids": [
      3831,
      3832
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junru Shen",
    "display_name": "Junru Shen",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "FlatFS: Flatten Hierarchical File System Namespace on Non-volatile Memories",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Ethane: An Asymmetric File System for Disaggregated Persistent Memory",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1042,
    "paper_ids": [
      3831,
      3832
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Baoliu Ye",
    "display_name": "Baoliu Ye",
    "affiliation": "Nanjing University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 3
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2024": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "FlatFS: Flatten Hierarchical File System Namespace on Non-volatile Memories",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Ethane: An Asymmetric File System for Disaggregated Persistent Memory",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cyberstar simple elastic and costeffective network functions management in cloud network at scale",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 1043,
    "paper_ids": [
      3831,
      3832
    ],
    "papers_without_artifact_ids": [
      3730
    ]
  },
  {
    "name": "Jing Wang 0158",
    "display_name": "Jing Wang",
    "affiliation": "Tsinghua University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ATC": 2,
      "EUROSYS": 1,
      "NSDI": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "NSDI": {
        "2025": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Pacman: An Efficient Compaction Approach for Log-Structured Key-Value Store on Persistent Memory",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Revisiting Secondary Indexing in LSM-based Storage Systems with Persistent Memory",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deft a scalable tree index for disaggregated memory",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "achieving wirelatency storage systems by exploiting hardware acks",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "replicating persistent memory keyvalue stores with efficient rdma abstraction",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 1044,
    "paper_ids": [
      1038,
      1041
    ],
    "papers_without_artifact_ids": [
      1052,
      1054,
      1066
    ]
  },
  {
    "name": "Zeke Wang",
    "display_name": "Zeke Wang",
    "affiliation": "Zhejiang University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ATC": 2,
      "SC": 0,
      "EUROSYS": 0,
      "CHES": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2023": 1
      },
      "SC": {},
      "EUROSYS": {},
      "CHES": {
        "2023": 1
      },
      "NSDI": {
        "2024": 1,
        "2018": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FpgaNIC: An FPGA-based Versatile 100Gb SmartNIC for GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Legion: Automatically Pushing the Envelope of Multi-GPU System for Billion-Scale GNN Training",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding routable pcie performance for composable infrastructures",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "cuzk accelerating zeroknowledge proof with a faster parallel multiscalar multiplication algorithm on gpus",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "gnet effective gpu sharing in nfv systems",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 1045,
    "paper_ids": [
      3833,
      2145
    ],
    "papers_without_artifact_ids": [
      3834,
      3328,
      3835
    ]
  },
  {
    "name": "Jie Zhang 0081",
    "display_name": "Jie Zhang",
    "affiliation": "ETH Zurich",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2023": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FpgaNIC: An FPGA-based Versatile 100Gb SmartNIC for GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Legion: Automatically Pushing the Envelope of Multi-GPU System for Billion-Scale GNN Training",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding routable pcie performance for composable infrastructures",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 1046,
    "paper_ids": [
      3833,
      2145
    ],
    "papers_without_artifact_ids": [
      3834
    ]
  },
  {
    "name": "Fei Wu 0001",
    "display_name": "Fei Wu",
    "affiliation": "Zhejiang University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 2,
      "SC": 0,
      "EUROSYS": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2023": 1
      },
      "SC": {},
      "EUROSYS": {
        "2024": 1
      },
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FpgaNIC: An FPGA-based Versatile 100Gb SmartNIC for GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Legion: Automatically Pushing the Envelope of Multi-GPU System for Billion-Scale GNN Training",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cclbtree a crashconsistent localityaware btree for reducing xpbufferinduced write amplification in persistent memory",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "walle an endtoend generalpurpose and largescale production system for devicecloud collaborative machine learning",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 1047,
    "paper_ids": [
      3833,
      2145
    ],
    "papers_without_artifact_ids": [
      3836,
      2884
    ]
  },
  {
    "name": "Gustavo Alonso",
    "display_name": "Gustavo Alonso",
    "affiliation": "ETH Zurich",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "OSDI": 2,
      "ATC": 1,
      "SOSP": 1,
      "SC": 0,
      "EUROSYS": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2020": 1
      },
      "ATC": {
        "2022": 1
      },
      "SOSP": {
        "2023": 1
      },
      "SC": {},
      "EUROSYS": {
        "2023": 1,
        "2024": 1
      },
      "NSDI": {
        "2016": 1
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FpgaNIC: An FPGA-based Versatile 100Gb SmartNIC for GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Do OS abstractions make sense on FPGAs?",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deferred continuous batching in resourceefficient large language model serving",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "accl an fpgabased collective engine for distributed applications",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "serverless fpga workinprogress",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "player expanding coherence protocol stack with a persistence layer",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "consensus in a box inexpensive coordination in hardware",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 1048,
    "paper_ids": [
      3833,
      3606
    ],
    "papers_without_artifact_ids": [
      3837,
      3838,
      3839,
      3840,
      3841
    ]
  },
  {
    "name": "Shangguang Wang",
    "display_name": "Shangguang Wang",
    "affiliation": "BUPT",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "ATC": 4,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 4
      },
      "EUROSYS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "More is Different: Prototyping and Analyzing a New Form of Edge Server with Massive Mobile SoCs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "An Empirical Study of Rust-for-Linux: The Success, Dissatisfaction, and Compromise",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "highdensity mobile cloud gaming on edge soc clusters",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "fwdllm efficient federated finetuning of large language models with perturbed inferences",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "fedrdma communicationefficient crosssilo federated llm via chunked rdma transmission",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "towards practical fewshot federated nlp",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 1049,
    "paper_ids": [
      3842,
      3843
    ],
    "papers_without_artifact_ids": [
      3844,
      3845,
      3846,
      3847
    ]
  },
  {
    "name": "Mengwei Xu 0001",
    "display_name": "Mengwei Xu",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "ATC": 4,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 4
      },
      "EUROSYS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "More is Different: Prototyping and Analyzing a New Form of Edge Server with Massive Mobile SoCs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "An Empirical Study of Rust-for-Linux: The Success, Dissatisfaction, and Compromise",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "highdensity mobile cloud gaming on edge soc clusters",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "fwdllm efficient federated finetuning of large language models with perturbed inferences",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "fedrdma communicationefficient crosssilo federated llm via chunked rdma transmission",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "towards practical fewshot federated nlp",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 1050,
    "paper_ids": [
      3842,
      3843
    ],
    "papers_without_artifact_ids": [
      3844,
      3845,
      3846,
      3847
    ]
  },
  {
    "name": "Liu Liu",
    "display_name": "Liu Liu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "both",
    "conferences": [
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Expeditious High-Concurrency MicroVM SnapStart in Persistent Memory with an Augmented Hypervisor",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1052,
    "paper_ids": [
      3848,
      301
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dazhao Cheng",
    "display_name": "Dazhao Cheng",
    "affiliation": "Wuhan University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "both",
    "conferences": [
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Expeditious High-Concurrency MicroVM SnapStart in Persistent Memory with an Augmented Hypervisor",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Investigating the Impact of Online Community Involvement on Safety Practices and Perceived Risks Among People Who Use Drugs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1053,
    "paper_ids": [
      3848,
      3849
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaobo Zhou 0002",
    "display_name": "Xiaobo Zhou",
    "affiliation": "University of Macau",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "both",
    "conferences": [
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Expeditious High-Concurrency MicroVM SnapStart in Persistent Memory with an Augmented Hypervisor",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Investigating the Impact of Online Community Involvement on Safety Practices and Perceived Risks Among People Who Use Drugs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1054,
    "paper_ids": [
      3848,
      3849
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhirong Shen",
    "display_name": "Zhirong Shen",
    "affiliation": "Xiamen University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 2,
      "SC": 0,
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 2
      },
      "SC": {},
      "EUROSYS": {
        "2024": 1
      },
      "FAST": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Removing Obstacles before Breaking Through the Memory Wall: A Close Look at HBM Errors in the Field",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "UniMem: Redesigning Disaggregated Memory within A Unified Local-Remote Memory Hierarchy",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "geminifs a companion file system for gpus",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "hawkeyes addressing weak memory order in program migration based on instruction windows",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 1055,
    "paper_ids": [
      1039,
      1040
    ],
    "papers_without_artifact_ids": [
      3525,
      3850
    ]
  },
  {
    "name": "Salman Ahmed 0001",
    "display_name": "Salman Ahmed",
    "affiliation": "IIT Bombay",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ATC": {
        "2024": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fast (Trapless) Kernel Probes Everywhere",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1056,
    "paper_ids": [
      620,
      1191
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weichao Mao",
    "display_name": "Weichao Mao",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 2,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Power-aware Deep Learning Model Serving with μ-Serve",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AWARE: Automate Workload Autoscaling with Reinforcement Learning in Production Cloud Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reinforcement learning for resource management in multitenant serverless platforms",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 1057,
    "paper_ids": [
      2644,
      2645
    ],
    "papers_without_artifact_ids": [
      2648
    ]
  },
  {
    "name": "Saurabh Jha",
    "display_name": "Saurabh Jha",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1,
      "SC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "ATC": {
        "2024": 1
      },
      "SC": {},
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Power-aware Deep Learning Model Serving with μ-Serve",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "FIRM: An Intelligent Fine-grained Resource Management Framework for SLO-Oriented Microservices",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "measuring congestion in highperformance datacenter interconnects",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 1058,
    "paper_ids": [
      2644,
      2941
    ],
    "papers_without_artifact_ids": [
      3851
    ]
  },
  {
    "name": "Tamer Basar",
    "display_name": "Tamer Basar",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 2,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Power-aware Deep Learning Model Serving with μ-Serve",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "AWARE: Automate Workload Autoscaling with Reinforcement Learning in Production Cloud Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reinforcement learning for resource management in multitenant serverless platforms",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 1059,
    "paper_ids": [
      2644,
      2645
    ],
    "papers_without_artifact_ids": [
      2648
    ]
  },
  {
    "name": "Kai Chen 0005",
    "display_name": "Kai Chen",
    "affiliation": "HKUST",
    "artifact_count": 2,
    "total_papers": 24,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1,
      "EUROSYS": 8,
      "USENIXSEC": 1,
      "NSDI": 13
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "ATC": {
        "2024": 1
      },
      "EUROSYS": {
        "2025": 3,
        "2023": 2,
        "2024": 2,
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "NSDI": {
        "2017": 1,
        "2024": 3,
        "2025": 1,
        "2023": 2,
        "2012": 1,
        "2016": 1,
        "2022": 1,
        "2018": 1,
        "2015": 2
      }
    },
    "artifact_rate": 8.3,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Decentralized Federated Singular Vector Decomposition",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "FAERY: An FPGA-accelerated Embedding-based Retrieval System",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cheetah metadata aggregation for fast object storage without distributed ordering",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "enetstl towards an inkernel library for highperformance ebpfbased network functions",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "achieving fairness generalizability for learningbased congestion control with jury",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "green carbonefficient resource scheduling for machine learning clusters",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "accelerating privacypreserving machine learning with genibatch",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "astraea towards fair and efficient learningbased congestion control",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "flow scheduling with imprecise knowledge",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "accelerating neural recommendation training with embedding scheduling",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "towards domainspecific network transport for distributed dnn training",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "accelerating secure collaborative machine learning with protocolaware rdma",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "tabi an efficient multilevel inference system for large language models",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "egeria efficient dnn training with knowledgeguided layer freezing",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "srnic a scalable architecture for rdma nics",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "flash towards a highperformance hardware acceleration architecture for crosssilo federated learning",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "multiobjective congestion control",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "tiara a scalable and efficient hardware acceleration architecture for stateful layer4 load balancing",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "powerman an outofband management network for datacenters using power line communication",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "enabling widespread communications on optical fabric with megaswitch",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "enabling ecn in multiservice multiqueue data centers",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "informationagnostic flow scheduling for commodity data centers",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "explicit path control in commodity data centers design and applications",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "osa an optical switching architecture for data center networks with unprecedented flexibility",
        "conference": "NSDI",
        "year": 2012
      }
    ],
    "author_id": 517,
    "paper_ids": [
      3852,
      3711
    ],
    "papers_without_artifact_ids": [
      1050,
      3853,
      3854,
      3855,
      3856,
      3857,
      2793,
      3858,
      3859,
      3860,
      3861,
      1949,
      3862,
      3600,
      1009,
      3863,
      2715,
      2716,
      2717,
      2718,
      3864,
      3865
    ]
  },
  {
    "name": "Jinkyu Jeong",
    "display_name": "Jinkyu Jeong",
    "affiliation": "Yonsei University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 2,
      "FAST": 2,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 2
      },
      "FAST": {
        "2021": 1,
        "2017": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "A Secure, Fast, and Resource-Efficient Serverless Platform with Function REWIND",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Identifying On-/Off-CPU Bottlenecks Together with Blocked Samples",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "d2fq devicedirect fair queueing for nvme ssds",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "enlightening the io path a holistic approach for application performance",
        "conference": "FAST",
        "year": 2017
      }
    ],
    "author_id": 1062,
    "paper_ids": [
      2764,
      351
    ],
    "papers_without_artifact_ids": [
      3866,
      3867
    ]
  },
  {
    "name": "Yujie Ren",
    "display_name": "Yujie Ren",
    "affiliation": "Rutgers Sexual and Reproductive Health and Rights",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1,
      "SOSP": 0,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "ATC": {
        "2024": 1
      },
      "SOSP": {},
      "FAST": {
        "2024": 1,
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Monarch: A Fuzzing Framework for Distributed File Systems",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "CrossFS: A Cross-layered Direct-Access File System",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "polystore exploiting combined capabilities of heterogeneous storage",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "omnicache collaborative caching for nearstorage accelerators",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "fusionfs fusing io operations using ciscops in firmware file systems",
        "conference": "FAST",
        "year": 2022
      }
    ],
    "author_id": 259,
    "paper_ids": [
      1,
      1585
    ],
    "papers_without_artifact_ids": [
      531,
      1586,
      2677
    ]
  },
  {
    "name": "Meng Xu 0001",
    "display_name": "Meng Xu",
    "affiliation": "University of Waterloo",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {
        "2024": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Monarch: A Fuzzing Framework for Distributed File Systems",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "PATCHAGENT: A Practical Program Repair Agent Mimicking Human Expertise",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1063,
    "paper_ids": [
      1,
      935
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Longbin Lai",
    "display_name": "Longbin Lai",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 2
      },
      "NSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bridging the Gap between Relational OLTP and Graph-based OLAP",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "GLogS: Interactive Graph Pattern Matching Query At Large Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gaia a system for interactive analysis on distributed graphs using a highlevel language",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 1065,
    "paper_ids": [
      37,
      2146
    ],
    "papers_without_artifact_ids": [
      2148
    ]
  },
  {
    "name": "Li Su 0005",
    "display_name": "Li Su",
    "affiliation": "University of Sheffield",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Bridging the Gap between Relational OLTP and Graph-based OLAP",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Legion: Automatically Pushing the Envelope of Multi-GPU System for Billion-Scale GNN Training",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1066,
    "paper_ids": [
      37,
      2145
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Takahiro Shinagawa",
    "display_name": "Takahiro Shinagawa",
    "affiliation": "University of Tokyo",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "ATC": 1,
      "SOSP": 0,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2023": 1
      },
      "ATC": {
        "2023": 1
      },
      "SOSP": {},
      "ACSAC": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Translation Pass-Through for Near-Native Paging Performance in VMs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ORC: Increasing Cloud Memory Density via Object Reuse with Capabilities",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "capvms capabilitybased isolation and sharing in the cloud",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 1067,
    "paper_ids": [
      1387,
      1389
    ],
    "papers_without_artifact_ids": [
      1394
    ]
  },
  {
    "name": "Lluís Vilanova",
    "display_name": "Lluís Vilanova",
    "affiliation": "Imperial College London",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 2,
      "ATC": 1,
      "SC": 0,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2023": 1
      },
      "ATC": {
        "2023": 1
      },
      "SC": {},
      "EUROSYS": {
        "2022": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Translation Pass-Through for Near-Native Paging Performance in VMs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ORC: Increasing Cloud Memory Density via Object Reuse with Capabilities",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "granny granular management of computeintensive applications in the cloud",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "slashing the disaggregation tax in heterogeneous data centers with fractos",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "capvms capabilitybased isolation and sharing in the cloud",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 7929,
    "paper_ids": [
      1387,
      1389
    ],
    "papers_without_artifact_ids": [
      1391,
      2683,
      1394
    ]
  },
  {
    "name": "Zhen Lin",
    "display_name": "Zhen Lin",
    "affiliation": "The University of Texas at Arlington",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1,
      "SOSP": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "ATC": {
        "2023": 1
      },
      "SOSP": {
        "2021": 1
      },
      "SC": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "P2CACHE: Exploring Tiered Memory for In-Kernel File Systems Caching",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Nomad: Non-Exclusive Memory Tiering via Transactional Page Migration",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flashcube fast provisioning of serverless functions with streamlined container runtimes",
        "conference": "SOSP",
        "year": 2021
      }
    ],
    "author_id": 1069,
    "paper_ids": [
      2916,
      2917
    ],
    "papers_without_artifact_ids": [
      3868
    ]
  },
  {
    "name": "Hui Lu 0001",
    "display_name": "Hui Lu",
    "affiliation": "University of Texas at Arlington",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1,
      "SOSP": 2,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "ATC": {
        "2023": 1
      },
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "P2CACHE: Exploring Tiered Memory for In-Kernel File Systems Caching",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Nomad: Non-Exclusive Memory Tiering via Transactional Page Migration",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pvm efficient shadow paging for deploying secure containers in cloudnative environment",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "parallelizing packet processing in container overlay networks",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "flashcube fast provisioning of serverless functions with streamlined container runtimes",
        "conference": "SOSP",
        "year": 2021
      }
    ],
    "author_id": 1070,
    "paper_ids": [
      2916,
      2917
    ],
    "papers_without_artifact_ids": [
      1936,
      2918,
      3868
    ]
  },
  {
    "name": "Zbigniew T. Kalbarczyk",
    "display_name": "Zbigniew T. Kalbarczyk",
    "affiliation": "University of Illinois Urbana-Champaign",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1,
      "SC": 0,
      "EUROSYS": 1,
      "WOOT": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "ATC": {
        "2023": 1
      },
      "SC": {},
      "EUROSYS": {
        "2022": 1
      },
      "WOOT": {},
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "AWARE: Automate Workload Autoscaling with Reinforcement Learning in Production Cloud Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "FIRM: An Intelligent Fine-grained Resource Management Framework for SLO-Oriented Microservices",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reinforcement learning for resource management in multitenant serverless platforms",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "caudit continuous auditing of ssh servers to mitigate bruteforce attacks",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 1071,
    "paper_ids": [
      2645,
      2941
    ],
    "papers_without_artifact_ids": [
      2648,
      2942
    ]
  },
  {
    "name": "Sameh Elnikety",
    "display_name": "Sameh Elnikety",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "OSDI": 2,
      "ATC": 1,
      "SOSP": 1,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2020": 1
      },
      "ATC": {
        "2023": 1
      },
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "ATC",
      "OSDI"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sponge: Fast Reactive Scaling for Stream Processing with Serverless Frameworks",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ORION and the Three Rights: Sizing, Bundling, and Prewarming for Serverless DAGs",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "making kernel bypass practical for the cloud with junction",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "smartharvest harvesting idle cpus safely and efficiently in the cloud",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "faster and cheaper serverless computing on harvested resources",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "providing slos for resourceharvesting vms in cloud platforms",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 1074,
    "paper_ids": [
      2931,
      2913
    ],
    "papers_without_artifact_ids": [
      2636,
      2128,
      3869,
      3870
    ]
  },
  {
    "name": "Yuxuan Liu",
    "display_name": "Yuxuan Liu",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "ATC",
      "PETS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GLogS: Interactive Graph Pattern Matching Query At Large Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Panopticon: The Design and Evaluation of a Game that Teaches Data Science Students Designing Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1076,
    "paper_ids": [
      2146,
      3871
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sheng Zhong 0002",
    "display_name": "Sheng Zhong",
    "affiliation": "Nanjing University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "GLogS: Interactive Graph Pattern Matching Query At Large Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven Camouflage",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1077,
    "paper_ids": [
      2146,
      3872
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Charles Zhang 0001",
    "display_name": "Charles Zhang",
    "affiliation": "HKUST",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1
      },
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ATC",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pinolo: Detecting Logical Bugs in Database Management Systems with Approximate Query Synthesis",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "When Threads Meet Interrupts: Effective Static Detection of Interrupt-Based Deadlocks in Linux",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "seal towards diverse specification inference for linux interfaces from security patches",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "unleashing the power of typebased call graph construction by using regional pointer information",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "place your locks well understanding and detecting lock misuse bugs",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1079,
    "paper_ids": [
      3873,
      3874
    ],
    "papers_without_artifact_ids": [
      3875,
      3876,
      3877
    ]
  },
  {
    "name": "Florian Rommel",
    "display_name": "Florian Rommel",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 2,
      "SOSP": 1,
      "EUROSYS": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 2
      },
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {},
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "LLFree: Scalable and Optionally-Persistent Page-Frame Allocation",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "MELF: Multivariant Executables for a Heterogeneous World",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "morsels explicit virtual memory objects",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "from global to local quiescence waitfree code patching of multithreaded processes",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 1080,
    "paper_ids": [
      2807,
      2808
    ],
    "papers_without_artifact_ids": [
      2810,
      2812
    ]
  },
  {
    "name": "Arman Riasi",
    "display_name": "Arman Riasi",
    "affiliation": "Virginia Tech",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Privacy-Preserving Verifiable Neural Network Inference Service",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1081,
    "paper_ids": [
      1399,
      1400
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yihui Yan",
    "display_name": "Yihui Yan",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "WiShield: Fine-grained Countermeasure Against Malicious Wi-Fi Sensing in Smart Home",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OneTouch: Effortless 2FA Scheme to Secure Fingerprint Authentication with Wearable OTP Token",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "camshield securing smart cameras through physical replication and isolation",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1082,
    "paper_ids": [
      2947,
      2949
    ],
    "papers_without_artifact_ids": [
      2950
    ]
  },
  {
    "name": "Cong Sun 0001",
    "display_name": "Cong Sun",
    "affiliation": "Xidian University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ReCFA: Resilient Control-Flow Attestation",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "libscan towards more precise thirdparty library identification for android applications",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1083,
    "paper_ids": [
      2163,
      2164
    ],
    "papers_without_artifact_ids": [
      2168
    ]
  },
  {
    "name": "Pierre Ayoub",
    "display_name": "Pierre Ayoub",
    "affiliation": "LAAS-CNRS",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "CHES": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "CHES": {
        "2025": 1
      },
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "CHES"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BlueScream: Screaming Channels on Bluetooth Low Energy",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reproducing spectre attack with gem5 how to do it right",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 1084,
    "paper_ids": [
      2952,
      2953
    ],
    "papers_without_artifact_ids": [
      3878
    ]
  },
  {
    "name": "Romain Cayre",
    "display_name": "Romain Cayre",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "CHES"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BlueScream: Screaming Channels on Bluetooth Low Energy",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1085,
    "paper_ids": [
      2952,
      2953
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Clémentine Maurice",
    "display_name": "Clémentine Maurice",
    "affiliation": "CNRS",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "CHES": 1,
      "EUROSYS": 1,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "CHES": {
        "2025": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "CHES"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BlueScream: Screaming Channels on Bluetooth Low Energy",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reproducing spectre attack with gem5 how to do it right",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 7930,
    "paper_ids": [
      2952,
      2953
    ],
    "papers_without_artifact_ids": [
      3878
    ]
  },
  {
    "name": "Jochen Schäfer",
    "display_name": "Jochen Schäfer",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "R+R: Revisiting Graph Matching Attacks on Privacy-Preserving Record Linkage",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "If You Like Me, Please Don't \"Like\" Me: Inferring Vendor Bitcoin Addresses From Positive Reviews",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7931,
    "paper_ids": [
      1708,
      1710
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Youzhe Heng",
    "display_name": "Youzhe Heng",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "R+R: Revisiting Graph Matching Attacks on Privacy-Preserving Record Linkage",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Strengthening Privacy-Preserving Record Linkage using Diffusion",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1088,
    "paper_ids": [
      1708,
      1711
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ding Wang 0002",
    "display_name": "Ding Wang",
    "affiliation": "Nankai University",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 3,
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Leaky Autofill: An Empirical Study on the Privacy Threat of Password Managers' Autofill Functionality",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Password Guessing Using Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pointerguess targeted password guessing model using pointer mechanism",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "pixel and pixel compact and efficient forwardsecure multisignatures for pos blockchain consensus",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "no single silver bullet measuring the accuracy of password strength meters",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "password guessing using random forest",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "pass2edit a multistep generative model for guessing edited passwords",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "birds of a feather flock together how set bias helps to deanonymize you via revealed intersection sizes",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1089,
    "paper_ids": [
      3879,
      3880
    ],
    "papers_without_artifact_ids": [
      3881,
      3882,
      3883,
      3884,
      3885,
      3886
    ]
  },
  {
    "name": "Dongwon Shin",
    "display_name": "Dongwon Shin",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "You Only Perturb Once: Bypassing (Robust) Ad-Blockers Using Universal Adversarial Perturbations",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Private Investigator: Extracting Personally Identifiable Information from Large Language Models Using Optimized Prompts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1090,
    "paper_ids": [
      1713,
      1716
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Suyoung Lee",
    "display_name": "Suyoung Lee",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "You Only Perturb Once: Bypassing (Robust) Ad-Blockers Using Universal Adversarial Perturbations",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1091,
    "paper_ids": [
      1713,
      1714
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sanghyun Hong 0001",
    "display_name": "Sanghyun Hong",
    "affiliation": "Oregon State University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "You Only Perturb Once: Bypassing (Robust) Ad-Blockers Using Universal Adversarial Perturbations",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Private Investigator: Extracting Personally Identifiable Information from Large Language Models Using Optimized Prompts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1092,
    "paper_ids": [
      1713,
      1716
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xinda Wang 0001",
    "display_name": "Xinda Wang",
    "affiliation": "University of Texas at Dallas",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FedCAP: Robust Federated Learning via Customized Aggregation and Personalization",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DISPATCH: Unraveling Security Patches from Entangled Code Changes",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "when ai meets code analysis a study of adversarial attacks on deep learningbased code models via program transformation",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 1093,
    "paper_ids": [
      3887,
      548
    ],
    "papers_without_artifact_ids": [
      3888
    ]
  },
  {
    "name": "Shijie Jia 0001",
    "display_name": "Shijie Jia",
    "affiliation": "IIT Bombay",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 3,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2022": 1,
        "2017": 1
      },
      "SC": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CryptoGo: Automatic Detection of Go Cryptographic API Misuses",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "supporting transparent snapshot for baremetal malware analysis on mobile devices",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 1094,
    "paper_ids": [
      1693,
      3889
    ],
    "papers_without_artifact_ids": [
      943
    ]
  },
  {
    "name": "Jingqiang Lin 0001",
    "display_name": "Jingqiang Lin",
    "affiliation": "Chinese Academy of Sciences",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "ACSAC": 6,
      "CHES": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2021": 1,
        "2022": 2,
        "2019": 1,
        "2017": 1
      },
      "CHES": {
        "2024": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 22.2,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CryptoGo: Automatic Detection of Go Cryptographic API Misuses",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automatic insecurity exploring email autoconfiguration in the wild",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "convkyber unleashing the power of ai accelerators for faster kyber with novel iterationbased approaches",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "certificate transparency revisited the public inspections on thirdparty monitors",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "mole mitigation of sidechannel attacks against sgx via dynamic data location escape",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "heterogeneouspake bridging the gap between pake protocols and their realworld deployment",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "tfbiv transparent and finegrained binary integrity verification in the cloud",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "supporting transparent snapshot for baremetal malware analysis on mobile devices",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 1095,
    "paper_ids": [
      1693,
      3889
    ],
    "papers_without_artifact_ids": [
      905,
      3890,
      2986,
      3891,
      3892,
      2248,
      943
    ]
  },
  {
    "name": "Yuan Ma",
    "display_name": "Yuan Ma",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "SC": 0,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2022": 1
      },
      "SC": {},
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CryptoGo: Automatic Detection of Go Cryptographic API Misuses",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1096,
    "paper_ids": [
      1693,
      3889
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fangyu Zheng",
    "display_name": "Fangyu Zheng",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ACSAC": 3,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2021": 1,
        "2022": 1
      },
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CryptoGo: Automatic Detection of Go Cryptographic API Misuses",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "convkyber unleashing the power of ai accelerators for faster kyber with novel iterationbased approaches",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "heterogeneouspake bridging the gap between pake protocols and their realworld deployment",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 1097,
    "paper_ids": [
      1693,
      3889
    ],
    "papers_without_artifact_ids": [
      3890,
      3892
    ]
  },
  {
    "name": "Bowen Xu",
    "display_name": "Bowen Xu",
    "affiliation": "North Carolina State University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Curiosity-Driven and Victim-Aware Adversarial Policies",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1098,
    "paper_ids": [
      1693,
      2282
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rouzbeh Behnia",
    "display_name": "Rouzbeh Behnia",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MUSES: Efficient Multi-User Searchable Encrypted Database",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards practical postquantum signatures for resourcelimited internet of things",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 1099,
    "paper_ids": [
      1400,
      1401
    ],
    "papers_without_artifact_ids": [
      3893
    ]
  },
  {
    "name": "Shirui Pan",
    "display_name": "Shirui Pan",
    "affiliation": "Griffith University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Stealing Watermarks of Large Language Models via Mixed Integer Programming",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1100,
    "paper_ids": [
      2964,
      1565
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kyu Hyung Lee",
    "display_name": "Kyu Hyung Lee",
    "affiliation": "University of Georgia",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "FA-SEAL: Forensically Analyzable Symmetric Encryption for Audit Logs",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Unveiling IoT Security in Reality: A Firmware-Centric Journey",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1101,
    "paper_ids": [
      3894,
      1423
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chenglu Jin",
    "display_name": "Chenglu Jin",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 3,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2021": 1,
        "2019": 1
      },
      "CHES": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019,
      2024
    ],
    "year_range": "2019-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Proof of aliveness",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "group timebased onetime passwords and its application to efficient privacypreserving proof of location",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 1102,
    "paper_ids": [
      3895,
      834
    ],
    "papers_without_artifact_ids": [
      843
    ]
  },
  {
    "name": "Sumei Sun",
    "display_name": "Sumei Sun",
    "affiliation": "Institute for Infocomm Research, ASTAR, Singapore",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VaktBLE: A Benevolent Man-in-the-Middle Bridge to Guard against Malevolent BLE Connections",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1103,
    "paper_ids": [
      2186,
      2188
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ernest Kurniawan",
    "display_name": "Ernest Kurniawan",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VaktBLE: A Benevolent Man-in-the-Middle Bridge to Guard against Malevolent BLE Connections",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1104,
    "paper_ids": [
      2186,
      2188
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhiyuan Zhang 0005",
    "display_name": "Zhiyuan Zhang",
    "affiliation": "TTI Chicago",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2
      },
      "ACSAC": {
        "2024": 1
      },
      "CHES": {
        "2024": 2
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "R+R: Demystifying ML-Assisted Side-Channel Analysis Framework: A Case of Image Reconstruction",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BunnyHop: Exploiting the Instruction Prefetcher",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "teejam subcacheline leakages strike back",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "evictspectime exploiting outoforder execution to improve cachetiming attacks",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "ultimate slh taking speculative load hardening to the next level",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1105,
    "paper_ids": [
      3896,
      1499
    ],
    "papers_without_artifact_ids": [
      1431,
      1503,
      1525
    ]
  },
  {
    "name": "Bao Gia Doan",
    "display_name": "Bao Gia Doan",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1106,
    "paper_ids": [
      2189,
      2967
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ehsan Abbasnejad",
    "display_name": "Ehsan Abbasnejad",
    "affiliation": "Monash University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1107,
    "paper_ids": [
      2189,
      2967
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chuan Xu 0002",
    "display_name": "Chuan Xu",
    "affiliation": "Beihang University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Link Inference Attacks in Vertical Federated Graph Learning",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1108,
    "paper_ids": [
      3897,
      3898
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Melek Önen",
    "display_name": "Melek Önen",
    "affiliation": "EURECOM",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2022": 1
      },
      "PETS": {
        "2023": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Link Inference Attacks in Vertical Federated Graph Learning",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok secure aggregation based on cryptographic schemes for federated learning",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "funshade function secret sharing for twoparty secure thresholded distance evaluation",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 7932,
    "paper_ids": [
      3897,
      3899
    ],
    "papers_without_artifact_ids": [
      1138,
      3900
    ]
  },
  {
    "name": "Christophe Hauser",
    "display_name": "Christophe Hauser",
    "affiliation": "Dartmouth College",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "ACSAC": {
        "2024": 1,
        "2019": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "BinHunter: A Fine-Grained Graph Representation for Localizing Vulnerabilities in Binary Executables",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sleak automating address space layout derandomization",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 1110,
    "paper_ids": [
      2192,
      820
    ],
    "papers_without_artifact_ids": [
      1148
    ]
  },
  {
    "name": "Maximilian Noppel",
    "display_name": "Maximilian Noppel",
    "affiliation": "Karlsruhe Institute of Technology",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Model-Manipulation Attacks Against Black-Box Explanations",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1111,
    "paper_ids": [
      2202,
      535
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vincent Bindschaedler",
    "display_name": "Vincent Bindschaedler",
    "affiliation": "University of Florida",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 2,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 2
      },
      "ACSAC": {
        "2024": 1,
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "R+R: Towards Reliable and Generalizable Differentially Private Machine Learning",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privacy accounting εconomics: Improving differential privacy composition via a posteriori bounds",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "analyzing the monetization ecosystem of stalkerware",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "towards realistic membership inferences the case of survey data",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 1112,
    "paper_ids": [
      3901,
      3902
    ],
    "papers_without_artifact_ids": [
      2214,
      3903
    ]
  },
  {
    "name": "Ghassan Karame",
    "display_name": "Ghassan Karame",
    "affiliation": "Ruhr-University Bochum",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ACSAC": 3,
      "USENIXSEC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2021": 1,
        "2023": 1
      },
      "USENIXSEC": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Light Clients for Committee-Based Blockchains",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "No Forking Way: Detecting Cloning Attacks on Intel SGX Applications",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the forking way when tees meet consensus",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "mitosis practically scaling permissioned blockchains",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 1113,
    "paper_ids": [
      1709,
      3904
    ],
    "papers_without_artifact_ids": [
      3905,
      3906
    ]
  },
  {
    "name": "Chenyi Wang 0005",
    "display_name": "Chenyi Wang",
    "affiliation": "University of Arizona",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1114,
    "paper_ids": [
      1729,
      1733
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yanmao Man",
    "display_name": "Yanmao Man",
    "affiliation": "ByteDance, Inc",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "ACSAC": {
        "2024": 1,
        "2019": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vogues validation of object guise using estimated components",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "that person moves like a car misclassification attack detection for autonomous systems using spatiotemporal consistency",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "simple singleframe based physical layer identification for intrusion detection and prevention on invehicle networks",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 1115,
    "paper_ids": [
      1729,
      1733
    ],
    "papers_without_artifact_ids": [
      1738,
      1747,
      3907
    ]
  },
  {
    "name": "Raymond Muller",
    "display_name": "Raymond Muller",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vogues validation of object guise using estimated components",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "that person moves like a car misclassification attack detection for autonomous systems using spatiotemporal consistency",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "discovering adversarial driving maneuvers against autonomous vehicles",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1116,
    "paper_ids": [
      1729,
      1733
    ],
    "papers_without_artifact_ids": [
      1738,
      1747,
      1744
    ]
  },
  {
    "name": "Ming Li 0003",
    "display_name": "Ming Li",
    "affiliation": "Univ. of Maryland - College Park",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2025": 2
      },
      "ACSAC": {
        "2024": 1,
        "2019": 1,
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dpbrem differentiallyprivate and byzantinerobust federated learning with client momentum",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "vogues validation of object guise using estimated components",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "that person moves like a car misclassification attack detection for autonomous systems using spatiotemporal consistency",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "stegonet turn deep neural network into a stegomalware",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "pckv locally differentially private correlated keyvalue data collection with optimized utility",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "simple singleframe based physical layer identification for intrusion detection and prevention on invehicle networks",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 1117,
    "paper_ids": [
      1729,
      1733
    ],
    "papers_without_artifact_ids": [
      3908,
      1738,
      1747,
      3909,
      1698,
      3907
    ]
  },
  {
    "name": "Ryan M. Gerdes",
    "display_name": "Ryan M. Gerdes",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2024": 1,
        "2019": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vogues validation of object guise using estimated components",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "that person moves like a car misclassification attack detection for autonomous systems using spatiotemporal consistency",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "physicallayer attacks against pulse width modulationcontrolled actuators",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "simple singleframe based physical layer identification for intrusion detection and prevention on invehicle networks",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 1118,
    "paper_ids": [
      1729,
      1733
    ],
    "papers_without_artifact_ids": [
      1738,
      1747,
      3910,
      3907
    ]
  },
  {
    "name": "Patrick Zielinski",
    "display_name": "Patrick Zielinski",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Sidecar: Leveraging Debugging Extensions in Commodity Processors to Secure Software",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Rethinking Trust in Forge-Based Git Security",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1119,
    "paper_ids": [
      1753,
      3911
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Georgios Portokalidis",
    "display_name": "Georgios Portokalidis",
    "affiliation": "IMDEA Software Institute",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 2,
      "EUROSYS": 0,
      "NDSS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "ACSAC": {
        "2024": 1,
        "2019": 1
      },
      "EUROSYS": {},
      "NDSS": {},
      "OSDI": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Sidecar: Leveraging Debugging Extensions in Commodity Processors to Secure Software",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Debloating Address Sanitizer",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "nibbler debloating binary shared libraries",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 1120,
    "paper_ids": [
      1753,
      1755
    ],
    "papers_without_artifact_ids": [
      3912
    ]
  },
  {
    "name": "Jason Polakis",
    "display_name": "Jason Polakis",
    "affiliation": "University of Illinois at Chicago",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "USENIXSEC": 6,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2024": 3,
        "2022": 3
      },
      "PETS": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 22.2,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Harnessing Multiplicity: Granular Browser Extension Fingerprinting through User Configurations",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lost in translation exploring the risks of webtocrossplatform application migration",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "fledging will continue until privacy improves empirical analysis of googles privacypreserving targeted advertising",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "abandon all hope ye who enter here a dynamic longitudinal investigation of androids data safety section",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "rise of inspectron automated blackbox auditing of crossplatform electron apps",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "unleash the simulacrum shifting browser realities for robust extensionfingerprinting prevention",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "phish in sheeps clothing exploring the authentication pitfalls of browser fingerprinting",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "the dangers of human touch fingerprinting browser extensions through user actions",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1121,
    "paper_ids": [
      1111,
      3913
    ],
    "papers_without_artifact_ids": [
      3914,
      3915,
      3916,
      3917,
      827,
      3918,
      1120
    ]
  },
  {
    "name": "Marcell Szakály",
    "display_name": "Marcell Szakály",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Current Affairs: A Security Measurement Study of CCS EV Charging Deployments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7933,
    "paper_ids": [
      1757,
      2205
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anna Crowder",
    "display_name": "Anna Crowder",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Analyzing the AI Nudification Application Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1123,
    "paper_ids": [
      2208,
      2210
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Olszewski",
    "display_name": "Daniel Olszewski",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      },
      "ACSAC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Analyzing the AI Nudification Application Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "characterizing the impact of audio deepfakes in the presence of cochlear implant",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "sok towards a unified approach to applied replicability for computer security",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "sok the good the bad and the unbalanced measuring structural limitations of deepfake media datasets",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1124,
    "paper_ids": [
      2208,
      2210
    ],
    "papers_without_artifact_ids": [
      2211,
      2212,
      2213
    ]
  },
  {
    "name": "Bo Qin",
    "display_name": "Bo Qin",
    "affiliation": "Renmin University of China",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FreeAuth: Privacy-Preserving Email Ownership Authentication with Verification-Email-Free",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TockOwl: Asynchronous Consensus with Fault and Network Adaptability",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1125,
    "paper_ids": [
      3919,
      3920
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qianhong Wu",
    "display_name": "Qianhong Wu",
    "affiliation": "Beihang University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FreeAuth: Privacy-Preserving Email Ownership Authentication with Verification-Email-Free",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TockOwl: Asynchronous Consensus with Fault and Network Adaptability",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1126,
    "paper_ids": [
      3919,
      3920
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Samuele Doria",
    "display_name": "Samuele Doria",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hercules Droidot and the murder on the JNI Express",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1127,
    "paper_ids": [
      2217,
      14
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Serge Egelman",
    "display_name": "Serge Egelman",
    "affiliation": "University of California, Berkeley",
    "artifact_count": 2,
    "total_papers": 12,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "ACSAC": 1,
      "PETS": 5,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 3,
        "2023": 2,
        "2022": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "PETS": {
        "2020": 1,
        "2022": 1,
        "2023": 1,
        "2025": 1,
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Security and Privacy Failures in Popular 2FA Apps",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the effect of platform policies on app privacy compliance a study of childdirected apps",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "the medium is the message how secure messaging apps leak sensitive data to push notification services",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "lessons in vcr repair compliance of android app developers with the california consumer privacy act ccpa",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "log its big its heavy its filled with personal data measuring the logging of sensitive information in the android ecosystem",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "developers say the darnedest things privacy compliance processes followed by developers of childdirected apps",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "runtime permissions for privacy in proactive intelligent assistants",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "the price is not right comparing privacy in free and paid apps",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "actions speak louder than words entitysensitive privacy policy and data flow analysis with policheck",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "empirical measurement of systemic 2fa usability",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "youve got your nice list of bugs now what vulnerability discovery and management processes in the wild",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1128,
    "paper_ids": [
      2217,
      3921
    ],
    "papers_without_artifact_ids": [
      3922,
      3923,
      3924,
      3925,
      3926,
      3927,
      3928,
      2269,
      3929,
      3930
    ]
  },
  {
    "name": "Wenqiang Jin",
    "display_name": "Wenqiang Jin",
    "affiliation": "Hunan University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "NDSS": 2,
      "ACSAC": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "ACSAC": {
        "2021": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sipster: Settling IOU Privately and Quickly with Smart Meters",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MingledPie: A Cluster Mingling Approach for Mitigating Preference Profiling in CFL",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "eavesdropping on blackbox mobile devices via audio amplifiers emr",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "eye of sauron longrange hidden spy camera detection and positioning with inbuilt memory em radiation",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "continuous authentication using humaninduced electric potential",
        "conference": "ACSAC",
        "year": 2023
      }
    ],
    "author_id": 1129,
    "paper_ids": [
      1720,
      3931
    ],
    "papers_without_artifact_ids": [
      3932,
      3933,
      3934
    ]
  },
  {
    "name": "Leila Delshadtehrani",
    "display_name": "Leila Delshadtehrani",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FlexFilt: Towards Flexible Instruction Filtering for Security",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PHMon: A Programmable Hardware Monitor and Its Security Use Cases",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1130,
    "paper_ids": [
      793,
      796
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sadullah Canakci",
    "display_name": "Sadullah Canakci",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FlexFilt: Towards Flexible Instruction Filtering for Security",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PHMon: A Programmable Hardware Monitor and Its Security Use Cases",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1131,
    "paper_ids": [
      793,
      796
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ajay Joshi",
    "display_name": "Ajay Joshi",
    "affiliation": "Independent",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FlexFilt: Towards Flexible Instruction Filtering for Security",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PHMon: A Programmable Hardware Monitor and Its Security Use Cases",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1132,
    "paper_ids": [
      793,
      796
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xun Chen",
    "display_name": "Xun Chen",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Eluding ML-based Adblockers With Actionable Adversarial Examples",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AUDIO WATERMARK: Dynamic and Harmless Watermark for Black-box Voice Dataset Copyright Protection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1133,
    "paper_ids": [
      802,
      3935
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guoren Li",
    "display_name": "Guoren Li",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Eluding ML-based Adblockers With Actionable Adversarial Examples",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a hybrid alias analysis and its application to global variable protection in the linux kernel",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "koobe towards facilitating exploit generation of kernel outofbounds write vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1134,
    "paper_ids": [
      802,
      2220
    ],
    "papers_without_artifact_ids": [
      2144,
      2231
    ]
  },
  {
    "name": "Xiaochen Zou",
    "display_name": "Xiaochen Zou",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2022": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {
        "2024": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Eluding ML-based Adblockers With Actionable Adversarial Examples",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "kleak towards automating the generation of multistep infoleak exploits against the linux kernel",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "syzbridge bridging the gap in exploitability assessment of linux kernel bugs in the linux ecosystem",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "symbisect accurate bisection for fuzzerexposed vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "koobe towards facilitating exploit generation of kernel outofbounds write vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1135,
    "paper_ids": [
      802,
      2220
    ],
    "papers_without_artifact_ids": [
      2222,
      2223,
      2224,
      2231
    ]
  },
  {
    "name": "Giulio Lovisotto",
    "display_name": "Giulio Lovisotto",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1136,
    "paper_ids": [
      2204,
      1760
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gabriele Lenzini",
    "display_name": "Gabriele Lenzini",
    "affiliation": "Universit du Luxembourg",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1,
        "2019": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019,
      2021
    ],
    "year_range": "2019-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A game of \"Cut and Mouse\": bypassing antivirus by simulating user inputs",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "what motivates and discourages employees in phishing interventions an exploration of expectancyvalue theory",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1137,
    "paper_ids": [
      3936,
      3937
    ],
    "papers_without_artifact_ids": [
      3938
    ]
  },
  {
    "name": "Felicitas Hetzelt",
    "display_name": "Felicitas Hetzelt",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "EUROSYS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VIA: Analyzing Device Interfaces of Protected Virtual Machines",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "polynima practical hybrid recompilation for multithreaded binaries",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 1138,
    "paper_ids": [
      3939,
      3790
    ],
    "papers_without_artifact_ids": [
      3791
    ]
  },
  {
    "name": "Jean-Pierre Seifert",
    "display_name": "Jean-Pierre Seifert",
    "affiliation": "TU Berlin",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "CHES": 2,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2021": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "CHES": {
        "2024": 1,
        "2023": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VIA: Analyzing Device Interfaces of Protected Virtual Machines",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "through the lookingglass sensitive data extraction by optical probing of scan chains",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "loop aborts strike back defeating fault countermeasures in lattice signatures with ilp",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "automatic extraction of secrets from the transistor jungle using laserassisted sidechannel attacks",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1139,
    "paper_ids": [
      3939,
      3790
    ],
    "papers_without_artifact_ids": [
      3940,
      3941,
      3942
    ]
  },
  {
    "name": "Rafael Uetz",
    "display_name": "Rafael Uetz",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      },
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "introducing a comprehensive continuous and collaborative survey of intrusion detection datasets",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1140,
    "paper_ids": [
      2981,
      2982
    ],
    "papers_without_artifact_ids": [
      2984
    ]
  },
  {
    "name": "Louis Hackländer",
    "display_name": "Louis Hackländer",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7934,
    "paper_ids": [
      2981,
      2982
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alessio Merlo",
    "display_name": "Alessio Merlo",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS)",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1142,
    "paper_ids": [
      1129,
      1759
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sohaib ul Hassan",
    "display_name": "Sohaib ul Hassan",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2020
    ],
    "year_range": "2018-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Certified Side Channels",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1143,
    "paper_ids": [
      2250,
      2251
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cesar Pereida García",
    "display_name": "Cesar Pereida García",
    "affiliation": "Tampere University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "ACSAC": {
        "2018": 1
      },
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2020
    ],
    "year_range": "2018-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Certified Side Channels",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7935,
    "paper_ids": [
      2250,
      2251
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tavish Vaidya",
    "display_name": "Tavish Vaidya",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 3,
      "USENIXSEC": 0,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 2,
        "2019": 1
      },
      "USENIXSEC": {},
      "WOOT": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "An Extensive Evaluation of the Internet's Open Proxies",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeDoS: Defusing DoS with Dispersion Oriented Software",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "whisper a unilateral defense against voip traffic reidentification attacks",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 1147,
    "paper_ids": [
      1140,
      696
    ],
    "papers_without_artifact_ids": [
      1147
    ]
  },
  {
    "name": "Haehyun Cho",
    "display_name": "Haehyun Cho",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      },
      "ACSAC": {
        "2018": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2022
    ],
    "year_range": "2018-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploiting uses of uninitialized stack variables in linux kernels to leak kernel pointers",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "primecount novel crossworld covert channels on arm trustzone",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 1148,
    "paper_ids": [
      815,
      821
    ],
    "papers_without_artifact_ids": [
      829,
      832
    ]
  },
  {
    "name": "Xiaokuan Zhang",
    "display_name": "Xiaokuan Zhang",
    "affiliation": "George Mason University",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 2,
      "ATC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2025": 1
      },
      "ACSAC": {
        "2024": 1,
        "2018": 1
      },
      "ATC": {
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2025
    ],
    "year_range": "2018-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TYPEPULSE: Detecting Type Confusion Bugs in Rust Programs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "breaking the privacy barrier on the feasibility of reorganization attacks on ethereum private transactions",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "sense enhancing microarchitectural awareness for tees via subscriptionbased notification",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "penetration vision through virtual reality headsets identifying 360degree videos from head movements",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "policycomp counterpart comparison of privacy policies uncovers overbroad personal data collection practices",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "pridwen universally hardening sgx programs via loadtime synthesis",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "txspector uncovering attacks in ethereum from transactions",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1149,
    "paper_ids": [
      361,
      1458
    ],
    "papers_without_artifact_ids": [
      371,
      660,
      3943,
      3302,
      664,
      380
    ]
  },
  {
    "name": "Jan Wichelmann",
    "display_name": "Jan Wichelmann",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "ACSAC": {
        "2018": 1
      },
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2023
    ],
    "year_range": "2018-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MicroWalk: A Framework for Finding Side Channels in Binaries",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "teecorrelate an informationpreserving defense against performancecounter attacks on tees",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "sevstep a singlestepping framework for amdsev",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 1150,
    "paper_ids": [
      1426,
      1430
    ],
    "papers_without_artifact_ids": [
      342,
      1432
    ]
  },
  {
    "name": "Tim Blazytko",
    "display_name": "Tim Blazytko",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      },
      "ACSAC": {
        "2018": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2022
    ],
    "year_range": "2018-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards Automated Generation of Exploitation Primitives for Web Browsers",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Loki: Hardening Code Obfuscation Against Automated Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aurora statistical crash analysis for automated root cause explanation",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1151,
    "paper_ids": [
      99,
      105
    ],
    "papers_without_artifact_ids": [
      122
    ]
  },
  {
    "name": "Mohsen Ahmadvand",
    "display_name": "Mohsen Ahmadvand",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 3
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1,
        "2018": 1,
        "2019": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018,
      2019
    ],
    "year_range": "2018-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Integrity Protection with Oblivious Hashing",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SIP shaker: software integrity protection composition",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dynamic taint analysis versus obfuscated selfchecking",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 1152,
    "paper_ids": [
      3944,
      3945
    ],
    "papers_without_artifact_ids": [
      3946
    ]
  },
  {
    "name": "Sebastian Banescu",
    "display_name": "Sebastian Banescu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 3,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1,
        "2018": 1,
        "2019": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018,
      2019
    ],
    "year_range": "2018-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Integrity Protection with Oblivious Hashing",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SIP shaker: software integrity protection composition",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dynamic taint analysis versus obfuscated selfchecking",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 1153,
    "paper_ids": [
      3944,
      3945
    ],
    "papers_without_artifact_ids": [
      3946
    ]
  },
  {
    "name": "Shachee Mishra",
    "display_name": "Shachee Mishra",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "ACSAC": {
        "2018": 1
      },
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2020
    ],
    "year_range": "2018-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Shredder: Breaking Exploits through API Specialization",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Temporal System Call Specialization for Attack Surface Reduction",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sgxpecial specializing sgx interfaces against code reuse attacks",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 1154,
    "paper_ids": [
      2987,
      2988
    ],
    "papers_without_artifact_ids": [
      2992
    ]
  },
  {
    "name": "Bumjin Im",
    "display_name": "Bumjin Im",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2024
    ],
    "year_range": "2018-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "An Historical Analysis of the SEAndroid Policy Evolution",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1155,
    "paper_ids": [
      697,
      3609
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Radu State",
    "display_name": "Radu State",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "ACSAC": {
        "2018": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2021
    ],
    "year_range": "2018-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1156,
    "paper_ids": [
      2997,
      2998
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ilya Sergey",
    "display_name": "Ilya Sergey",
    "affiliation": "National University of Singapore",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2025
    ],
    "year_range": "2018-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Finding The Greedy, Prodigal, and Suicidal Contracts at Scale",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sound and Efficient Generation of Data-Oriented Exploits via Programming Language Synthesis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1157,
    "paper_ids": [
      1766,
      3947
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aquinas Hobor",
    "display_name": "Aquinas Hobor",
    "affiliation": "University College London",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2018,
      2023
    ],
    "year_range": "2018-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Finding The Greedy, Prodigal, and Suicidal Contracts at Scale",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Smart Learning to Find Dumb Contracts",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "besfs a posix filesystem for enclaves with a mechanized safety proof",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1158,
    "paper_ids": [
      1766,
      3948
    ],
    "papers_without_artifact_ids": [
      1771
    ]
  },
  {
    "name": "Ruby B. Lee",
    "display_name": "Ruby B. Lee",
    "affiliation": "Princeton University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1,
        "2019": 1
      },
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018,
      2019
    ],
    "year_range": "2018-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Analyzing Cache Side Channels Using Deep Neural Networks",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Model inversion attacks against collaborative inference",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1159,
    "paper_ids": [
      362,
      732
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bin Yuan",
    "display_name": "Bin Yuan",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2025": 1
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Automated Vulnerability Repair: Methods, Tools, and Assessments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shattered chain of trust understanding security risks in crosscloud iot access delegation",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1160,
    "paper_ids": [
      1094,
      1097
    ],
    "papers_without_artifact_ids": [
      615
    ]
  },
  {
    "name": "Deqing Zou",
    "display_name": "Deqing Zou",
    "affiliation": "HUST",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 2,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2025": 1
      },
      "ACSAC": {
        "2018": 1,
        "2022": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Automated Vulnerability Repair: Methods, Tools, and Assessments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fire combining multistage filtering with taint analysis for scalable recurring vulnerability detection",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "shattered chain of trust understanding security risks in crosscloud iot access delegation",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "a heuristic framework to detect concurrency vulnerabilities",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 1161,
    "paper_ids": [
      1094,
      1097
    ],
    "papers_without_artifact_ids": [
      1107,
      615,
      1109
    ]
  },
  {
    "name": "Sangho Lee 0001",
    "display_name": "Sangho Lee",
    "affiliation": "IIT Bombay",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "SOSP": 0,
      "ATC": 2,
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 2
      },
      "SOSP": {},
      "ATC": {
        "2022": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Spacelord: Private and Secure Smart Space Sharing",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeView: Confining Progressive Web Applications by Debloating Web APIs",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "subverting the secure vm by exploiting pcie devices",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "apron authenticated and progressive system image renovation",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "rethinking system audit architectures for high event coverage and synchronous log availability",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "pridwen universally hardening sgx programs via loadtime synthesis",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 1162,
    "paper_ids": [
      3508,
      1408
    ],
    "papers_without_artifact_ids": [
      2767,
      3949,
      3950,
      664
    ]
  },
  {
    "name": "Marcus Peinado",
    "display_name": "Marcus Peinado",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ACSAC": 1,
      "SOSP": 0,
      "ATC": 0,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "SOSP": {},
      "ATC": {},
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "OSDI"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Spacelord: Private and Secure Smart Space Sharing",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rethinking system audit architectures for high event coverage and synchronous log availability",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1163,
    "paper_ids": [
      3508,
      3448
    ],
    "papers_without_artifact_ids": [
      3950
    ]
  },
  {
    "name": "Yue Li 0037",
    "display_name": "Yue Li",
    "affiliation": "Peking University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1164,
    "paper_ids": [
      3951,
      3952
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Adam Oest",
    "display_name": "Adam Oest",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 2,
        "2021": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Analysis of Payment Service Provider SDKs in Android",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scammagnifier piercing the veil of fraudulent shopping website campaigns",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "having your cake and eating it an analysis of concessionabuseasaservice",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "sunrise to sunset analyzing the endtoend life cycle and effectiveness of phishing attacks at scale",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "phishtime continuous longitudinal measurement of the effectiveness of antiphishing blacklists",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1165,
    "paper_ids": [
      2263,
      100
    ],
    "papers_without_artifact_ids": [
      823,
      828,
      831,
      830
    ]
  },
  {
    "name": "Muhammad Saad 0001",
    "display_name": "Muhammad Saad",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Analysis of Payment Service Provider SDKs in Android",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scammagnifier piercing the veil of fraudulent shopping website campaigns",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 1166,
    "paper_ids": [
      2263,
      100
    ],
    "papers_without_artifact_ids": [
      823
    ]
  },
  {
    "name": "Alessandro Erba 0001",
    "display_name": "Alessandro Erba",
    "affiliation": "University of Kentucky",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1,
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1167,
    "paper_ids": [
      2999,
      3000
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Komail Dharsee",
    "display_name": "Komail Dharsee",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Randezvous: Making Randomization Effective on MCUs",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "jinn hijacking safe programs with trojans",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1168,
    "paper_ids": [
      3002,
      2937
    ],
    "papers_without_artifact_ids": [
      3003
    ]
  },
  {
    "name": "Xiaohui Hu",
    "display_name": "Xiaohui Hu",
    "affiliation": "University of Notre Dame",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Following Devils' Footprint: Towards Real-time Detection of Price Manipulation Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1169,
    "paper_ids": [
      3953,
      3954
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Binbin Chen 0001",
    "display_name": "Binbin Chen",
    "affiliation": "SUTD",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 3
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2022": 1,
        "2017": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017,
      2022
    ],
    "year_range": "2017-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From Hindsight to Foresight: Enhancing Design Artifacts for Business Logic Flaw Discovery",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "generating abuse stories and misuse cases using large language models",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 1170,
    "paper_ids": [
      3955,
      1695
    ],
    "papers_without_artifact_ids": [
      3956
    ]
  },
  {
    "name": "Muhammad Adil Inam",
    "display_name": "Muhammad Adil Inam",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "How does Endpoint Detection use the MITRE ATT&CK Framework?",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "alastor reconstructing the provenance of serverless intrusions",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1171,
    "paper_ids": [
      3957,
      1526
    ],
    "papers_without_artifact_ids": [
      2267
    ]
  },
  {
    "name": "Jason Liu 0002",
    "display_name": "Jason Liu",
    "affiliation": "Adelaide University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2022": 1,
        "2020": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "How does Endpoint Detection use the MITRE ATT&CK Framework?",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the forensic validity of approximated audit logs",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 1172,
    "paper_ids": [
      3957,
      1526
    ],
    "papers_without_artifact_ids": [
      3958
    ]
  },
  {
    "name": "Jaron Mink",
    "display_name": "Jaron Mink",
    "affiliation": "Arizona State University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1
      },
      "ACSAC": {
        "2022": 1,
        "2020": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok or solk on the quantitative study of sociodemographic factors and computer security behaviors",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "security is not my field im a stats guy a qualitative root cause analysis of barriers to adversarial machine learning defenses in industry",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "on the forensic validity of approximated audit logs",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 1173,
    "paper_ids": [
      3957,
      1528
    ],
    "papers_without_artifact_ids": [
      3212,
      1251,
      3958
    ]
  },
  {
    "name": "Adam Bates 0001",
    "display_name": "Adam Bates",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 4,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2021": 1
      },
      "ACSAC": {
        "2022": 1,
        "2020": 3
      },
      "NDSS": {}
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "How does Endpoint Detection use the MITRE ATT&CK Framework?",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "alastor reconstructing the provenance of serverless intrusions",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "causal analysis for softwaredefined networking attacks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "this is why we cant cache nice things lightningfast threat hunting using suspicionbased hierarchical storage",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "workflow integration alleviates identity and access management in serverless computing",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "on the forensic validity of approximated audit logs",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 1174,
    "paper_ids": [
      3957,
      1526
    ],
    "papers_without_artifact_ids": [
      2267,
      3959,
      3247,
      3960,
      3958
    ]
  },
  {
    "name": "Wajih Ul Hassan",
    "display_name": "Wajih Ul Hassan",
    "affiliation": "University of Virginia",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 3,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2022": 1,
        "2020": 2
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Principled and Automated Approach for Investigating AR/VR Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "this is why we cant cache nice things lightningfast threat hunting using suspicionbased hierarchical storage",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "on the forensic validity of approximated audit logs",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 1175,
    "paper_ids": [
      3957,
      3961
    ],
    "papers_without_artifact_ids": [
      3247,
      3958
    ]
  },
  {
    "name": "Kangjie Lu",
    "display_name": "Kangjie Lu",
    "affiliation": "University of Minnesota",
    "artifact_count": 2,
    "total_papers": 15,
    "total_papers_by_conf": {
      "USENIXSEC": 11,
      "ACSAC": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2020": 1,
        "2023": 2,
        "2022": 1,
        "2021": 4
      },
      "ACSAC": {
        "2022": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "NDSS": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 13.3,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bulkhead secure scalable and efficient kernel compartmentalization with pks",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "sheeps clothing wolfs data detecting serverinduced client vulnerabilities in windows remote ipc",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "gnnic finding longlost sibling functions with abstract similarity",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "improving indirectcall analysis in llvm with type and dataflow coanalysis",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "exploring chatgpts capabilities on vulnerability management",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "detecting kernel memory bugs through inconsistent memory management intention inferences",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "actor actionguided kernel fuzzing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "osaware vulnerability prioritization via differential severity analysis",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "understanding and detecting disordered error handling with precise function pairing",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "unifuzz a holistic and pragmatic metricsdriven platform for evaluating fuzzers",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "detecting kernel refcount bugs with twodimensional consistency checking",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "static detection of unsafe dma accesses in device drivers",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "fuzzing error handling code using contextsensitive software fault injection",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1176,
    "paper_ids": [
      296,
      10
    ],
    "papers_without_artifact_ids": [
      3014,
      3962,
      2141,
      1547,
      1551,
      1548,
      24,
      3161,
      3963,
      1558,
      258,
      3964,
      3432
    ]
  },
  {
    "name": "Dominik Roy George",
    "display_name": "Dominik Roy George",
    "affiliation": "Eindhoven University of Technology",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Privacy-Preserving Trajectory Matching on Autonomous Unmanned Aerial Vehicles",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Remote Attestation with Constrained Disclosure",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1177,
    "paper_ids": [
      3006,
      3049
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "James Mattei",
    "display_name": "James Mattei",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Qualitative Evaluation of Reverse Engineering Tool Usability",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "im trying to learnand im shooting myself in the foot beginners struggles when solving binary exploitation exercises",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 1178,
    "paper_ids": [
      2278,
      2279
    ],
    "papers_without_artifact_ids": [
      2280
    ]
  },
  {
    "name": "Xiaoyuan Wu",
    "display_name": "Xiaoyuan Wu",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "User Perceptions of Five-Word Passwords",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Security and Privacy Perceptions of Third-Party Application Access for Google Accounts",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "transparency or information overload evaluating users comprehension and perceptions of the ios app privacy report",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 1179,
    "paper_ids": [
      856,
      861
    ],
    "papers_without_artifact_ids": [
      2590
    ]
  },
  {
    "name": "Xinwen Hou",
    "display_name": "Xinwen Hou",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Curiosity-Driven and Victim-Aware Adversarial Policies",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware Pretraining",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1180,
    "paper_ids": [
      2282,
      895
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qingkai Zeng 0002",
    "display_name": "Qingkai Zeng",
    "affiliation": "Nanjing University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Formal Modeling and Security Analysis for Intra-level Privilege Separation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PET: Prevent Discovered Errors from Being Triggered in the Linux Kernel",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bulkhead secure scalable and efficient kernel compartmentalization with pks",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 1181,
    "paper_ids": [
      3013,
      1872
    ],
    "papers_without_artifact_ids": [
      3014
    ]
  },
  {
    "name": "Debopriya Roy Dipta",
    "display_name": "Debopriya Roy Dipta",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DF-SCA: Dynamic Frequency Side Channel Attacks are Practical",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1182,
    "paper_ids": [
      3965,
      3966
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Berk Gülmezoglu",
    "display_name": "Berk Gülmezoglu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "CHES": 0,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1,
        "2023": 1
      },
      "CHES": {},
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DF-SCA: Dynamic Frequency Side Channel Attacks are Practical",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7936,
    "paper_ids": [
      3965,
      3966
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrea Continella",
    "display_name": "Andrea Continella",
    "affiliation": "University of Twente",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2018": 2,
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Automated TTP Extraction from CTI Reports - Are We There Yet?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "replicawatcher trainingless anomaly detection in containerized microservices",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "theres a hole in that bucket a largescale analysis of misconfigured s3 buckets",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "systaint assisting reversing of malicious network communications",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 1184,
    "paper_ids": [
      2961,
      1437
    ],
    "papers_without_artifact_ids": [
      1442,
      3068,
      3067
    ]
  },
  {
    "name": "Noah Spahn",
    "display_name": "Noah Spahn",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "POPKORN: Popping Windows Kernel Drivers At Scale",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Regulator: Dynamic Analysis to Detect ReDoS",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1185,
    "paper_ids": [
      654,
      1151
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ning Wang 0022",
    "display_name": "Ning Wang",
    "affiliation": "University of South Florida",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1186,
    "paper_ids": [
      164,
      2291
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yimin Chen 0004",
    "display_name": "Yimin Chen",
    "affiliation": "University of Massachusetts Lowell",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "EchoLLM: LLM-Augmented Acoustic Eavesdropping Attack on Bone Conduction Headphones with mmWave Radar",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1187,
    "paper_ids": [
      164,
      3967
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Feng He",
    "display_name": "Feng He",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cross-Modal Prompt Inversion: Unifying Threats to Text and Image Generative AI Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1188,
    "paper_ids": [
      3968,
      1570
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rahel A. Fainchtein",
    "display_name": "Rahel A. Fainchtein",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "User Perceptions of the Privacy and Usability of Smart DNS",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Educators' Perspectives of Using (or Not Using) Online Exam Proctoring",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "holes in the geofence privacy vulnerabilities in smart dns services",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "examining the examiners students privacy and security perceptions of online proctoring services",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1189,
    "paper_ids": [
      857,
      859
    ],
    "papers_without_artifact_ids": [
      868,
      875
    ]
  },
  {
    "name": "Zheng Yang 0001",
    "display_name": "Zheng Yang",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {
        "2021": 1,
        "2022": 1,
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2023
    ],
    "year_range": "2019-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Proof of aliveness",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TAP: Transparent and Privacy-Preserving Data Services",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "if you cant beat them pay them bitcoin protection racket is profitable",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "group timebased onetime passwords and its application to efficient privacypreserving proof of location",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 1190,
    "paper_ids": [
      834,
      836
    ],
    "papers_without_artifact_ids": [
      842,
      843
    ]
  },
  {
    "name": "Sebastian Szyller",
    "display_name": "Sebastian Szyller",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2024
    ],
    "year_range": "2019-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Detecting organized eCommerce fraud using scalable categorical clustering",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "False Claims against Model Ownership Resolution",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1191,
    "paper_ids": [
      3969,
      298
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yoshimichi Nakatsuka",
    "display_name": "Yoshimichi Nakatsuka",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {
        "2019": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2025
    ],
    "year_range": "2019-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PDoT: private DNS-over-TLS with TEE support",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "URL Inspection Tasks: Helping Users Detect Phishing Links in Emails",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scrappy secure rate assuring protocol with privacy",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "an empirical study evaluation of modern captchas",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "cacti captcha avoidance via clientside tee integration",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1192,
    "paper_ids": [
      1173,
      1177
    ],
    "papers_without_artifact_ids": [
      3970,
      1179,
      1182
    ]
  },
  {
    "name": "Andrew Paverd",
    "display_name": "Andrew Paverd",
    "affiliation": "Microsoft Research",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 1,
      "ATC": 0,
      "SYSTEX": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2021": 1
      },
      "ACSAC": {
        "2019": 1
      },
      "ATC": {},
      "SYSTEX": {},
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2019,
      2024
    ],
    "year_range": "2019-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PDoT: private DNS-over-TLS with TEE support",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Closed-Form Bounds for DP-SGD against Record-level Inference",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an empirical study evaluation of modern captchas",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "prehijacked accounts an empirical study of security failures in user account creation on the web",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "cacti captcha avoidance via clientside tee integration",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1193,
    "paper_ids": [
      1173,
      3193
    ],
    "papers_without_artifact_ids": [
      1179,
      3971,
      1182
    ]
  },
  {
    "name": "Vashek Matyas",
    "display_name": "Vashek Matyas",
    "affiliation": "Masaryk University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1,
        "2017": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017,
      2019
    ],
    "year_range": "2017-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Will you trust this TLS certificate?: perceptions of people working in IT",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1194,
    "paper_ids": [
      3972,
      3061
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sze Yiu Chau",
    "display_name": "Sze Yiu Chau",
    "affiliation": "Simon Fraser University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "NDSS": 2,
      "ACSAC": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "ACSAC": {
        "2018": 1,
        "2019": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS"
    ],
    "years": [
      2019,
      2024
    ],
    "year_range": "2019-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Koinonia: verifiable e-voting with long-term privacy",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Precise Reporting of Cryptographic Misuses",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a multifaceted study on the use of tls and autodetect in email ecosystems",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "back to school on the insecurity of academic vpns",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "why johnny cant make money with his contents pitfalls of designing and implementing content delivery apps",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 1195,
    "paper_ids": [
      894,
      3973
    ],
    "papers_without_artifact_ids": [
      3974,
      3975,
      2582
    ]
  },
  {
    "name": "Justin Cappos",
    "display_name": "Justin Cappos",
    "affiliation": "New York University",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "USENIXSEC": 0,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2023": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {},
      "USENIXSEC": {},
      "NSDI": {
        "2014": 1,
        "2016": 1,
        "2008": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Rethinking Trust in Forge-Based Git Security",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "edgenet a multitenant and multiprovider edge cloud",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "diplomat using delegations to protect community repositories",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "netcheck network diagnoses from blackbox traces",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "san fermín aggregating large data sets using a binomial swap forest",
        "conference": "NSDI",
        "year": 2008
      }
    ],
    "author_id": 1196,
    "paper_ids": [
      3976,
      3911
    ],
    "papers_without_artifact_ids": [
      3977,
      3978,
      3979,
      3980
    ]
  },
  {
    "name": "Shujie Cui",
    "display_name": "Shujie Cui",
    "affiliation": "Monash University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 1
      },
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "resultpatternhiding conjunctive searchable symmetric encryption with forward and backward privacy",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 1197,
    "paper_ids": [
      2958,
      1564
    ],
    "papers_without_artifact_ids": [
      3981
    ]
  },
  {
    "name": "Silvia Sebastián",
    "display_name": "Silvia Sebastián",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1,
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Domain and Website Attribution beyond WHOIS",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AVclass2: Massive Malware Tag Extraction from AV Labels",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7937,
    "paper_ids": [
      3982,
      3983
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Juan Caballero",
    "display_name": "Juan Caballero",
    "affiliation": "IMDEA Software Institute",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "USENIXSEC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1,
        "2020": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Domain and Website Attribution beyond WHOIS",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AVclass2: Massive Malware Tag Extraction from AV Labels",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ctrlaltdeceive quantifying user exposure to online scams",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "all your database are belong to us characterizing database ransomware attacks",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "one size does not fit all quantifying the risk of malicious app encounters for different android user profiles",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1199,
    "paper_ids": [
      3982,
      3983
    ],
    "papers_without_artifact_ids": [
      3984,
      3985,
      3986
    ]
  },
  {
    "name": "Iskander Sánchez-Rola",
    "display_name": "Iskander Sánchez-Rola",
    "affiliation": "NortonLifeLock Research Group",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2019": 1,
        "2023": 2
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Domain and Website Attribution beyond WHOIS",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Lost in the Mists of Time: Expirations in DNS Footprints of Mobile Apps",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ctrlaltdeceive quantifying user exposure to online scams",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "scamdog millionaire detecting ecommerce scams in the wild",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "rods with laser beams understanding browser fingerprinting on phishing pages",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "when sally met trackers web tracking from the users perspective",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "bakingtimer privacy analysis of serverside request processing time",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 7938,
    "paper_ids": [
      3982,
      1114
    ],
    "papers_without_artifact_ids": [
      3984,
      3987,
      3988,
      3989,
      3990
    ]
  },
  {
    "name": "Alina Oprea",
    "display_name": "Alina Oprea",
    "affiliation": "Northeastern University",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "PETS": 2,
      "ACSAC": 3,
      "FAST": 1,
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 1
      },
      "ACSAC": {
        "2018": 1,
        "2022": 1,
        "2023": 1
      },
      "FAST": {
        "2010": 1
      },
      "USENIXSEC": {
        "2021": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Poisoning Network Flow Classifiers",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TMI! Finetuned Models Leak Private Information from their Pretraining Data",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how to combine membershipinference attacks on multiple updated machine learning models",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "a recent year on the internet measuring and understanding the threats to everyday internet devices",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "extracting training data from large language models",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "explanationguided backdoor poisoning attacks against malware classifiers",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "made security analytics for enterprise threat detection",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "a cleanslate look at disk scrubbing",
        "conference": "FAST",
        "year": 2010
      }
    ],
    "author_id": 1201,
    "paper_ids": [
      3991,
      3992
    ],
    "papers_without_artifact_ids": [
      2680,
      3043,
      3286,
      3993,
      3060,
      3994
    ]
  },
  {
    "name": "Chia-Che Tsai",
    "display_name": "Chia-Che Tsai",
    "affiliation": "Texas A&M University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "SOSP": 0,
      "EUROSYS": 0,
      "ATC": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 2
      },
      "ACSAC": {
        "2023": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "ATC": {},
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Attack of the Knights: Non Uniform Cache Side Channel Attack",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an offchip attack on hardware enclaves via the memory bus",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "civet an efficient java partitioning framework for hardware enclaves",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1202,
    "paper_ids": [
      3995,
      3609
    ],
    "papers_without_artifact_ids": [
      679,
      680
    ]
  },
  {
    "name": "Kristen Moore",
    "display_name": "Kristen Moore",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1203,
    "paper_ids": [
      765,
      1568
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Samira Briongos",
    "display_name": "Samira Briongos",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "No Forking Way: Detecting Cloning Attacks on Intel SGX Applications",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1204,
    "paper_ids": [
      3904,
      1429
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hossein Fereidooni",
    "display_name": "Hossein Fereidooni",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1
      },
      "ACSAC": {
        "2023": 1
      },
      "NDSS": {
        "2024": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "demasq unmasking the chatgpt wordsmith",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "freqfed a frequency analysisbased approach for mitigating poisoning attacks in federated learning",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "xplain analyzing invisible correlations in model explanation",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "flame taming backdoors in federated learning",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1205,
    "paper_ids": [
      2301,
      2302
    ],
    "papers_without_artifact_ids": [
      2307,
      2309,
      2313,
      2318
    ]
  },
  {
    "name": "Dustin Kern",
    "display_name": "Dustin Kern",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Detection of Anomalies in Electric Vehicle Charging Sessions",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Integrating Privacy into the Electric Vehicle Charging Architecture",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1206,
    "paper_ids": [
      410,
      3050
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christian Plappert",
    "display_name": "Christian Plappert",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1207,
    "paper_ids": [
      3996,
      3997
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andreas Fuchs 0002",
    "display_name": "Andreas Fuchs",
    "affiliation": "Jacobs University Bremen",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 2
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1208,
    "paper_ids": [
      3996,
      3997
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jens Grossklags",
    "display_name": "Jens Grossklags",
    "affiliation": "TU Munich",
    "artifact_count": 2,
    "total_papers": 15,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 6,
      "USENIXSEC": 1,
      "PETS": 7
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1,
        "2018": 1,
        "2019": 1,
        "2023": 1,
        "2017": 1,
        "2020": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "PETS": {
        "2020": 1,
        "2022": 4,
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 13.3,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Rediscovering Method Confusion in Proposed Security Fixes for Bluetooth",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a longitudinal analysis of corporate data portability practices across industries",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "distributed ganbased privacypreserving publication of verticallypartitioned data",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "bug hunters perspectives on the challenges and benefits of the bug bounty ecosystem",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "leave no data behind empirical insights into data erasure from online services",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "privacypreserving highdimensional data collection with federated generative autoencoder",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "comprehensive analysis of privacy leakage in vertical federated learning during prediction",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "a multiregion investigation of the perceptions and use of smart home devices",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "data portability between online services an empirical analysis on the effectiveness of gdpr art 20",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "ρfem efficient backwardedge protection using reversed forwardedge mappings",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "an analysis of the current state of the consumer credit reporting system in china",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "analyzing control flow integrity with llvmcfi",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "take it or leave it a survey study on operating system upgrade practices",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "i like it but i hate it employee perceptions towards an institutional transition to byod secondfactor authentication",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 1209,
    "paper_ids": [
      3998,
      3999
    ],
    "papers_without_artifact_ids": [
      4000,
      4001,
      1271,
      4002,
      4003,
      4004,
      4005,
      4006,
      395,
      4007,
      400,
      4008,
      4009
    ]
  },
  {
    "name": "Arjun Arunasalam",
    "display_name": "Arjun Arunasalam",
    "affiliation": "Florida International University",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Shadowed Realities: An Investigation of UI Attacks in WebXR",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the dark side of ecommerce dropshipping abuse as a business model",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "attention please an investigation of the app tracking transparency permission",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "understanding the security and privacy implications of online toxic content on refugees",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "behind the tube exploitative monetization of content on youtube",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1210,
    "paper_ids": [
      1730,
      1731
    ],
    "papers_without_artifact_ids": [
      1736,
      1741,
      1740,
      1749
    ]
  },
  {
    "name": "Klaus von Gleissenthall",
    "display_name": "Klaus von Gleissenthall",
    "affiliation": "VU Amsterdam",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Triereme: Speeding up hybrid fuzzing through efficient query scheduling",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1211,
    "paper_ids": [
      80,
      90
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingyu Gao 0001",
    "display_name": "Mingyu Gao",
    "affiliation": "Tsinghua University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "ACSAC": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2023": 1
      },
      "ACSAC": {
        "2023": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "OSDI"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PET: Optimizing Tensor Programs with Partially Equivalent Transformations and Automated Corrections",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "honeycomb secure and efficient gpu executions via static validation",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 1212,
    "paper_ids": [
      4010,
      1616
    ],
    "papers_without_artifact_ids": [
      4011
    ]
  },
  {
    "name": "Sijun Tan",
    "display_name": "Sijun Tan",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "ACSAC",
      "OSDI"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Secure Softmax/Sigmoid for Machine-learning Computation",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Flock: A Framework for Deploying On-Demand Distributed Trust",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1213,
    "paper_ids": [
      1721,
      672
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Somesh Jha",
    "display_name": "Somesh Jha",
    "affiliation": "University of Wisconsin - Madison",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "PETS": 2,
      "ACSAC": 2,
      "ATC": 0,
      "FAST": 1,
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2021": 1
      },
      "ACSAC": {
        "2023": 1,
        "2017": 1
      },
      "ATC": {},
      "FAST": {
        "2005": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Differentially Private Resource Allocation",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Face-Off: Adversarial Face Obfuscation",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "private multiwinner voting for machine learning",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "fairness properties of face recognition and obfuscation systems",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "exploring connections between active learning and model extraction",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "objective metrics and gradient descent algorithms for adversarial examples in machine learning",
        "conference": "ACSAC",
        "year": 2017
      },
      {
        "title": "a logic of file systems",
        "conference": "FAST",
        "year": 2005
      }
    ],
    "author_id": 1214,
    "paper_ids": [
      180,
      3390
    ],
    "papers_without_artifact_ids": [
      3232,
      3393,
      4012,
      4013,
      2043
    ]
  },
  {
    "name": "Maarten H. Everts",
    "display_name": "Maarten H. Everts",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2017": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2017,
      2025
    ],
    "year_range": "2017-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Efficient Ranking, Order Statistics, and Sorting under CKKS",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1215,
    "paper_ids": [
      1436,
      1438
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jan Tobias Mühlberg",
    "display_name": "Jan Tobias Mühlberg",
    "affiliation": "KU Leuven",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "ACSAC": {
        "2017": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS"
    ],
    "years": [
      2017,
      2024
    ],
    "year_range": "2017-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Efficient and Timely Revocation of V2X Credentials",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7939,
    "paper_ids": [
      1444,
      3085
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hamed Okhravi",
    "display_name": "Hamed Okhravi",
    "affiliation": "Massachusetts Institute of Technology",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 4,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2021": 1
      },
      "ACSAC": {
        "2024": 1,
        "2021": 1,
        "2018": 1,
        "2017": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2017,
      2024
    ],
    "year_range": "2017-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "QUASAR: Quantitative Attack Space Analysis and Reasoning",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VulSim: Leveraging Similarity of Multi-Dimensional Neighbor Embeddings for Vulnerability Detection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "software vulnerability detection using llm does additional information help",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "keeping safe rust safe with galeed",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "causal analysis for softwaredefined networking attacks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "on the effectiveness of typebased control flow integrity",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 1217,
    "paper_ids": [
      4014,
      4015
    ],
    "papers_without_artifact_ids": [
      4016,
      4017,
      3959,
      3047
    ]
  },
  {
    "name": "Daniel De Almeida Braga",
    "display_name": "Daniel De Almeida Braga",
    "affiliation": "Rennes University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"These results must be false\": A usability evaluation of constant-time analysis tools",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1218,
    "paper_ids": [
      1782,
      1784
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Samuel Kounev",
    "display_name": "Samuel Kounev",
    "affiliation": "University of Würzburg",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "ACSAC": {
        "2018": 1,
        "2020": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Quantifying measurement quality and load distribution in Tor",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "smartor smarter tor with smart contracts improving resilience of topology distribution in the tor network",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 1219,
    "paper_ids": [
      4018,
      1175
    ],
    "papers_without_artifact_ids": [
      4019
    ]
  },
  {
    "name": "Phakpoom Chinprutthiwong",
    "display_name": "Phakpoom Chinprutthiwong",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Security Study of Service Worker Cross-Site Scripting",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SWAPP: A New Programmable Playground for Web Application Security",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1220,
    "paper_ids": [
      4020,
      4021
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guangliang Yang 0001",
    "display_name": "Guangliang Yang",
    "affiliation": "Fudan University",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Security Study of Service Worker Cross-Site Scripting",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the skeleton keys a large scale analysis of credential leakage in miniapps",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "notice the imposter a study on user tag spoofing attack in mobile apps",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "identity confusion in webviewbased mobile appinapp ecosystems",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "abusing hidden properties to attack the nodejs ecosystem",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1221,
    "paper_ids": [
      4020,
      238
    ],
    "papers_without_artifact_ids": [
      244,
      250,
      254,
      1418
    ]
  },
  {
    "name": "Guofei Gu",
    "display_name": "Guofei Gu",
    "affiliation": "Texas A&M University",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 3,
        "2021": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Security Study of Service Worker Cross-Site Scripting",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SWAPP: A New Programmable Playground for Web Application Security",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "you can obfuscate but you cannot hide crosspoint attacks against network topology obfuscation",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "said stateaware defense against injection attacks on invehicle network",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "towards automatically reverse engineering vehicle diagnostic protocols",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "abusing hidden properties to attack the nodejs ecosystem",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1222,
    "paper_ids": [
      4020,
      4021
    ],
    "papers_without_artifact_ids": [
      2244,
      691,
      692,
      1418
    ]
  },
  {
    "name": "Sven Bugiel",
    "display_name": "Sven Bugiel",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 2
      },
      "ACSAC": {
        "2020": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Up2Dep: Android Tool Support to Fix Insecure Code Dependencies",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Stack Overflow Meets Replication: Security Research Amid Evolving Code Snippets",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the power of words a comprehensive analysis of rationales and their effects on users permission decisions",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "a11y and privacy dont have to be mutually exclusive constraining accessibility service misuse on android",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "explanation beats context the effect of timing rationales on users runtime permission decisions",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1223,
    "paper_ids": [
      402,
      4022
    ],
    "papers_without_artifact_ids": [
      4023,
      406,
      409
    ]
  },
  {
    "name": "Nian Xue",
    "display_name": "Nian Xue",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "PETS": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lanshield analysing and protecting local network access on mobile devices",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 1224,
    "paper_ids": [
      3073,
      3074
    ],
    "papers_without_artifact_ids": [
      3269
    ]
  },
  {
    "name": "Simon P. Chung",
    "display_name": "Simon P. Chung",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 2
      },
      "ACSAC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Feasibility of Automating Stock Market Manipulation",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PUMM: Preventing Use-After-Free Using Execution Unit Partitioning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "arcus symbolic root cause analysis of exploits in production systems",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "fuzzy labeled private set intersection with applications to private realtime biometric search",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1225,
    "paper_ids": [
      1409,
      1410
    ],
    "papers_without_artifact_ids": [
      1420,
      1421
    ]
  },
  {
    "name": "Huixing Deng",
    "display_name": "Huixing Deng",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1226,
    "paper_ids": [
      1198,
      1201
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rasoul Akhavan Mahdavi",
    "display_name": "Rasoul Akhavan Mahdavi",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2022": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Over-Threshold Multi-Party Private Set Intersection",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fast and private inference of deep neural networks by codesigning activation functions",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "pepsi practically efficient private set intersection in the unbalanced setting",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1227,
    "paper_ids": [
      1208,
      1209
    ],
    "papers_without_artifact_ids": [
      1215,
      1216
    ]
  },
  {
    "name": "Thomas Humphries",
    "display_name": "Thomas Humphries",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 1,
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "PETS"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Over-Threshold Multi-Party Private Set Intersection",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Differentially Private Simple Genetic Algorithms",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fastlloyd federated accurate secure and tunable kmeans clustering with differential privacy",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "fast and private inference of deep neural networks by codesigning activation functions",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "pepsi practically efficient private set intersection in the unbalanced setting",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1228,
    "paper_ids": [
      1208,
      1212
    ],
    "papers_without_artifact_ids": [
      1214,
      1215,
      1216
    ]
  },
  {
    "name": "Soumyakant Priyadarshan",
    "display_name": "Soumyakant Priyadarshan",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Practical Fine-Grained Binary Code Randomization†",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SAFER: Efficient and Error-Tolerant Binary Instrumentation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1229,
    "paper_ids": [
      4024,
      4025
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Huan Nguyen 0004",
    "display_name": "Huan Nguyen",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Practical Fine-Grained Binary Code Randomization†",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SAFER: Efficient and Error-Tolerant Binary Instrumentation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1230,
    "paper_ids": [
      4024,
      4025
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "R. Sekar 0001",
    "display_name": "R. Sekar",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 2,
      "SOSP": 0,
      "ATC": 0,
      "NDSS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {
        "2017": 1,
        "2020": 1
      },
      "SOSP": {},
      "ATC": {},
      "NDSS": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Practical Fine-Grained Binary Code Randomization†",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SAFER: Efficient and Error-Tolerant Binary Instrumentation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "incorporating gradients to rules towards lightweight adaptive provenancebased intrusion detection",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "protecting cots binaries from disclosureguided code reuse attacks",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 1231,
    "paper_ids": [
      4024,
      4025
    ],
    "papers_without_artifact_ids": [
      4026,
      2996
    ]
  },
  {
    "name": "Emre Güler",
    "display_name": "Emre Güler",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Systematic Assessment of Fuzzers using Mutation Analysis",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "atropos effective fuzzing of web applications for serverside vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "collabfuzz a framework for collaborative fuzzing",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 7940,
    "paper_ids": [
      81,
      102
    ],
    "papers_without_artifact_ids": [
      114,
      94
    ]
  },
  {
    "name": "Philipp Görz",
    "display_name": "Philipp Görz",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Systematic Assessment of Fuzzers using Mutation Analysis",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "atropos effective fuzzing of web applications for serverside vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a binarylevel thread sanitizer or why sanitizing on the binary level is hard",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "collabfuzz a framework for collaborative fuzzing",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 7941,
    "paper_ids": [
      81,
      102
    ],
    "papers_without_artifact_ids": [
      114,
      115,
      94
    ]
  },
  {
    "name": "Shanghao Shi",
    "display_name": "Shanghao Shi",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1234,
    "paper_ids": [
      165,
      2291
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xu He",
    "display_name": "Xu He",
    "affiliation": "Hunan University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "ATC": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "RusTEE: Developing Memory-Safe ARM TrustZone Applications",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TYPEPULSE: Detecting Type Confusion Bugs in Rust Programs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "what if is not enough fixing null pointer dereference with contextual check",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1235,
    "paper_ids": [
      166,
      1458
    ],
    "papers_without_artifact_ids": [
      568
    ]
  },
  {
    "name": "Ruba Abu-Salma",
    "display_name": "Ruba Abu-Salma",
    "affiliation": "King's College London",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 2,
        "2022": 2
      },
      "ACSAC": {
        "2020": 1
      },
      "PETS": {
        "2024": 2
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"They Look at Vulnerability and Use That to Abuse You\": Participatory Threat Modelling with Migrant Domestic Workers",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "my best friends husband sees and knows everything a crosscontextual and crosscountry approach to understanding smart home privacy",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "crosscontextual examination of older adults privacy concerns behaviors and vulnerabilities",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "balancing power dynamics in smart homes nannies perspectives on how cameras reflect and affect relationships",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "bystanders privacy the perspectives of nannies on smart home surveillance",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "innovation inaction or in action the role of user experience in the security and privacy design of smart home cameras",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1236,
    "paper_ids": [
      4027,
      4028
    ],
    "papers_without_artifact_ids": [
      4029,
      4030,
      4031,
      4032,
      4033
    ]
  },
  {
    "name": "Juliane Krämer",
    "display_name": "Juliane Krämer",
    "affiliation": "University of Regensburg",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "CHES"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Separating Oil and Vinegar with a Single Trace Side-Channel Assisted Kipnis-Shamir Attack on UOV",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7942,
    "paper_ids": [
      4027,
      2399
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jan Pennekamp",
    "display_name": "Jan Pennekamp",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "NDSS"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Privacy-Preserving Production Process Parameter Exchange",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1238,
    "paper_ids": [
      3005,
      3090
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zekun Shen",
    "display_name": "Zekun Shen",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1239,
    "paper_ids": [
      3093,
      3095
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mahmoud Ammar",
    "display_name": "Mahmoud Ammar",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Verify&Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PISTIS: Trusted Computing Architecture for Low-end Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on bridging the gap between control flow integrity and attestation schemes",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1240,
    "paper_ids": [
      4034,
      4035
    ],
    "papers_without_artifact_ids": [
      4036
    ]
  },
  {
    "name": "Bruno Crispo",
    "display_name": "Bruno Crispo",
    "affiliation": "University of Trento",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 2,
      "SOSP": 0,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 2
      },
      "ACSAC": {
        "2023": 1,
        "2020": 1
      },
      "SOSP": {},
      "PETS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Verify&Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PISTIS: Trusted Computing Architecture for Low-end Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oauth 20 redirect uri validation falls short literally",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "web cache deception escalates",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "cached and confused web cache deception in the wild",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1241,
    "paper_ids": [
      4034,
      4035
    ],
    "papers_without_artifact_ids": [
      3041,
      3044,
      3046
    ]
  },
  {
    "name": "Dilip Kumar S. V.",
    "display_name": "Dilip Kumar S. V.",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Time Sharing - A Novel Approach to Low-Latency Masking",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Higher-Order Time Sharing Masking",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1252,
    "paper_ids": [
      1787,
      1789
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Siemen Dhooghe",
    "display_name": "Siemen Dhooghe",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "CHES": 9
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 2,
        "2022": 1,
        "2025": 4,
        "2023": 2
      }
    },
    "artifact_rate": 22.2,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Time Sharing - A Novel Approach to Low-Latency Masking",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Higher-Order Time Sharing Masking",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "constantcycle hardware private circuits",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "bit tsni secure multiplication gadget for inner product masking",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "codebased masking from fields to bits bitsliced higherorder masked skinny",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "stati protecting against fault attacks using stable threshold implementations",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "threshold implementations in software microarchitectural leakages in algorithms",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "lowlatency and lowrandomness secondorder masked cubic functions",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "cryptanalysis of efficient masked ciphers applications to low latency",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 1253,
    "paper_ids": [
      1787,
      1789
    ],
    "papers_without_artifact_ids": [
      2345,
      4037,
      4038,
      4039,
      4040,
      2354,
      2357
    ]
  },
  {
    "name": "Josep Balasch",
    "display_name": "Josep Balasch",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2025": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Time Sharing - A Novel Approach to Low-Latency Masking",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Higher-Order Time Sharing Masking",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1254,
    "paper_ids": [
      1787,
      1789
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benedikt Gierlichs",
    "display_name": "Benedikt Gierlichs",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2021": 1,
        "2025": 1
      },
      "PETS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Time Sharing - A Novel Approach to Low-Latency Masking",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Higher-Order Time Sharing Masking",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "my other car is your car compromising the tesla model x keyless entry system",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 1255,
    "paper_ids": [
      1787,
      1789
    ],
    "papers_without_artifact_ids": [
      4041
    ]
  },
  {
    "name": "Jan Richter-Brockmann",
    "display_name": "Jan Richter-Brockmann",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "CHES": 6
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 2,
        "2022": 2,
        "2021": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hades automated hardware design exploration for cryptographic primitives",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "combined threshold implementation",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "verica verification of combined attacks automated formal verification of security against simultaneous information leakage and tampering",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "fiver robust verification of countermeasures against fault injections",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 1256,
    "paper_ids": [
      1462,
      1466
    ],
    "papers_without_artifact_ids": [
      1469,
      1472,
      1477,
      1479
    ]
  },
  {
    "name": "Alexandre Adomnicai",
    "display_name": "Alexandre Adomnicai",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2021": 1,
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Revisiting Keccak and Dilithium Implementations on ARMv7-M",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cymric shorttailed but mighty beyondbirthdaybound secure authenticated encryption for short inputs",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 1257,
    "paper_ids": [
      2336,
      4042
    ],
    "papers_without_artifact_ids": [
      4043
    ]
  },
  {
    "name": "Ray C. C. Cheung",
    "display_name": "Ray C. C. Cheung",
    "affiliation": "City University of Hong Kong, Department of Electrical Engineering",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Revisiting Keccak and Dilithium Implementations on ARMv7-M",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Improved Plantard Arithmetic for Lattice-based Cryptography",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "velofhe gpu acceleration for fhew and tfhe bootstrapping",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 1258,
    "paper_ids": [
      2336,
      2337
    ],
    "papers_without_artifact_ids": [
      4044
    ]
  },
  {
    "name": "Shaojun Wei",
    "display_name": "Shaojun Wei",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "CHES": 8
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 3,
        "2022": 2,
        "2025": 2,
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Low-Latency High-Order Arithmetic to Boolean Masking Conversion",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Closer Look at the Chaotic Ring Oscillators based TRNG Design",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a highperformance nttmsm accelerator for zeroknowledge proof using loadbalanced fullypipelined montgomery multiplier",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "falconsign an efficient and highthroughput hardware architecture for falcon signature generation",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "breaking ground a new area record for lowlatency firstorder masked sha3 advancing from the 4x area era to the 3x area era",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "upwb an uncoupled architecture design for whitebox cryptography using vectorized montgomery multiplication",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "cfntt scalable radix24 ntt multiplication architecture with an efficient conflictfree memory mapping scheme",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "a compact and highperformance hardware architecture for crystalsdilithium",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 1259,
    "paper_ids": [
      3097,
      3099
    ],
    "papers_without_artifact_ids": [
      3100,
      3101,
      3102,
      3103,
      3104,
      3105
    ]
  },
  {
    "name": "Dawu Gu",
    "display_name": "Dawu Gu",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "CHES": 4,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2022": 1
      },
      "CHES": {
        "2024": 1,
        "2021": 2,
        "2025": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "trace copilot automatically locating cryptographic operations in sidechannel traces by firmware binary instrumenting",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "scalable private set union with stronger security",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "iservice detecting and evaluating the impact of confused deputy problem in appleos",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "shufflebased private set union faster and more secure",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "pay attention to raw traces a deep learning architecture for endtoend profiling attacks",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "crossdevice profiled sidechannel attack with unsupervised domain adaptation",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 1260,
    "paper_ids": [
      4045,
      4046
    ],
    "papers_without_artifact_ids": [
      4047,
      4048,
      4049,
      4050,
      4051,
      4052
    ]
  },
  {
    "name": "Cong Peng 0005",
    "display_name": "Cong Peng",
    "affiliation": "Univ. of California - Riverside",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1261,
    "paper_ids": [
      4053,
      4054
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Min Luo 0002",
    "display_name": "Min Luo",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1262,
    "paper_ids": [
      4053,
      4054
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Debiao He",
    "display_name": "Debiao He",
    "affiliation": "Wuhan University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2025": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1263,
    "paper_ids": [
      4053,
      4054
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Karine Heydemann",
    "display_name": "Karine Heydemann",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Scoop: An Optimization Algorithm for Profiling Attacks against Higher-Order Masking",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1264,
    "paper_ids": [
      266,
      4055
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Barbara Gigerl",
    "display_name": "Barbara Gigerl",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 3,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 2,
        "2022": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Compress: Generate Small and Fast Masked Pipelined Circuits",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "riding the waves towards generic singlecycle masking in hardware",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "coco codesign and coverification of masked software implementations on cpus",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1265,
    "paper_ids": [
      267,
      268
    ],
    "papers_without_artifact_ids": [
      284,
      285
    ]
  },
  {
    "name": "Lukasz Chmielewski",
    "display_name": "Lukasz Chmielewski",
    "affiliation": "Masaryk University",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "CHES": 5,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2021": 2,
        "2025": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: SCA-secure ECC in software - mission impossible?",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ectester reverseengineering sidechannel countermeasures of ecc implementations",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "barracuda edge gpus do leak dnn weights",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "keep it unsupervised horizontal attacks meet deep learning",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "fault injection as an oscilloscope fault correlation analysis",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 1266,
    "paper_ids": [
      3062,
      1811
    ],
    "papers_without_artifact_ids": [
      3064,
      1524,
      3024,
      4056
    ]
  },
  {
    "name": "Amin Abdulrahman",
    "display_name": "Amin Abdulrahman",
    "affiliation": "Max Planck Institute for Security and Privacy",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fast and Clean: Auditable high-performance assembly via constraint solving",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1267,
    "paper_ids": [
      578,
      428
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hanno Becker",
    "display_name": "Hanno Becker",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fast and Clean: Auditable high-performance assembly via constraint solving",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "polynomial multiplication on embedded vector architectures",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 1268,
    "paper_ids": [
      578,
      431
    ],
    "papers_without_artifact_ids": [
      1800
    ]
  },
  {
    "name": "Florent Bernard",
    "display_name": "Florent Bernard",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Low Cost and Precise Jitter Measurement Method for TRNG Entropy Assessment",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Enhancing Quality and Security of the PLL-TRNG",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1269,
    "paper_ids": [
      3109,
      3111
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nathalie Bochard",
    "display_name": "Nathalie Bochard",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Low Cost and Precise Jitter Measurement Method for TRNG Entropy Assessment",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Enhancing Quality and Security of the PLL-TRNG",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1270,
    "paper_ids": [
      3109,
      3111
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhe Liu",
    "display_name": "Zhe Liu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "CHES": 1,
      "ATC": 0,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "CHES": {
        "2024": 1
      },
      "ATC": {},
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "CHES",
      "OSDI"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Retiarii: A Deep Learning Exploratory-Training Framework",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improved secure twoparty computation from a geometric perspective",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 1271,
    "paper_ids": [
      4057,
      157
    ],
    "papers_without_artifact_ids": [
      3261
    ]
  },
  {
    "name": "Nimish Mishra",
    "display_name": "Nimish Mishra",
    "affiliation": "Indian Institute of Technology, Kharagpur",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "CHES": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "CHES": {
        "2024": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Shesha : Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "systematic evaluation of randomized cache designs against cache occupancy",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "faults in our bus novel bus fault attack to break arm trustzone",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 1272,
    "paper_ids": [
      2380,
      2382
    ],
    "papers_without_artifact_ids": [
      2384,
      2386
    ]
  },
  {
    "name": "Anirban Chakraborty 0003",
    "display_name": "Anirban Chakraborty",
    "affiliation": "Indian Institute of Technology Kharagpur, Department of Computer Science and Engineering, India",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "CHES": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "CHES": {
        "2024": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Shesha : Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "systematic evaluation of randomized cache designs against cache occupancy",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "faults in our bus novel bus fault attack to break arm trustzone",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "rassle return address stack based sidechannel leakage",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 1273,
    "paper_ids": [
      2380,
      2382
    ],
    "papers_without_artifact_ids": [
      2384,
      2386,
      2387
    ]
  },
  {
    "name": "Johannes Mono",
    "display_name": "Johannes Mono",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improved Circuit Synthesis with Multi-Value Bootstrapping for FHEW-like Schemes",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a new perspective on key switching for bgvlike schemes",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 1274,
    "paper_ids": [
      1465,
      1467
    ],
    "papers_without_artifact_ids": [
      1468
    ]
  },
  {
    "name": "Ward Beullens",
    "display_name": "Ward Beullens",
    "affiliation": "IBM Research Europe, Zrich, Switzerland",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Oil and Vinegar: Modern Parameters and Implementations",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ecdsa whitebox implementations attacks and designs from ches 2021 challenge",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 1275,
    "paper_ids": [
      579,
      436
    ],
    "papers_without_artifact_ids": [
      4058
    ]
  },
  {
    "name": "Sofía Celi",
    "display_name": "Sofía Celi",
    "affiliation": "Brave",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 1,
      "CHES": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "CHES": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES",
      "PETS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "distefano decentralized infrastructure for sharing trusted encrypted facts and nothing more",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 7943,
    "paper_ids": [
      579,
      4059
    ],
    "papers_without_artifact_ids": [
      3315
    ]
  },
  {
    "name": "Vishnu Asutosh Dasu",
    "display_name": "Vishnu Asutosh Dasu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "CHES",
      "NDSS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1277,
    "paper_ids": [
      1482,
      4060
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiaxiang Liu 0001",
    "display_name": "Jiaxiang Liu",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1278,
    "paper_ids": [
      429,
      435
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gregor Seiler",
    "display_name": "Gregor Seiler",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NTT Multiplication for NTT-unfriendly Rings New Speed Records for Saber and NTRU on Cortex-M4 and AVX2",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1279,
    "paper_ids": [
      429,
      432
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaomu Shi",
    "display_name": "Xiaomu Shi",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1280,
    "paper_ids": [
      429,
      435
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ming-Hsien Tsai 0001",
    "display_name": "Ming-Hsien Tsai",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1281,
    "paper_ids": [
      429,
      435
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bow-Yaw Wang",
    "display_name": "Bow-Yaw Wang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2025": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a new trick for polynomial multiplication a verified crt polymul utilizing a monomial factor",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 1282,
    "paper_ids": [
      429,
      435
    ],
    "papers_without_artifact_ids": [
      438
    ]
  },
  {
    "name": "Brian Udugama",
    "display_name": "Brian Udugama",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VITI: A Tiny Self-Calibrating Sensor for Power-Variation Measurement in FPGAs",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "1lutsensor detecting fpga voltage fluctuations using lookup tables",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 1283,
    "paper_ids": [
      4061,
      4062
    ],
    "papers_without_artifact_ids": [
      4063
    ]
  },
  {
    "name": "Darshana Jayasinghe",
    "display_name": "Darshana Jayasinghe",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VITI: A Tiny Self-Calibrating Sensor for Power-Variation Measurement in FPGAs",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "1lutsensor detecting fpga voltage fluctuations using lookup tables",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 1284,
    "paper_ids": [
      4061,
      4062
    ],
    "papers_without_artifact_ids": [
      4063
    ]
  },
  {
    "name": "Hassaan Saadat",
    "display_name": "Hassaan Saadat",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VITI: A Tiny Self-Calibrating Sensor for Power-Variation Measurement in FPGAs",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1285,
    "paper_ids": [
      4061,
      4062
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aleksandar Ignjatovic",
    "display_name": "Aleksandar Ignjatovic",
    "affiliation": "UNSW",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VITI: A Tiny Self-Calibrating Sensor for Power-Variation Measurement in FPGAs",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1286,
    "paper_ids": [
      4061,
      4062
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sri Parameswaran",
    "display_name": "Sri Parameswaran",
    "affiliation": "UNSW",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VITI: A Tiny Self-Calibrating Sensor for Power-Variation Measurement in FPGAs",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "1lutsensor detecting fpga voltage fluctuations using lookup tables",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 1287,
    "paper_ids": [
      4061,
      4062
    ],
    "papers_without_artifact_ids": [
      4063
    ]
  },
  {
    "name": "Arthur Beckers",
    "display_name": "Arthur Beckers",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SpectrEM: Exploiting Electromagnetic Emanations During Transient Execution",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1288,
    "paper_ids": [
      1788,
      1790
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lennert Wouters",
    "display_name": "Lennert Wouters",
    "affiliation": "KU Leuven",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "CHES": {
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SpectrEM: Exploiting Electromagnetic Emanations During Transient Execution",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "my other car is your car compromising the tesla model x keyless entry system",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 1289,
    "paper_ids": [
      1788,
      1790
    ],
    "papers_without_artifact_ids": [
      4041
    ]
  },
  {
    "name": "Qianmei Wu",
    "display_name": "Qianmei Wu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "WOOT": 1,
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      },
      "CHES": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES",
      "WOOT"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On Efficient and Secure Code-based Masking: A Pragmatic Evaluation",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Reality Check on Side-Channels: Lessons learnt from breaking AES on ARM Cortex-A72 processor with Out-of-Order Execution",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "practical opcodebased fault attack on aesni",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 1290,
    "paper_ids": [
      3112,
      1486
    ],
    "papers_without_artifact_ids": [
      1692
    ]
  },
  {
    "name": "Anupam Chattopadhyay",
    "display_name": "Anupam Chattopadhyay",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 4,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2025": 1,
        "2023": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Will You Cross the Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "KyberSlash: Exploiting secret-dependent division timings in Kyber implementations",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pushing the limits of generic sidechannel attacks on lwebased kems parallel pc oracle attacks on kyber kem and beyond",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "fiddling the twiddle constants fault injection analysis of the number theoretic transform",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 1291,
    "paper_ids": [
      1484,
      581
    ],
    "papers_without_artifact_ids": [
      1489,
      1490
    ]
  },
  {
    "name": "Sujoy Sinha Roy",
    "display_name": "Sujoy Sinha Roy",
    "affiliation": "Graz University of Technology",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "CHES": 6
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 1,
        "2025": 2,
        "2023": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Will You Cross the Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "accelerating hashbased polynomial commitment schemes with linear prover time",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "reed chipletbased accelerator for fully homomorphic encryption",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "modhe modular homomorphic encryption using module lattices potentials and limitations",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "medha microcoded hardware accelerator for computing on encrypted data",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 1292,
    "paper_ids": [
      1484,
      2373
    ],
    "papers_without_artifact_ids": [
      4064,
      4065,
      4066,
      4067
    ]
  },
  {
    "name": "Erdem Alkim",
    "display_name": "Erdem Alkim",
    "affiliation": "Dokuz Eylul University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2021": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1293,
    "paper_ids": [
      430,
      434
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qian Guo 0001",
    "display_name": "Qian Guo",
    "affiliation": "University of Leeds",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "CHES": 6
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      },
      "CHES": {
        "2022": 2,
        "2021": 1,
        "2025": 1,
        "2023": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "otpca new keyrecovery plaintextchecking oracle based sidechannel attacks on hqc with offline templates",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "key recovery attacks on approximate homomorphic encryption with nonworstcase noise flooding countermeasures",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "cachetiming attack against hqc",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "find the bad apples an efficient method for perfect key recovery under imperfect sca oracles a case study of kyber",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "a keyrecovery sidechannel attack on classic mceliece implementations",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "a sidechannel attack on a masked indcca secure saber kem implementation",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 1294,
    "paper_ids": [
      4068,
      3157
    ],
    "papers_without_artifact_ids": [
      4069,
      4070,
      4071,
      4072,
      4073,
      4074
    ]
  },
  {
    "name": "Robin Leander Schröder",
    "display_name": "Robin Leander Schröder",
    "affiliation": "Fraunhofer SIT",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "CHES": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "CHES": {
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "counterseveillance performancecounter attacks on amd sevsnp",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "teecorrelate an informationpreserving defense against performancecounter attacks on tees",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 7944,
    "paper_ids": [
      4068,
      3157
    ],
    "papers_without_artifact_ids": [
      339,
      342
    ]
  },
  {
    "name": "Daniele Antonioli",
    "display_name": "Daniele Antonioli",
    "affiliation": "EURECOM",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "WOOT": 1,
      "CHES": 1,
      "USENIXSEC": 1,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      },
      "CHES": {
        "2022": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "PETS": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "CHES",
      "WOOT"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Bluetooth Security Testing with BlueToolkit: a Large-Scale Automotive Case Study",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fptracer finegrained browser fingerprinting detection via tainttracking and entropybased thresholds",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "lightblue automatic profileaware debloating of bluetooth stacks",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1296,
    "paper_ids": [
      4,
      1761
    ],
    "papers_without_artifact_ids": [
      226,
      27
    ]
  },
  {
    "name": "Chi-Ming Marvin Chung",
    "display_name": "Chi-Ming Marvin Chung",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NTT Multiplication for NTT-unfriendly Rings New Speed Records for Saber and NTRU on Cortex-M4 and AVX2",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1297,
    "paper_ids": [
      432,
      434
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sebastian Berndt 0001",
    "display_name": "Sebastian Berndt",
    "affiliation": "University of Lübeck",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 2,
        "2021": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Side-Channel Protections for Picnic Signatures",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "teejam subcacheline leakages strike back",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "polynomial sharings on two secrets buy one get one free",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 1298,
    "paper_ids": [
      1427,
      1428
    ],
    "papers_without_artifact_ids": [
      1431,
      1433
    ]
  },
  {
    "name": "Annapurna Valiveti",
    "display_name": "Annapurna Valiveti",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Higher-Order Lookup Table Masking in Essentially Constant Memory",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Faster Third-Order Masking of Lookup Tables",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1299,
    "paper_ids": [
      4075,
      4076
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Srinivas Vivek 0001",
    "display_name": "Srinivas Vivek",
    "affiliation": "IIT Bombay",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Higher-Order Lookup Table Masking in Essentially Constant Memory",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Faster Third-Order Masking of Lookup Tables",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1300,
    "paper_ids": [
      4075,
      4076
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Meyer 0001",
    "display_name": "Michael Meyer",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CTIDH: faster constant-time CSIDH",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "dCTIDH: Fast & Deterministic CTIDH",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1301,
    "paper_ids": [
      1806,
      2398
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Karthikeyan Bhargavan",
    "display_name": "Karthikeyan Bhargavan",
    "affiliation": "INRIA, France",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "CHES": 1,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "CHES": {
        "2025": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "KyberSlash: Exploiting secret-dependent division timings in Kyber implementations",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TreeSync: Authenticated Group Management for Messaging Layer Security",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "formal verification of the pqxdh postquantum key agreement protocol for endtoend secure messaging",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1302,
    "paper_ids": [
      581,
      4077
    ],
    "papers_without_artifact_ids": [
      2522
    ]
  },
  {
    "name": "Thales B. Paiva",
    "display_name": "Thales B. Paiva",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2025": 3
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "KyberSlash: Exploiting secret-dependent division timings in Kyber implementations",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "faster amortized bootstrapping using the incomplete ntt for free",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "defeating lowcost countermeasures against sidechannel attacks in latticebased encryption a case study on crystalskyber",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 1303,
    "paper_ids": [
      581,
      4078
    ],
    "papers_without_artifact_ids": [
      4079,
      1487
    ]
  },
  {
    "name": "Syed Mahbub Hafiz",
    "display_name": "Syed Mahbub Hafiz",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "CHES": 2,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "CHES": {
        "2025": 2
      },
      "PETS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "CHES",
      "NDSS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Private Aggregate Queries to Untrusted Databases",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "faster amortized bootstrapping using the incomplete ntt for free",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 1304,
    "paper_ids": [
      4078,
      4080
    ],
    "papers_without_artifact_ids": [
      4079
    ]
  },
  {
    "name": "Vincent Laporte",
    "display_name": "Vincent Laporte",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Let's DOIT: Using Intel's Extended HW/SW Contract for Secure Compilation of Crypto Code",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Formally verifying Kyber Episode IV: Implementation correctness",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "highassurance zeroization",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 1305,
    "paper_ids": [
      1810,
      1812
    ],
    "papers_without_artifact_ids": [
      1814
    ]
  },
  {
    "name": "Tiago Oliveira 0004",
    "display_name": "Tiago Oliveira",
    "affiliation": "University of Porto",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Let's DOIT: Using Intel's Extended HW/SW Contract for Secure Compilation of Crypto Code",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Formally verifying Kyber Episode IV: Implementation correctness",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "highassurance zeroization",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 1306,
    "paper_ids": [
      1810,
      1812
    ],
    "papers_without_artifact_ids": [
      1814
    ]
  },
  {
    "name": "Johann Knechtel",
    "display_name": "Johann Knechtel",
    "affiliation": "New York University Abu Dhabi, Abu Dhabi, UAE",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GlitchFHE: Attacking Fully Homomorphic Encryption Using Fault Injection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1307,
    "paper_ids": [
      3117,
      2516
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ramesh Karri",
    "display_name": "Ramesh Karri",
    "affiliation": "New York University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1308,
    "paper_ids": [
      3117,
      3094
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aymen Boudguiga",
    "display_name": "Aymen Boudguiga",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES",
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a General-Purpose 8-bit (T)FHE Processor Abstraction",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Privacy-preserving and Fairness-aware Federated Learning Framework",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1309,
    "paper_ids": [
      4081,
      2606
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Renaud Sirdey",
    "display_name": "Renaud Sirdey",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 3,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2025": 1,
        "2021": 1
      },
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES",
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a General-Purpose 8-bit (T)FHE Processor Abstraction",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Privacy-preserving and Fairness-aware Federated Learning Framework",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "efficient homomorphic evaluation of knn classifiers",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "illuminating the dark or how to recover what should not be seen in febased classifiers",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 1310,
    "paper_ids": [
      4081,
      2606
    ],
    "papers_without_artifact_ids": [
      4082,
      4083
    ]
  },
  {
    "name": "Lukas Helminger",
    "display_name": "Lukas Helminger",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES",
      "PETS"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pasta: A Case for Hybrid Homomorphic Encryption",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privately Connecting Mobility to Infectious Diseases via Applied Cryptography",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1311,
    "paper_ids": [
      4084,
      4085
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christian Rechberger",
    "display_name": "Christian Rechberger",
    "affiliation": "Graz University of Technology",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "PETS": 3,
      "CHES": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2025": 2
      },
      "CHES": {
        "2025": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES",
      "PETS"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pasta: A Case for Hybrid Homomorphic Encryption",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privately Connecting Mobility to Infectious Diseases via Applied Cryptography",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "skyscraper fast hashing on big primes",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "practical twoparty computational differential privacy with active security",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "sok computational and distributed differential privacy for mpc",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "poseidon a new hash function for zeroknowledge proof systems",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1312,
    "paper_ids": [
      4084,
      4085
    ],
    "papers_without_artifact_ids": [
      4086,
      4087,
      4088,
      4089
    ]
  },
  {
    "name": "Roman Walch",
    "display_name": "Roman Walch",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES",
      "PETS"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pasta: A Case for Hybrid Homomorphic Encryption",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privately Connecting Mobility to Infectious Diseases via Applied Cryptography",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1313,
    "paper_ids": [
      4084,
      4085
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Miguel Quaresma",
    "display_name": "Miguel Quaresma",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "CHES",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Formally verifying Kyber Episode IV: Implementation correctness",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1314,
    "paper_ids": [
      1812,
      1813
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kasper Rasmussen",
    "display_name": "Kasper Rasmussen",
    "affiliation": "University of Oxford",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "WOOT"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Basilisk: Remote Code Execution by Laser Excitation of P-N Junctions Without Insider Assistance",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Iris: Dynamic Privacy Preserving Search in Authenticated Chord Peer-to-Peer Networks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1315,
    "paper_ids": [
      4090,
      4091
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lucas Becker",
    "display_name": "Lucas Becker",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 1,
      "WOOT": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      },
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS",
      "WOOT"
    ],
    "years": [
      2024,
      2026
    ],
    "year_range": "2024-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: On the Effectiveness of Control-Flow Integrity in Practice",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ad Personalization and Transparency in Mobile Ecosystems: A Comparative Analysis of Google's and Apple's EU App Stores",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oh no my ran breaking into an oran 5g indoor base station",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1316,
    "paper_ids": [
      411,
      418
    ],
    "papers_without_artifact_ids": [
      421
    ]
  },
  {
    "name": "Haya Schulmann",
    "display_name": "Haya Schulmann",
    "affiliation": "Goethe University Frankfurt",
    "artifact_count": 2,
    "total_papers": 14,
    "total_papers_by_conf": {
      "WOOT": 2,
      "ACSAC": 1,
      "USENIXSEC": 8,
      "NSDI": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1,
        "2024": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2022": 2,
        "2025": 1,
        "2021": 2
      },
      "NSDI": {
        "2017": 1,
        "2024": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Stealth BGP Hijacks with uRPF Filtering",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "validator domain validation over tor",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "sok an introspective analysis of rpki security",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "the cure to vulnerabilities in rpki validation",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "cloudy with a chance of cyberattacks dangling resources abuse on cloud platforms",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "keep your friends close but your routeservers closer insights into rpki validation in the internet",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "downgrading dnssec how to exploit crypto agility for hijacking signed zones",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "stalloris rpki downgrade attack",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "xdri attacks and how to enhance resilience of residential routers",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "smap internetwide scanning for spoofing",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "the hijackers guide to the galaxy offpath taking over internet resources",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "injection attacks reloaded tunnelling malicious payloads over dns",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "one key to sign them all considered vulnerable evaluation of dnssec in the internet",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 1317,
    "paper_ids": [
      4092,
      4093
    ],
    "papers_without_artifact_ids": [
      4094,
      4095,
      4096,
      4097,
      4098,
      4099,
      4100,
      4101,
      4102,
      4103,
      4104,
      4105
    ]
  },
  {
    "name": "Irfan Ahmed 0001",
    "display_name": "Irfan Ahmed",
    "affiliation": "University of New Orleans",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "WOOT": 2,
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1,
        "2024": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SOK: 3D Printer Firmware Attacks on Fused Filament Fabrication",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Oops, It Halted Again: Exploiting PLC Memory for Fun and Profit in Industrial Control Systems",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges:"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "biosafe bioprinting security framework for detecting sabotage attacks on printability and cell viability",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 1318,
    "paper_ids": [
      4106,
      4107
    ],
    "papers_without_artifact_ids": [
      4108
    ]
  },
  {
    "name": "Zhongjie Ba",
    "display_name": "Zhongjie Ba",
    "affiliation": "Zhejiang University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "micguard a comprehensive detection system against outofband injection attacks for different level microphonebased devices",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "faceobfuscator defending deep learningbased privacy attacks with gradient descentresistant features in face recognition",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "devil in the room triggering audio backdoors in the physical world",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1319,
    "paper_ids": [
      297,
      301
    ],
    "papers_without_artifact_ids": [
      315,
      316,
      314
    ]
  },
  {
    "name": "David J. Wu 0001",
    "display_name": "David J. Wu",
    "affiliation": "University of Texas at Austin",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "YPIR: High-Throughput Single-Server PIR with Silent Preprocessing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Authenticated private information retrieval",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1320,
    "paper_ids": [
      4109,
      1016
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lorenzo Veronese",
    "display_name": "Lorenzo Veronese",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Web Platform Threats: Automated Detection of Web Security Issues With WPT",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cookie Crumbles: Breaking and Fixing Web Session Integrity",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "can i take your subdomain exploring samesite attacks in the modern web",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1321,
    "paper_ids": [
      2406,
      2409
    ],
    "papers_without_artifact_ids": [
      2408
    ]
  },
  {
    "name": "Pedro Adão",
    "display_name": "Pedro Adão",
    "affiliation": "Universidade de Lisboa",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Web Platform Threats: Automated Detection of Web Security Issues With WPT",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cookie Crumbles: Breaking and Fixing Web Session Integrity",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7945,
    "paper_ids": [
      2406,
      2409
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vincent Lenders",
    "display_name": "Vincent Lenders",
    "affiliation": "University of Luxembourg",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "WOOT": 1,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2023": 1,
        "2022": 2
      },
      "WOOT": {
        "2025": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 28.6,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS)",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok automating kernel vulnerability discovery and exploit generation",
        "conference": "WOOT",
        "year": 2025
      },
      {
        "title": "wireless signal injection attacks on vsat satellite modems",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "fabrid flexible attestationbased routing for interdomain networks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "an experimental study of gps spoofing and takeover attacks on uavs",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "building an avionics laboratory for cybersecurity testing",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1323,
    "paper_ids": [
      1758,
      1759
    ],
    "papers_without_artifact_ids": [
      4110,
      1762,
      455,
      1763,
      1764
    ]
  },
  {
    "name": "Gabriel Karl Gegenhuber",
    "display_name": "Gabriel Karl Gegenhuber",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi Deployments",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Prekey Pogo: Investigating Security and Privacy Issues in WhatsApp's Handshake Mechanism",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1324,
    "paper_ids": [
      2150,
      4111
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Philipp É. Frenzel",
    "display_name": "Philipp É. Frenzel",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi Deployments",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Prekey Pogo: Investigating Security and Privacy Issues in WhatsApp's Handshake Mechanism",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7946,
    "paper_ids": [
      2150,
      4111
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Edgar R. Weippl",
    "display_name": "Edgar R. Weippl",
    "affiliation": "University of Vienna",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 1,
      "WOOT": 0,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2021": 1
      },
      "ACSAC": {
        "2017": 1
      },
      "WOOT": {},
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi Deployments",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "replication stories as informal lessons about security",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "on the usability of authenticity checks for hardware security tokens",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "user mental models of cryptocurrency systems a grounded theory approach",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "grid shock coordinated loadchanging attacks on power grids the nonsmart power grid is vulnerable to cyber attacks as well",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 1326,
    "paper_ids": [
      2150,
      2151
    ],
    "papers_without_artifact_ids": [
      1835,
      1837,
      1840,
      2152
    ]
  },
  {
    "name": "Kai Ye",
    "display_name": "Kai Ye",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Invisibility Cloak: Proactive Defense Against Visual Game Cheating",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1327,
    "paper_ids": [
      2820,
      2300
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Di Jin",
    "display_name": "Di Jin",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "ATC": {
        "2023": 1
      },
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "BeeBox: Hardening BPF against Transient Execution Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "epf evil packet filter",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "nibbler debloating binary shared libraries",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 1328,
    "paper_ids": [
      4112,
      3793
    ],
    "papers_without_artifact_ids": [
      4113,
      3912
    ]
  },
  {
    "name": "Vasileios P. Kemerlis",
    "display_name": "Vasileios P. Kemerlis",
    "affiliation": "Brown University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "EUROSYS": 0,
      "ATC": 1,
      "ACSAC": 1,
      "NDSS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "EUROSYS": {},
      "ATC": {
        "2023": 1
      },
      "ACSAC": {
        "2019": 1
      },
      "NDSS": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "BeeBox: Hardening BPF against Transient Execution Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "quack hindering deserialization attacks via static duck typing",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "epf evil packet filter",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "nibbler debloating binary shared libraries",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 1329,
    "paper_ids": [
      4112,
      3793
    ],
    "papers_without_artifact_ids": [
      3667,
      4113,
      3912
    ]
  },
  {
    "name": "Ross Anderson 0001",
    "display_name": "Ross Anderson",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Trojan Source: Invisible Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "coverdrop blowing the whistle through a news app",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 1330,
    "paper_ids": [
      4114,
      4115
    ],
    "papers_without_artifact_ids": [
      3275
    ]
  },
  {
    "name": "Yu Yu 0001",
    "display_name": "Yu Yu",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "CHES": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1,
        "2025": 1
      },
      "CHES": {
        "2024": 1,
        "2022": 1,
        "2021": 1,
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 22.2,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DFS: Delegation-friendly zkSNARK and Private Delegation of Provers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rejected signatures challenges pose new challenges key recovery of crystalsdilithium via sidechannel attacks",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "efficient tablebased masking with preprocessing",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "lightweight authentication of web data via garblethenprove",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "efficient private circuits with precomputation",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "medusa attack exploring security hazards of inapp qr code scanning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "sidechannel masking with common shares",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "learning parity with physical noise imperfections reductions and fpga prototype",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 1331,
    "paper_ids": [
      4116,
      3230
    ],
    "papers_without_artifact_ids": [
      4117,
      4118,
      3231,
      4119,
      1170,
      4120,
      2396
    ]
  },
  {
    "name": "Yuekang Li",
    "display_name": "Yuekang Li",
    "affiliation": "UNSW",
    "artifact_count": 2,
    "total_papers": 11,
    "total_papers_by_conf": {
      "USENIXSEC": 8,
      "PETS": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 2,
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "PETS": {
        "2025": 1
      },
      "NDSS": {
        "2024": 2
      }
    },
    "artifact_rate": 18.2,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mission impossible imagebased geolocation with large vision language models",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "file hijacking vulnerability the elephant in the room",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "masterkey automated jailbreaking of large language model chatbots",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "leveraging semantic relations in code and data to enhance taint analysis of embedded systems",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "automataguided controlflowsensitive fuzz driver generation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "nautilus automated restful api vulnerability detection",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "regexscalpel regular expression denial of service redos defense by localizeandfix",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "apicraft fuzz driver generation for closedsource sdk libraries",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "muzz threadaware greybox fuzzing for effective bug hunting in multithreaded programs",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1332,
    "paper_ids": [
      733,
      3364
    ],
    "papers_without_artifact_ids": [
      736,
      3365,
      739,
      3366,
      786,
      745,
      3129,
      3130,
      3133
    ]
  },
  {
    "name": "Xingwei Lin",
    "display_name": "Xingwei Lin",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "llmfuzzer scaling assessment of large language model jailbreaks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "apicraft fuzz driver generation for closedsource sdk libraries",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1333,
    "paper_ids": [
      4121,
      4122
    ],
    "papers_without_artifact_ids": [
      939,
      3130
    ]
  },
  {
    "name": "Hong Hu 0004",
    "display_name": "Hong Hu",
    "affiliation": "Pennsylvania State University",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 8,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2022": 2,
        "2021": 3
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 22.2,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type Analysis",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Detecting Logical Bugs of DBMS with Coverage-based Guidance",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "too subtle to notice investigating executable stack issues in linux systems",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "viper spotting syscallguard variables for dataonly attacks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "µfuzz redesign of parallel fuzzing using microservice architecture",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "freewill automatically diagnosing useafterfree bugs via reference miscounting detection on binaries",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "abusing hidden properties to attack the nodejs ecosystem",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "preventing useafterfree attacks with fast forward allocation",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "sharing more and checking less leveraging common input keywords to detect bugs in embedded systems",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1334,
    "paper_ids": [
      4123,
      4124
    ],
    "papers_without_artifact_ids": [
      4125,
      4126,
      1416,
      2798,
      1418,
      534,
      919
    ]
  },
  {
    "name": "Pujan Paudel",
    "display_name": "Pujan Paudel",
    "affiliation": "Boston University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Enabling Contextual Soft Moderation on Social Media through Contrastive Textual Deviation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PIXELMOD: Improving Soft Moderation of Visual Misleading Information on Twitter",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1335,
    "paper_ids": [
      2421,
      2422
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei Wang 0088",
    "display_name": "Wei Wang",
    "affiliation": "Huazhong University of Science and Technology, School of Computer Science and Technology, Cyber-Physical-Social Systems Lab, Wuhan, China",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Query Recovery from Easy to Hard: Jigsaw Attack against SSE",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "high recovery with fewer injections practical binary volumetric injection attacks against dynamic searchable encryption",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1336,
    "paper_ids": [
      2287,
      2239
    ],
    "papers_without_artifact_ids": [
      2289
    ]
  },
  {
    "name": "Peng Xu 0003",
    "display_name": "Peng Xu",
    "affiliation": "Tongji University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Query Recovery from Easy to Hard: Jigsaw Attack against SSE",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "high recovery with fewer injections practical binary volumetric injection attacks against dynamic searchable encryption",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1337,
    "paper_ids": [
      2287,
      2239
    ],
    "papers_without_artifact_ids": [
      2289
    ]
  },
  {
    "name": "Laurence T. Yang",
    "display_name": "Laurence T. Yang",
    "affiliation": "HUST",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Query Recovery from Easy to Hard: Jigsaw Attack against SSE",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "high recovery with fewer injections practical binary volumetric injection attacks against dynamic searchable encryption",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1338,
    "paper_ids": [
      2287,
      2239
    ],
    "papers_without_artifact_ids": [
      2289
    ]
  },
  {
    "name": "Yingchen Wang",
    "display_name": "Yingchen Wang",
    "affiliation": "University of Texas at Austin",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      },
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hints from hertz dynamic frequency scaling sidechannel analysis of number theoretic transform in latticebased kems",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 1339,
    "paper_ids": [
      1497,
      1817
    ],
    "papers_without_artifact_ids": [
      4127
    ]
  },
  {
    "name": "David Kohlbrenner",
    "display_name": "David Kohlbrenner",
    "affiliation": "University of Washington",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "synchronization storage channels s2c timerless cache sidechannel attacks on the apple m1 via hardware synchronization instructions",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1340,
    "paper_ids": [
      1497,
      1817
    ],
    "papers_without_artifact_ids": [
      3134
    ]
  },
  {
    "name": "Ruiyi Zhang 0001",
    "display_name": "Ruiyi Zhang",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "CacheWarp: Software-based Fault Injection using Selective State Reset",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "eosafe security analysis of eosio smart contracts",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1341,
    "paper_ids": [
      324,
      325
    ],
    "papers_without_artifact_ids": [
      791
    ]
  },
  {
    "name": "Youheng Lü",
    "display_name": "Youheng Lü",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "CacheWarp: Software-based Fault Injection using Selective State Reset",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7947,
    "paper_ids": [
      324,
      328
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Moti Yung",
    "display_name": "Moti Yung",
    "affiliation": "Google Inc., New York, NY, USA",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "CHES": 0,
      "PETS": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      },
      "CHES": {},
      "PETS": {
        "2023": 2,
        "2025": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SpotProxy: Rediscovering the Cloud for Censorship Circumvention",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rsa blind signatures with public metadata",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "the battery insertion attack is periodic pseudorandomization sufficient for beacon privacy",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "dynamic volumehiding encrypted multimaps with applications to searchable encryption",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "the selfanticensorship nature of encryption on the prevalence of anamorphic cryptography",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 1343,
    "paper_ids": [
      698,
      3308
    ],
    "papers_without_artifact_ids": [
      4128,
      4129,
      4130,
      4131
    ]
  },
  {
    "name": "Keyan Guo",
    "display_name": "Keyan Guo",
    "affiliation": "University at Buffalo",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i know what you meme understanding and detecting harmful memes with multimodal large language models",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 1344,
    "paper_ids": [
      1199,
      1202
    ],
    "papers_without_artifact_ids": [
      1204
    ]
  },
  {
    "name": "Nishant Vishwamitra",
    "display_name": "Nishant Vishwamitra",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Targeted Obfuscation of Adversarial Unsafe Images using Reconstruction and Counterfactual Super Region Attribution Explainability",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deciphering textual authenticity a generalized strategy through the lens of large language semantics for detecting human vs machinegenerated text",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1345,
    "paper_ids": [
      1199,
      4132
    ],
    "papers_without_artifact_ids": [
      4133
    ]
  },
  {
    "name": "Kecen Li",
    "display_name": "Kecen Li",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware Pretraining",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TrajDeleter: Enabling Trajectory Forgetting in Offline Reinforcement Learning Agents",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1346,
    "paper_ids": [
      895,
      898
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marcus Botacin",
    "display_name": "Marcus Botacin",
    "affiliation": "Texas A&M University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Making Acoustic Side-Channel Attacks on Noisy Keyboards Viable with LLM-Assisted Spectrograms' \"Typo\" Correction",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1347,
    "paper_ids": [
      4134,
      4135
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "A. Selcuk Uluagac",
    "display_name": "A. Selcuk Uluagac",
    "affiliation": "Florida International University",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 2,
      "ACSAC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2023": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "ACSAC": {
        "2019": 2
      },
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 22.2,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "50 Shades of Support: A Device-Centric Analysis of Android Security Updates",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "speak up im listening extracting speech from zeropermission vr sensors",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "evoke efficient revocation of verifiable credentials in iot networks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "dissecting privacy perspectives of websites around the world aceptar todo alle akzeptieren accept all",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "røb ransomware over modern web browsers",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "realtime analysis of privacyunaware iot applications",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "hdmiwalk attacking hdmi distribution networks via consumer electronic control protocol",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "aegis a contextaware security framework for smart home systems",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 1348,
    "paper_ids": [
      4134,
      4136
    ],
    "papers_without_artifact_ids": [
      1135,
      4137,
      4138,
      4139,
      1750,
      4140,
      4141
    ]
  },
  {
    "name": "Katharina Ceesay-Seitz",
    "display_name": "Katharina Ceesay-Seitz",
    "affiliation": "ETH Zurich",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Cascade: CPU Fuzzing via Intricate Program Generation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1349,
    "paper_ids": [
      921,
      926
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ziyi Guo",
    "display_name": "Ziyi Guo",
    "affiliation": "Northwestern University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CAMP: Compiler and Allocator-based Heap Memory Protection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PATCHAGENT: A Practical Program Repair Agent Mimicking Human Expertise",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "take a step further understanding page spray in linux kernel exploitation",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1350,
    "paper_ids": [
      931,
      935
    ],
    "papers_without_artifact_ids": [
      826
    ]
  },
  {
    "name": "Chaowei Xiao",
    "display_name": "Chaowei Xiao",
    "affiliation": "Johns Hopkins University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2
      },
      "SC": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SMACK: Semantically Meaningful Adversarial Audio Attack",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diffsmooth certifiably robust learning via diffusion models and local smoothing",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1351,
    "paper_ids": [
      168,
      173
    ],
    "papers_without_artifact_ids": [
      4142
    ]
  },
  {
    "name": "Marcus Brinkmann",
    "display_name": "Marcus Brinkmann",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2021": 2
      },
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "leaky mceliece secret key recovery from highly erroneous sidechannel information",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "i dont know why i check this investigating expert users strategies to detect email signature spoofing attacks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "raccoon attack finding and exploiting mostsignificantbitoracles in tlsdhe",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "alpaca application layer protocol confusion analyzing and mitigating cracks in tls authentication",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1352,
    "paper_ids": [
      582,
      587
    ],
    "papers_without_artifact_ids": [
      1522,
      959,
      591,
      592
    ]
  },
  {
    "name": "Jinjin Wang",
    "display_name": "Jinjin Wang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2026
    ],
    "year_range": "2024-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SIMurai: Slicing Through the Complexity of SIM Card Security Research",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "What-App? App Usage Detection Using Encrypted LTE/5G Traffic",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1354,
    "paper_ids": [
      1518,
      4143
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jian Liu 0012",
    "display_name": "Jian Liu",
    "affiliation": "Zhejiang University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 0,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      },
      "PETS": {},
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "False Claims against Model Ownership Resolution",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Activation Approximations Can Incur Safety Vulnerabilities in Aligned LLMs: Comprehensive Analysis and Defense",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bumblebee secure twoparty inference framework for large transformers",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "secure transformer inference made noninteractive",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "on the atomicity and efficiency of blockchain payment channels",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 1355,
    "paper_ids": [
      298,
      299
    ],
    "papers_without_artifact_ids": [
      309,
      307,
      310
    ]
  },
  {
    "name": "Gwendal Patat",
    "display_name": "Gwendal Patat",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Formal Security Analysis of Widevine through the W3C EME Standard",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1356,
    "paper_ids": [
      1783,
      1786
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Florian Roudot",
    "display_name": "Florian Roudot",
    "affiliation": "Univ Rennes",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Formal Security Analysis of Widevine through the W3C EME Standard",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Narrowbeer: A Practical Replay Attack Against the Widevine DRM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1357,
    "paper_ids": [
      1783,
      1785
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrei Sabelfeld",
    "display_name": "Andrei Sabelfeld",
    "affiliation": "Chalmers/GU",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 2,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2021": 1
      },
      "ACSAC": {
        "2018": 1,
        "2022": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Practical Data Access Minimization in Trigger-Action Platforms",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "no signal left to chance driving browser extension analysis by download patterns",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "sandtrap securing javascriptdriven triggeraction platforms",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "raising the bar evaluating originwide security manifests",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 1358,
    "paper_ids": [
      816,
      2541
    ],
    "papers_without_artifact_ids": [
      4144,
      4145,
      4146
    ]
  },
  {
    "name": "Kai Tu",
    "display_name": "Kai Tu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hermes unlocking security analysis of cellular network protocols by synthesizing finite state machines from natural language specifications",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1359,
    "paper_ids": [
      2294,
      2295
    ],
    "papers_without_artifact_ids": [
      2298
    ]
  },
  {
    "name": "Abdullah Al Ishtiaq",
    "display_name": "Abdullah Al Ishtiaq",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hermes unlocking security analysis of cellular network protocols by synthesizing finite state machines from natural language specifications",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1360,
    "paper_ids": [
      2294,
      2295
    ],
    "papers_without_artifact_ids": [
      2298
    ]
  },
  {
    "name": "Syed Md. Mukit Rashid",
    "display_name": "Syed Md. Mukit Rashid",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oranalyst systematic testing framework for open ran implementations",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "hermes unlocking security analysis of cellular network protocols by synthesizing finite state machines from natural language specifications",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1361,
    "paper_ids": [
      2294,
      2295
    ],
    "papers_without_artifact_ids": [
      2167,
      2298
    ]
  },
  {
    "name": "Yilu Dong",
    "display_name": "Yilu Dong",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1362,
    "paper_ids": [
      2294,
      2295
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tianwei Wu",
    "display_name": "Tianwei Wu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hermes unlocking security analysis of cellular network protocols by synthesizing finite state machines from natural language specifications",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1363,
    "paper_ids": [
      2294,
      2295
    ],
    "papers_without_artifact_ids": [
      2298
    ]
  },
  {
    "name": "Marcel Fourné",
    "display_name": "Marcel Fourné",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"These results must be false\": A usability evaluation of constant-time analysis tools",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "you have to read 50 different rfcs that contradict each other an interview study on the experiences of implementing cryptographic standards",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 7948,
    "paper_ids": [
      1784,
      1245
    ],
    "papers_without_artifact_ids": [
      1249
    ]
  },
  {
    "name": "Arvind S. Raj",
    "display_name": "Arvind S. Raj",
    "affiliation": "Amrita Vishwa Vidyapeetham, India",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1365,
    "paper_ids": [
      817,
      819
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jayakrishna Menon Vadayath",
    "display_name": "Jayakrishna Menon Vadayath",
    "affiliation": "Arizona State University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1366,
    "paper_ids": [
      817,
      819
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hui Jun Tay",
    "display_name": "Hui Jun Tay",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1367,
    "paper_ids": [
      817,
      819
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Audrey Dutcher",
    "display_name": "Audrey Dutcher",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1368,
    "paper_ids": [
      817,
      819
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fangzhou Dong",
    "display_name": "Fangzhou Dong",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1369,
    "paper_ids": [
      817,
      819
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Roy Weiss",
    "display_name": "Roy Weiss",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "What Was Your Prompt? A Remote Keylogging Attack on AI Assistants",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cloak, Honey, Trap: Proactive Defenses Against LLM Agents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1370,
    "paper_ids": [
      2439,
      2440
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Ayzenshteyn",
    "display_name": "Daniel Ayzenshteyn",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "What Was Your Prompt? A Remote Keylogging Attack on AI Assistants",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cloak, Honey, Trap: Proactive Defenses Against LLM Agents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1371,
    "paper_ids": [
      2439,
      2440
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guy Amit",
    "display_name": "Guy Amit",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "What Was Your Prompt? A Remote Keylogging Attack on AI Assistants",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Transpose Attack: Stealing Datasets with Bidirectional Training",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1372,
    "paper_ids": [
      2439,
      2441
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shixuan Zhai",
    "display_name": "Shixuan Zhai",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1373,
    "paper_ids": [
      170,
      171
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mathias Oberhuber",
    "display_name": "Mathias Oberhuber",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "powerrelated sidechannel attacks using the android sensor framework",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 1375,
    "paper_ids": [
      270,
      274
    ],
    "papers_without_artifact_ids": [
      277
    ]
  },
  {
    "name": "Tadayoshi Kohno",
    "display_name": "Tadayoshi Kohno",
    "affiliation": "University of Washington",
    "artifact_count": 2,
    "total_papers": 23,
    "total_papers_by_conf": {
      "USENIXSEC": 12,
      "EUROSYS": 0,
      "ATC": 0,
      "ACSAC": 0,
      "WOOT": 0,
      "NSDI": 3,
      "PETS": 6,
      "NDSS": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 5,
        "2023": 3,
        "2022": 2,
        "2025": 1,
        "2021": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "ACSAC": {},
      "WOOT": {},
      "NSDI": {
        "2012": 1,
        "2008": 1,
        "2015": 1
      },
      "PETS": {
        "2020": 2,
        "2025": 1,
        "2024": 1,
        "2021": 2
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 8.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Analyzing the AI Nudification Application Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "isolategpt an execution isolation architecture for llmbased agentic systems",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "to reveal or conceal privacy and marginalization in avatars",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "experimental analyses of the physical surveillance risks in clientside content scanning",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "over fences and into yards privacy threats and concerns of commercial satellites",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "violation of my body perceptions of aigenerated nonconsensual intimate imagery",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "but they have overlooked a few things in afghanistan an analysis of the integration of biometric voter verification in the 2019 afghan presidential elections",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "understanding helpseeking and helpgiving on social media for imagebased sexual abuse",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "sok or solk on the quantitative study of sociodemographic factors and computer security behaviors",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "exploring user reactions and mental models towards perceptual manipulation attacks in mixed reality",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "ethical frameworks and computer security trolley problems foundations for conversations",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "the writing on the wall and 3d digital twins personal information in not so private real estate",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "electronic monitoring smartphone apps an analysis of risks from technical humancentered and legal perspectives",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "antiprivacy and antisecurity advice on tiktok case studies of technologyenabled surveillance and control in intimate partner and parentchild relationships",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "dna sequencing flow cells and the security of the moleculardigital interface",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "foggysight a scheme for facial lookup privacy",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "understanding privacy attitudes and concerns towards remote communications during the covid19 pandemic",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "a privacyfocused systematic analysis of online status indicators",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "smart devices in airbnbs considering privacy and security for both guests and hosts",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "securing rfids by randomizing the modulation and channel",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "detecting and defending against thirdparty tracking on the web",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "detecting inflight page changes with web tripwires",
        "conference": "NSDI",
        "year": 2008
      }
    ],
    "author_id": 1376,
    "paper_ids": [
      4147,
      2210
    ],
    "papers_without_artifact_ids": [
      177,
      4148,
      3203,
      4149,
      3210,
      2432,
      4150,
      3212,
      4151,
      2435,
      4152,
      4153,
      4154,
      4155,
      4156,
      3265,
      4157,
      4158,
      4159,
      4160,
      4161
    ]
  },
  {
    "name": "Mainack Mondal",
    "display_name": "Mainack Mondal",
    "affiliation": "IIT Kharagpur",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "EUROSYS": 0,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 2,
        "2025": 1
      },
      "EUROSYS": {},
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I just hated it and I want my money back\": Data-driven Understanding of Mobile VPN Service Switching Preferences in The Wild",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"I wasn't sure if this is indeed a security risk\": Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding and improving usability of data dashboards for simplified privacy control of voice assistant data",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "empirical understanding of deletion privacy experiences expectations and measures",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1377,
    "paper_ids": [
      4162,
      4163
    ],
    "papers_without_artifact_ids": [
      4164,
      2578
    ]
  },
  {
    "name": "Haiming Chen 0001",
    "display_name": "Haiming Chen",
    "affiliation": "Boğaziçi University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards an Effective Method of ReDoS Detection for Non-backtracking Engines",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "regexscalpel regular expression denial of service redos defense by localizeandfix",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "redoshunter a combined static and dynamic approach for regular expression dos detection",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1378,
    "paper_ids": [
      4165,
      3363
    ],
    "papers_without_artifact_ids": [
      3129,
      3367
    ]
  },
  {
    "name": "Chong Xiang 0001",
    "display_name": "Chong Xiang",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "patchguard a provably robust defense against adversarial patches via small receptive fields and masking",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1379,
    "paper_ids": [
      126,
      131
    ],
    "papers_without_artifact_ids": [
      144
    ]
  },
  {
    "name": "Tong Wu",
    "display_name": "Tong Wu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards A Proactive ML Approach for Detecting Backdoor Poison Samples",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vibspeech exploring practical wideband eavesdropping via bandlimited signal of vibrationbased side channel",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1380,
    "paper_ids": [
      126,
      127
    ],
    "papers_without_artifact_ids": [
      317
    ]
  },
  {
    "name": "Suman Jana",
    "display_name": "Suman Jana",
    "affiliation": "Columbia University",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "SOSP": 0,
      "NDSS": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2022": 1,
        "2021": 3
      },
      "SOSP": {},
      "NDSS": {},
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "distai datadriven automated invariant learning for distributed protocols",
        "conference": "OSDI",
        "year": 2021
      },
      {
        "title": "adcube webvr ad fraud and practical confinement of thirdparty ads",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "fine grained dataflow tracking with proximal gradients",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "costaware robust tree ensembles for security applications",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "on training robust pdf malware classifiers",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1381,
    "paper_ids": [
      126,
      1715
    ],
    "papers_without_artifact_ids": [
      2006,
      1719,
      4166,
      1362,
      4167
    ]
  },
  {
    "name": "Alvise de Faveri Tron",
    "display_name": "Alvise de Faveri Tron",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1382,
    "paper_ids": [
      84,
      90
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael K. Reiter",
    "display_name": "Michael K. Reiter",
    "affiliation": "Duke University",
    "artifact_count": 2,
    "total_papers": 17,
    "total_papers_by_conf": {
      "USENIXSEC": 9,
      "NDSS": 2,
      "SOSP": 0,
      "EUROSYS": 0,
      "ATC": 0,
      "ACSAC": 1,
      "FAST": 1,
      "NSDI": 4,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2020": 1,
        "2023": 2,
        "2021": 2
      },
      "NDSS": {
        "2024": 2
      },
      "SOSP": {},
      "EUROSYS": {},
      "ATC": {},
      "ACSAC": {
        "2023": 1
      },
      "FAST": {
        "2014": 1
      },
      "NSDI": {
        "2017": 1,
        "2012": 1,
        "2016": 1,
        "2008": 1
      },
      "PETS": {}
    },
    "artifact_rate": 11.8,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Near-Optimal Constrained Padding for Object Retrievals with Dependencies",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Group-based Robustness: A General Framework for Customized Robustness in the Real World",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bernoulli honeywords",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "the impact of exposed passwords on honeyword efficacy",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "on the criticality of integrity protection in 5g fronthaul networks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "mudjacking patching backdoor vulnerabilities in foundation models",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "prioritizing remediation of enterprise hosts by malware execution risk",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "distanceaware private set intersection",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "adversarial training for rawbinary malware classifiers",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "using amnesia to detect credential database breaches",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "effect of mood location trust and presence of others on videobased social authentication",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "detecting stuffing of a users credentials at her own accounts",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "a system to verify network behavior of known cryptographic clients",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "simplifying softwaredefined network optimization using sol",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "toward strong usable access control for shared distributed data",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "design and implementation of a consolidated middlebox architecture",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "csamp a system for networkwide flow monitoring",
        "conference": "NSDI",
        "year": 2008
      }
    ],
    "author_id": 1383,
    "paper_ids": [
      4168,
      2588
    ],
    "papers_without_artifact_ids": [
      4169,
      2591,
      2734,
      3165,
      4170,
      4171,
      2593,
      4172,
      4173,
      4174,
      4175,
      4176,
      1281,
      4177,
      4178
    ]
  },
  {
    "name": "Marton Bognar",
    "display_name": "Marton Bognar",
    "affiliation": "KU Leuven",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ProSpeCT: Provably Secure Speculation for the Constant-Time Policy",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1384,
    "paper_ids": [
      1446,
      1781
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tingwei Zhang",
    "display_name": "Tingwei Zhang",
    "affiliation": "Cornell Tech",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Adversarial Illusions in Multi-Modal Embeddings",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Self-interpreting Adversarial Images",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1385,
    "paper_ids": [
      1841,
      1843
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eugene Bagdasaryan",
    "display_name": "Eugene Bagdasaryan",
    "affiliation": "Univ. of Massachusetts Amherst",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2021": 1
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Adversarial Illusions in Multi-Modal Embeddings",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Blind Backdoors in Deep Learning Models",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards sparse federated analytics location heatmaps under distributed differential privacy with secure aggregation",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 1386,
    "paper_ids": [
      1841,
      1844
    ],
    "papers_without_artifact_ids": [
      4179
    ]
  },
  {
    "name": "Haixu Tang",
    "display_name": "Haixu Tang",
    "affiliation": "Indiana University",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sharpness-Aware Initialization: Improving Differentially Private Machine Learning from First Principles",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gradient shaping enhancing backdoor attack against reverse engineering",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "dpadapter improving differentially private deep learning through noise tolerance pretraining",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "sherlock on specs building lte conformance tests through automated reasoning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "seeing the forest for the trees understanding security hazards in the 3gpp ecosystem through intelligent analysis on change requests",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "demon in the variant statistical analysis of dnns for robust backdoor contamination detection",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1387,
    "paper_ids": [
      596,
      600
    ],
    "papers_without_artifact_ids": [
      603,
      606,
      609,
      610,
      611
    ]
  },
  {
    "name": "Han Gao",
    "display_name": "Han Gao",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HubBub: Contention-Based Side-Channel Attacks on USB Hubs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1388,
    "paper_ids": [
      1772,
      4180
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dave (Jing) Tian",
    "display_name": "Dave (Jing) Tian",
    "affiliation": "Purdue University",
    "artifact_count": 2,
    "total_papers": 12,
    "total_papers_by_conf": {
      "USENIXSEC": 11,
      "ACSAC": 0,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 3,
        "2022": 1,
        "2025": 2,
        "2021": 3
      },
      "ACSAC": {},
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HubBub: Contention-Based Side-Channel Attacks on USB Hubs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "why am i seeing double an investigation of device management flaws in voice assistant platforms",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "neuroscope reverse engineering deep neural network on edge devices using dynamic analysis",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "finding traceability attacks in the bluetooth low energy specification and its implementations",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "dnd a crossarchitecture deep neural network decompiler",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "lightblue automatic profileaware debloating of bluetooth stacks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "m2mon building an mmiobased security reference monitor for unmanned vehicles",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "pasan detecting peripheral access concurrency bugs within baremetal embedded applications",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "bigmac finegrained policy analysis of android firmware",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "from control model to program investigating robotic aerial vehicle accidents with mayday",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "blesa spoofing attacks against reconnections in bluetooth low energy",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1389,
    "paper_ids": [
      1772,
      4180
    ],
    "papers_without_artifact_ids": [
      1735,
      1776,
      1777,
      1779,
      27,
      1780,
      4181,
      2216,
      4182,
      30
    ]
  },
  {
    "name": "Walter Wang",
    "display_name": "Walter Wang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "checking passwords on leaky computers a side channel analysis of chromes password leak detect protocol",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1390,
    "paper_ids": [
      1498,
      1502
    ],
    "papers_without_artifact_ids": [
      1506
    ]
  },
  {
    "name": "Jason Kim 0007",
    "display_name": "Jason Kim",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FLOP: Breaking the Apple M3 CPU via False Load Output Predictions",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hot pixels frequency power and temperature attacks on gpus and arm socs",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "checking passwords on leaky computers a side channel analysis of chromes password leak detect protocol",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1391,
    "paper_ids": [
      1498,
      1501
    ],
    "papers_without_artifact_ids": [
      1507,
      1506
    ]
  },
  {
    "name": "Stephan van Schaik",
    "display_name": "Stephan van Schaik",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hot pixels frequency power and temperature attacks on gpus and arm socs",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1392,
    "paper_ids": [
      1498,
      1502
    ],
    "papers_without_artifact_ids": [
      1507
    ]
  },
  {
    "name": "Mingfei Zhang",
    "display_name": "Mingfei Zhang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoS",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1393,
    "paper_ids": [
      3186,
      3187
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dang K. Le",
    "display_name": "Dang K. Le",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SeaK: Rethinking the Design of a Secure Allocator for OS Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "take a step further understanding page spray in linux kernel exploitation",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1394,
    "paper_ids": [
      933,
      934
    ],
    "papers_without_artifact_ids": [
      826
    ]
  },
  {
    "name": "Mikhail Shcherbakov",
    "display_name": "Mikhail Shcherbakov",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "GHunter: Universal Prototype Pollution Gadgets in JavaScript Runtimes",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1395,
    "paper_ids": [
      4183,
      4184
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Musard Balliu",
    "display_name": "Musard Balliu",
    "affiliation": "KTH Royal Inst. of Technology",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "GHunter: Universal Prototype Pollution Gadgets in JavaScript Runtimes",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sandtrap securing javascriptdriven triggeraction platforms",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1396,
    "paper_ids": [
      4183,
      4184
    ],
    "papers_without_artifact_ids": [
      4145
    ]
  },
  {
    "name": "Joseph Zhang",
    "display_name": "Joseph Zhang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Oreo: Protecting ASLR Against Microarchitectural Attacks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1397,
    "paper_ids": [
      1448,
      4185
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Apurva Virkud",
    "display_name": "Apurva Virkud",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How does Endpoint Detection use the MITRE ATT&CK Framework?",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Large-scale Investigation into Geodifferences in Mobile Apps",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "network responses to russias invasion of ukraine in 2022 a cautionary tale for internet freedom",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1398,
    "paper_ids": [
      1526,
      4186
    ],
    "papers_without_artifact_ids": [
      4187
    ]
  },
  {
    "name": "Nicolas Küchler",
    "display_name": "Nicolas Küchler",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Holding Secrets Accountable: Auditing Privacy-Preserving Machine Learning",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Zeph: Cryptographic Enforcement of End-to-End Data Privacy",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7949,
    "paper_ids": [
      2457,
      2459
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonas Möller",
    "display_name": "Jonas Möller",
    "affiliation": "TU Berlin",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7950,
    "paper_ids": [
      215,
      103
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniele Coppola",
    "display_name": "Daniele Coppola",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PURE: Payments with UWB RElay-protection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LEO-Range: Physical Layer Design for Secure Ranging with Low Earth Orbiting Satellites",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1401,
    "paper_ids": [
      440,
      1225
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Claudio Anliker",
    "display_name": "Claudio Anliker",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PURE: Payments with UWB RElay-protection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "phishing attacks against password manager browser extensions",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "time for change how clocks break uwb secure ranging",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1402,
    "paper_ids": [
      440,
      413
    ],
    "papers_without_artifact_ids": [
      1229,
      1231
    ]
  },
  {
    "name": "Giovanni Cherubin",
    "display_name": "Giovanni Cherubin",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Closed-Form Bounds for DP-SGD against Record-level Inference",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Disparate Vulnerability to Membership Inference Attacks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "online website fingerprinting evaluating website fingerprinting attacks on tor in the real world",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1403,
    "paper_ids": [
      3193,
      971
    ],
    "papers_without_artifact_ids": [
      974
    ]
  },
  {
    "name": "Boris Köpf",
    "display_name": "Boris Köpf",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Closed-Form Bounds for DP-SGD against Record-level Inference",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7951,
    "paper_ids": [
      3193,
      4188
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shi-Feng Sun 0001",
    "display_name": "Shi-Feng Sun",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scalable private set union with stronger security",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1405,
    "paper_ids": [
      4046,
      1564
    ],
    "papers_without_artifact_ids": [
      4048
    ]
  },
  {
    "name": "Kaiming Huang",
    "display_name": "Kaiming Huang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 1,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "KSplit: Automating Device Driver Isolation",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1406,
    "paper_ids": [
      2219,
      2166
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunhao Wang",
    "display_name": "Yunhao Wang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Qelect: Lattice-based Single Secret Leader Election Made Practical",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1407,
    "paper_ids": [
      2462,
      4189
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Efrén López-Morales",
    "display_name": "Efrén López-Morales",
    "affiliation": "New Mexico State University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Security of Programmable Logic Controllers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7952,
    "paper_ids": [
      100,
      2473
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lea Schönherr",
    "display_name": "Lea Schönherr",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Prompt Obfuscation for Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dompteur taming audio adversarial examples",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "imperio robust overtheair adversarial examples for automatic speech recognition systems",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 7953,
    "paper_ids": [
      100,
      3266
    ],
    "papers_without_artifact_ids": [
      119,
      120
    ]
  },
  {
    "name": "Asmita 0001",
    "display_name": "Asmita",
    "affiliation": "University of Kentucky",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "large language models for code analysis do llms really do their job",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1410,
    "paper_ids": [
      4190,
      4191
    ],
    "papers_without_artifact_ids": [
      4192
    ]
  },
  {
    "name": "Ryan Tsang",
    "display_name": "Ryan Tsang",
    "affiliation": "University of California, Davis",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "large language models for code analysis do llms really do their job",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1411,
    "paper_ids": [
      4190,
      4191
    ],
    "papers_without_artifact_ids": [
      4192
    ]
  },
  {
    "name": "Houman Homayoun",
    "display_name": "Houman Homayoun",
    "affiliation": "Univ. of California - Davis",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "CHES": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4
      },
      "CHES": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "large language models for code analysis do llms really do their job",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "forget and rewire enhancing the resilience of transformerbased models against bitflip attacks",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1412,
    "paper_ids": [
      4190,
      4191
    ],
    "papers_without_artifact_ids": [
      4192,
      4193
    ]
  },
  {
    "name": "Mark Kuhne",
    "display_name": "Mark Kuhne",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      },
      "CHES": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Dorami: Privilege Separating Security Monitor on RISC-V TEEs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "heckler breaking confidential vms with malicious interrupts",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1413,
    "paper_ids": [
      2466,
      2468
    ],
    "papers_without_artifact_ids": [
      2469
    ]
  },
  {
    "name": "Haichuan Xu",
    "display_name": "Haichuan Xu",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1414,
    "paper_ids": [
      1449,
      1451
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Runze Zhang",
    "display_name": "Runze Zhang",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aurc detecting errors in program code and documentation",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1415,
    "paper_ids": [
      1449,
      1451
    ],
    "papers_without_artifact_ids": [
      1863
    ]
  },
  {
    "name": "Simon Lenau",
    "display_name": "Simon Lenau",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Towards Privacy and Security in Private Clouds: A Representative Survey on the Prevalence of Private Hosting and Administrator Characteristics",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "How Transparent is Usable Privacy and Security Research? A Meta-Study on Current Research Transparency Practices",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1416,
    "paper_ids": [
      1829,
      1242
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ioannis Angelakopoulos",
    "display_name": "Ioannis Angelakopoulos",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pandawan: Quantifying Progress in Linux-based Firmware Rehosting",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1417,
    "paper_ids": [
      795,
      797
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aleksei Stafeev",
    "display_name": "Aleksei Stafeev",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: State of the Krawlers - Evaluating the Effectiveness of Crawling Algorithms for Web Security Measurements",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "YuraScanner: Leveraging LLMs for Task-driven Web App Scanning",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1418,
    "paper_ids": [
      2324,
      2325
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nicholas Micallef",
    "display_name": "Nicholas Micallef",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2026
    ],
    "year_range": "2024-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From the Childhood Past: Views of Young Adults on Parental Sharing of Children's Photos",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ReporTor: Facilitating User Reporting of Issues Encountered in Naturalistic Web Browsing via Tor Browser",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1419,
    "paper_ids": [
      4194,
      4195
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sameer Patil",
    "display_name": "Sameer Patil",
    "affiliation": "University of Utah",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "PETS": {
        "2022": 1,
        "2026": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2026
    ],
    "year_range": "2024-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From the Childhood Past: Views of Young Adults on Parental Sharing of Children's Photos",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ReporTor: Facilitating User Reporting of Issues Encountered in Naturalistic Web Browsing via Tor Browser",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "where the wild things are bruteforce ssh attacks in the wild and how to stop them",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "a multiregion investigation of the perceptions and use of smart home devices",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 1420,
    "paper_ids": [
      4194,
      4195
    ],
    "papers_without_artifact_ids": [
      4196,
      4005
    ]
  },
  {
    "name": "Eleftherios Ioannidis",
    "display_name": "Eleftherios Ioannidis",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Efficient Representation of Numerical Optimization Problems for SNARKs",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1421,
    "paper_ids": [
      1076,
      1078
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jess Woods",
    "display_name": "Jess Woods",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Efficient Representation of Numerical Optimization Problems for SNARKs",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1422,
    "paper_ids": [
      1076,
      1078
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cristina Nita-Rotaru",
    "display_name": "Cristina Nita-Rotaru",
    "affiliation": "Northeastern University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "WOOT": 1,
      "SOSP": 0,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "WOOT": {
        "2025": 1
      },
      "SOSP": {},
      "NSDI": {
        "2013": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "A Formal Analysis of SCTP: Attack Synthesis and Patch Verification",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FUZZVPN: Finding Vulnerabilities in OpenVPN",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "juggling the jigsaw towards automated problem inference from network trouble tickets",
        "conference": "NSDI",
        "year": 2013
      }
    ],
    "author_id": 1423,
    "paper_ids": [
      4197,
      4198
    ],
    "papers_without_artifact_ids": [
      4199
    ]
  },
  {
    "name": "Timos Antonopoulos",
    "display_name": "Timos Antonopoulos",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ppSAT: Towards Two-Party Private SAT Solving",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1424,
    "paper_ids": [
      2463,
      3229
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "James Parker",
    "display_name": "James Parker",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "balboa bobbing and weaving around network censorship",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "understanding security mistakes developers make qualitative analysis from build it break it fix it",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1425,
    "paper_ids": [
      2463,
      2464
    ],
    "papers_without_artifact_ids": [
      4200,
      1280
    ]
  },
  {
    "name": "Ruzica Piskac",
    "display_name": "Ruzica Piskac",
    "affiliation": "Yale University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "CHES": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      },
      "CHES": {
        "2024": 1
      },
      "NSDI": {
        "2021": 1,
        "2020": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ppSAT: Towards Two-Party Private SAT Solving",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "quantum circuit reconstruction from power sidechannel attacks on quantum computer controllers",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "avenir managing data plane diversity with control plane synthesis",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "check before you change preventing correlated failures in service updates",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 1426,
    "paper_ids": [
      2463,
      3229
    ],
    "papers_without_artifact_ids": [
      4201,
      4202,
      710
    ]
  },
  {
    "name": "Ning Luo 0002",
    "display_name": "Ning Luo",
    "affiliation": "Tsinghua University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ppSAT: Towards Two-Party Private SAT Solving",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1427,
    "paper_ids": [
      2463,
      3229
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Limin Yang",
    "display_name": "Limin Yang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CADE: Detecting and Explaining Concept Drift Samples for Security Applications",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "true attacks attack attempts or benign triggers an empirical measurement of network alerts in a security operations center",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1428,
    "paper_ids": [
      1527,
      936
    ],
    "papers_without_artifact_ids": [
      1531
    ]
  },
  {
    "name": "Jie Zhou 0022",
    "display_name": "Jie Zhou",
    "affiliation": "George Washington University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Silhouette: Efficient Protected Shadow Stacks for Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1429,
    "paper_ids": [
      2936,
      2937
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alex Ozdemir",
    "display_name": "Alex Ozdemir",
    "affiliation": "Stanford University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scaling Verifiable Computation Using Efficient Set Accumulators",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1430,
    "paper_ids": [
      3142,
      4203
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dan Boneh",
    "display_name": "Dan Boneh",
    "affiliation": "Stanford University",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "SOSP": 0,
      "ACSAC": 0,
      "CHES": 0,
      "WOOT": 0,
      "NSDI": 1,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 2,
        "2022": 1,
        "2021": 1
      },
      "SOSP": {},
      "ACSAC": {},
      "CHES": {},
      "WOOT": {},
      "NSDI": {
        "2017": 1
      },
      "PETS": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scaling Verifiable Computation Using Efficient Set Accumulators",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "divisible ecash for billing in private ad retargeting",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "express lowering the cost of metadatahiding communication with cryptographic privacy",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "remote sidechannel attacks on anonymous transactions",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "prio private robust and scalable computation of aggregate statistics",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 1431,
    "paper_ids": [
      3142,
      4203
    ],
    "papers_without_artifact_ids": [
      1020,
      1021,
      4204,
      1023
    ]
  },
  {
    "name": "Gabrielle Beck",
    "display_name": "Gabrielle Beck",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1
      },
      "PETS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automating the Development of Chosen Ciphertext Attacks",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SocIoTy: Practical Cryptography in Smart Home Contexts",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "abuseresistant location tracking balancing privacy and safety in the offline finding ecosystem",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "timedeniable signatures",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 1432,
    "paper_ids": [
      3236,
      3237
    ],
    "papers_without_artifact_ids": [
      4205,
      4206
    ]
  },
  {
    "name": "Matthew Green 0001",
    "display_name": "Matthew Green",
    "affiliation": "Johns Hopkins University",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "PETS": 4,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2021": 1
      },
      "PETS": {
        "2022": 2,
        "2023": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Automating the Development of Chosen Ciphertext Attacks",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "abuseresistant location tracking balancing privacy and safety in the offline finding ecosystem",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "timedeniable signatures",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "efficient proofs of software exploitability for realworld processors",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "efficient set membership proofs using mpcinthehead",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "sok cryptographic confidentiality of data on mobile devices",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "keyforge nonattributable email from forwardforgeable signatures",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1433,
    "paper_ids": [
      3236,
      460
    ],
    "papers_without_artifact_ids": [
      4205,
      4206,
      4207,
      4208,
      3238,
      4209
    ]
  },
  {
    "name": "David Evans 0001",
    "display_name": "David Evans",
    "affiliation": "University of Virginia",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "PETS": {
        "2022": 1,
        "2021": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Formalizing and Estimating Distribution Inference Risks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "revisiting membership inference under realistic assumptions",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 1434,
    "paper_ids": [
      3239,
      4210
    ],
    "papers_without_artifact_ids": [
      4211
    ]
  },
  {
    "name": "Alvise Rabitti",
    "display_name": "Alvise Rabitti",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Security Lottery: Measuring Client-Side Web Security Inconsistencies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1435,
    "paper_ids": [
      403,
      1184
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hovav Shacham",
    "display_name": "Hovav Shacham",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "SOSP": 1,
      "WOOT": 0,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 2,
        "2022": 1,
        "2021": 1
      },
      "SOSP": {
        "2024": 1
      },
      "WOOT": {},
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Retrofitting Fine Grain Isolation in the Firefox Renderer",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "icarus trustworthy justintime compilers with symbolic metaexecution",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "pixel thief exploiting svg filter leakage in firefox and chrome",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "checking passwords on leaky computers a side channel analysis of chromes password leak detect protocol",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "the most dangerous codec in the world finding and exploiting vulnerabilities in h264 decoders",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "swivel hardening webassembly against spectre",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1436,
    "paper_ids": [
      3197,
      1817
    ],
    "papers_without_artifact_ids": [
      3199,
      1504,
      1506,
      4212,
      3201
    ]
  },
  {
    "name": "Stephen Herwig",
    "display_name": "Stephen Herwig",
    "affiliation": "College of William and Mary",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "PETS": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Achieving Keyless CDNs with Conclaves",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Akeso: Bringing Post-Compromise Security to Cloud Storage",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1437,
    "paper_ids": [
      2184,
      4213
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhemin Yang",
    "display_name": "Zhemin Yang",
    "affiliation": "Fudan University",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "ATC": 0,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 2,
        "2023": 1,
        "2022": 2,
        "2025": 1
      },
      "ATC": {},
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply Chains",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an empirical study on fingerprint api misuse with lifecycle analysis in realworld android apps",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "the skeleton keys a large scale analysis of credential leakage in miniapps",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "notice the imposter a study on user tag spoofing attack in mobile apps",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "exploring the security boundary of data reconstruction via neuron exclusivity analysis",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "ferry stateaware symbolic execution for exploring statedependent program paths",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "bscout direct whole patch presence test for java executables",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1438,
    "paper_ids": [
      230,
      235
    ],
    "papers_without_artifact_ids": [
      246,
      244,
      250,
      4214,
      255,
      261
    ]
  },
  {
    "name": "Daniel Arp",
    "display_name": "Daniel Arp",
    "affiliation": "TU Wien",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dos and donts of machine learning in computer security",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1439,
    "paper_ids": [
      216,
      538
    ],
    "papers_without_artifact_ids": [
      541
    ]
  },
  {
    "name": "Dokyung Song",
    "display_name": "Dokyung Song",
    "affiliation": "Yonsei University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 2,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1
      },
      "NDSS": {
        "2025": 2
      },
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environments",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "moneta exvivo gpu driver fuzzing by recalling invivo execution states",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "reusb replayguided usb driver fuzzing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "dmvx secure and efficient multivariant execution in a distributed setting",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 1440,
    "paper_ids": [
      3790,
      4215
    ],
    "papers_without_artifact_ids": [
      3784,
      4216,
      3789
    ]
  },
  {
    "name": "Dennis Jackson",
    "display_name": "Dennis Jackson",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automated Security Analysis of Exposure Notification Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1441,
    "paper_ids": [
      442,
      4217
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alejandro Cabrera Aldaya",
    "display_name": "Alejandro Cabrera Aldaya",
    "affiliation": "Tampere University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      },
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Certified Side Channels",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HyperDegrade: From GHz to MHz Effective CPU Frequencies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "online template attacks revisited",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 1442,
    "paper_ids": [
      2251,
      2252
    ],
    "papers_without_artifact_ids": [
      2253
    ]
  },
  {
    "name": "Yanick Fratantonio",
    "display_name": "Yanick Fratantonio",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 2,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 3
      },
      "ACSAC": {
        "2018": 1,
        "2017": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards HTTPS Everywhere on Android: We Are Not There Yet",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how machine learning is solving the binary function similarity problem",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "remind a first look inside the mind of a reverse engineer",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "using loops for malware classification resilient to featureunaware perturbations",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "exploitation and mitigation of authentication schemes based on devicepublic information",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 1443,
    "paper_ids": [
      4218,
      820
    ],
    "papers_without_artifact_ids": [
      4219,
      4220,
      1163,
      1164
    ]
  },
  {
    "name": "Eric Gustafson",
    "display_name": "Eric Gustafson",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      },
      "ACSAC": {
        "2018": 1,
        "2017": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "using loops for malware classification resilient to featureunaware perturbations",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "exploitation and mitigation of authentication schemes based on devicepublic information",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 1444,
    "paper_ids": [
      9,
      106
    ],
    "papers_without_artifact_ids": [
      1163,
      1164
    ]
  },
  {
    "name": "Dominik Christian Maier",
    "display_name": "Dominik Christian Maier",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "WOOT": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1
      },
      "WOOT": {
        "2019": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2019,
      2023
    ],
    "year_range": "2019-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing",
        "conference": "WOOT",
        "year": 2019,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Forming Faster Firmware Fuzzers",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "afl combining incremental steps of fuzzing research",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1445,
    "paper_ids": [
      4221,
      1519
    ],
    "papers_without_artifact_ids": [
      4222
    ]
  },
  {
    "name": "Zichen Gui",
    "display_name": "Zichen Gui",
    "affiliation": "University of Georgia",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "PETS": {
        "2024": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Security Analysis of MongoDB Queryable Encryption",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SWiSSSE: System-Wide Security for Searchable Symmetric Encryption",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding leakage in searchable encryption a quantitative approach",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 1446,
    "paper_ids": [
      4223,
      4224
    ],
    "papers_without_artifact_ids": [
      4225
    ]
  },
  {
    "name": "Kenneth G. Paterson",
    "display_name": "Kenneth G. Paterson",
    "affiliation": "ETH Zurich",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "PETS": 2,
      "CHES": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 3,
        "2022": 1
      },
      "PETS": {
        "2024": 1,
        "2021": 1
      },
      "CHES": {},
      "NDSS": {}
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Security Analysis of MongoDB Queryable Encryption",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SWiSSSE: System-Wide Security for Searchable Symmetric Encryption",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cryptographic analysis of delta chat",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "three lessons from threema analysis of a secure messenger",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "snapping snap sync practical attacks on go ethereum synchronising nodes",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "breaking bridgefy again adopting libsignal is not enough",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "crowdnotifier decentralized privacypreserving presence tracing",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 1447,
    "paper_ids": [
      4223,
      4224
    ],
    "papers_without_artifact_ids": [
      4226,
      4227,
      4228,
      4229,
      975
    ]
  },
  {
    "name": "Tianxin Tang",
    "display_name": "Tianxin Tang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Security Analysis of MongoDB Queryable Encryption",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Learning from Functionality Outputs: Private Join and Compute in the Real World",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacypreserving approximate knearestneighbors search that hides access query and volume patterns",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 1448,
    "paper_ids": [
      4223,
      3357
    ],
    "papers_without_artifact_ids": [
      4230
    ]
  },
  {
    "name": "Cédric Fournet",
    "display_name": "Cédric Fournet",
    "affiliation": "Microsoft",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 1,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "ATC": {
        "2023": 1
      },
      "NSDI": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Transparent Attested DNS for Confidential Computing Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "confidential computing within an ai accelerator",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "iaccf individual accountability for permissioned ledgers",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 7954,
    "paper_ids": [
      4188,
      4231
    ],
    "papers_without_artifact_ids": [
      4232,
      1393
    ]
  },
  {
    "name": "Amit Klein 0001",
    "display_name": "Amit Klein",
    "affiliation": "Hebrew University of Jerusalem",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Device Tracking via Linux's New TCP Source Port Selection Algorithm",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DNS FLaRE: A Flush-Reload Attack on DNS Forwarders",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "you can rand but you cant hide a holistic security analysis of google fuchsias and gvisors network stack",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 1450,
    "paper_ids": [
      3242,
      3151
    ],
    "papers_without_artifact_ids": [
      4233
    ]
  },
  {
    "name": "Mohammadkazem Taram",
    "display_name": "Mohammadkazem Taram",
    "affiliation": "Purdue University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SecSMT: Securing SMT Processors against Contention-Based Covert Channels",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1451,
    "paper_ids": [
      3221,
      3222
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weikeng Chen",
    "display_name": "Weikeng Chen",
    "affiliation": "University of California, Berkeley",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HOLMES: Efficient Distribution Testing for Secure Collaborative Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1452,
    "paper_ids": [
      4234,
      468
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Murat Kantarcioglu",
    "display_name": "Murat Kantarcioglu",
    "affiliation": "Virginia Tech",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2
      },
      "ACSAC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "HOLMES: Efficient Distribution Testing for Secure Collaborative Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Evading Provenance-Based ML Detectors with Adversarial System Actions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the queens guard a secure enforcement of finegrained access control in distributed data analytics platforms",
        "conference": "ACSAC",
        "year": 2023
      }
    ],
    "author_id": 1453,
    "paper_ids": [
      4234,
      3246
    ],
    "papers_without_artifact_ids": [
      4235
    ]
  },
  {
    "name": "Chitchanok Chuengsatiansup",
    "display_name": "Chitchanok Chuengsatiansup",
    "affiliation": "Hasso Plattner Institute",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 3
      },
      "CHES": {
        "2024": 2,
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BunnyHop: Exploiting the Instruction Prefetcher",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Gates of Time: Improving Cache Attacks with Transient Execution",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "leaky mceliece secret key recovery from highly erroneous sidechannel information",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "teejam subcacheline leakages strike back",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "evictspectime exploiting outoforder execution to improve cachetiming attacks",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "cachetiming attack against hqc",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "ultimate slh taking speculative load hardening to the next level",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1454,
    "paper_ids": [
      1499,
      1521
    ],
    "papers_without_artifact_ids": [
      1522,
      1431,
      1503,
      4071,
      1525
    ]
  },
  {
    "name": "Yuanhaur Chang",
    "display_name": "Yuanhaur Chang",
    "affiliation": "Washington University in St. Louis",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SMACK: Semantically Meaningful Adversarial Audio Attack",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1455,
    "paper_ids": [
      171,
      173
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuchen Yang 0001",
    "display_name": "Yuchen Yang",
    "affiliation": "IISc Bangalore",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CertPHash: Towards Certified Perceptual Hashing via Robust Training",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1456,
    "paper_ids": [
      458,
      462
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kevin Eykholt",
    "display_name": "Kevin Eykholt",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "URET: Universal Robustness Evaluation Toolkit (for Evasion)",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Transferring Adversarial Robustness Through Robust Representation Matching",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deta minimizing data leaks in federated learning via decentralized and trustworthy aggregation",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 1457,
    "paper_ids": [
      4236,
      4237
    ],
    "papers_without_artifact_ids": [
      2140
    ]
  },
  {
    "name": "Douglas Lee Schales",
    "display_name": "Douglas Lee Schales",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "URET: Universal Robustness Evaluation Toolkit (for Evasion)",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1458,
    "paper_ids": [
      4236,
      2452
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiyong Jang",
    "display_name": "Jiyong Jang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1,
      "ACSAC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "NSDI": {
        "2010": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "URET: Universal Robustness Evaluation Toolkit (for Evasion)",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rapid realtime alert investigation with contextaware prioritization for efficient threat discovery",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "splitscreen enabling efficient distributed malware detection",
        "conference": "NSDI",
        "year": 2010
      }
    ],
    "author_id": 1459,
    "paper_ids": [
      4236,
      2452
    ],
    "papers_without_artifact_ids": [
      141,
      2480
    ]
  },
  {
    "name": "Miles Grant",
    "display_name": "Miles Grant",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 2,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Educators' Perspectives of Using (or Not Using) Online Exam Proctoring",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Security and Privacy Perceptions of Third-Party Application Access for Google Accounts",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the same pin just longer on the insecurity of upgrading pins from 4 to 6 digits",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "using a blocklist to improve the security of user selection of android patterns",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1460,
    "paper_ids": [
      859,
      861
    ],
    "papers_without_artifact_ids": [
      867,
      873
    ]
  },
  {
    "name": "Yuhang Wu 0003",
    "display_name": "Yuhang Wu",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PATCHAGENT: A Practical Program Repair Agent Mimicking Human Expertise",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1461,
    "paper_ids": [
      934,
      935
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dongliang Mu",
    "display_name": "Dongliang Mu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PATCHAGENT: A Practical Program Repair Agent Mimicking Human Expertise",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1462,
    "paper_ids": [
      934,
      935
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bing Mao 0001",
    "display_name": "Bing Mao",
    "affiliation": "Nanjing University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ground Truth for Binary Disassembly is Not Easy",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mapping to bits efficiently detecting type confusion errors",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 1463,
    "paper_ids": [
      10,
      1754
    ],
    "papers_without_artifact_ids": [
      4238
    ]
  },
  {
    "name": "Vinod Yegneswaran",
    "display_name": "Vinod Yegneswaran",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1,
      "SC": 0,
      "ATC": 0,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      },
      "SC": {},
      "ATC": {},
      "ACSAC": {
        "2019": 1,
        "2017": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gfweb measuring the great firewalls web censorship at scale",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "clarion sound and clear provenance tracking for microservice deployments",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "coordinated dataflow protection for ultrahigh bandwidth science networks",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "a securitymode for carriergrade sdn controllers",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 1464,
    "paper_ids": [
      3253,
      386
    ],
    "papers_without_artifact_ids": [
      2991,
      4239,
      4240,
      4241
    ]
  },
  {
    "name": "Alexander Krause",
    "display_name": "Alexander Krause",
    "affiliation": "TU Dortmund",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "\"That's my perspective from 30 years of doing this\": An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "if you cant get them to the lab evaluating a virtual study environment with security information workers",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1465,
    "paper_ids": [
      1240,
      1243
    ],
    "papers_without_artifact_ids": [
      1253
    ]
  },
  {
    "name": "Nicolas Huaman",
    "display_name": "Nicolas Huaman",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 2,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "NDSS": 1,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2021": 3
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1,
        "2018": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "passwords togo investigating multifaceted challenges for password managers in the android ecosystem",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "you have to read 50 different rfcs that contradict each other an interview study on the experiences of implementing cryptographic standards",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "if you cant get them to the lab evaluating a virtual study environment with security information workers",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "on the limited impact of visualizing encryption perceptions of e2e messaging security",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "why eve and mallory still love android revisiting tls insecurity in android applications",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "a largescale interview study on information security in and attacks against small and mediumsized enterprises",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "cloudy with a chance of misconceptions exploring users perceptions and expectations of security and privacy in cloud office suites",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "a large scale investigation of obfuscation use in google play",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 1466,
    "paper_ids": [
      1240,
      1245
    ],
    "papers_without_artifact_ids": [
      1247,
      1249,
      1253,
      1254,
      408,
      1256,
      1257,
      1258
    ]
  },
  {
    "name": "Sara Rampazzi",
    "display_name": "Sara Rampazzi",
    "affiliation": "University of Florida",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 0,
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 2,
        "2025": 1
      },
      "ACSAC": {},
      "PETS": {
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sound of Interference: Electromagnetic Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "invisible reflections leveraging infrared laser reflections to target traffic sign perception",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "you cant see me physical removal attacks on lidarbased autonomous vehicles driving frameworks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "analyzing the monetization ecosystem of stalkerware",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "light commands laserbased audio injection attacks on voicecontrollable systems",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1467,
    "paper_ids": [
      2209,
      4242
    ],
    "papers_without_artifact_ids": [
      4243,
      4244,
      2214,
      1510
    ]
  },
  {
    "name": "Hongbo Chen",
    "display_name": "Hongbo Chen",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "A Verified Confidential Computing as a Service Framework for Privacy Preservation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PICACHV: Formally Verified Data Use Policy Enforcement for Secure Data Analytics",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1468,
    "paper_ids": [
      597,
      601
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haobin Hiroki Chen",
    "display_name": "Haobin Hiroki Chen",
    "affiliation": "Indiana University Bloomington",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "A Verified Confidential Computing as a Service Framework for Privacy Preservation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PICACHV: Formally Verified Data Use Policy Enforcement for Secure Data Analytics",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1469,
    "paper_ids": [
      597,
      601
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tao Wei 0002",
    "display_name": "Tao Wei",
    "affiliation": "University of Surrey",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 0,
      "CHES": 2,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "ACSAC": {},
      "CHES": {
        "2025": 2
      },
      "NDSS": {
        "2025": 3
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "xboot freexor gates for ckks with applications to transciphering",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "sok fhefriendly symmetric ciphers and transciphering",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "scrutinizer towards secure forensics on compromised trustzone",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "raconteur a knowledgeable insightful and portable llmpowered shell command explainer",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "bumblebee secure twoparty inference framework for large transformers",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 1470,
    "paper_ids": [
      545,
      300
    ],
    "papers_without_artifact_ids": [
      4245,
      4246,
      776,
      4247,
      309
    ]
  },
  {
    "name": "Roei Schuster",
    "display_name": "Roei Schuster",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lend me your ear passive remote physical side channels on pcs",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "you autocomplete me poisoning vulnerabilities in neural code completion",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1471,
    "paper_ids": [
      460,
      1842
    ],
    "papers_without_artifact_ids": [
      1508,
      1846
    ]
  },
  {
    "name": "Tushar M. Jois",
    "display_name": "Tushar M. Jois",
    "affiliation": "CUNY",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "PETS": {
        "2022": 1,
        "2024": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SocIoTy: Practical Cryptography in Smart Home Contexts",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok cryptographic confidentiality of data on mobile devices",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 1472,
    "paper_ids": [
      460,
      3237
    ],
    "papers_without_artifact_ids": [
      3238
    ]
  },
  {
    "name": "Chao Wang 0113",
    "display_name": "Chao Wang",
    "affiliation": "Ohio State University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1473,
    "paper_ids": [
      381,
      382
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Salma Elmalaki 0001",
    "display_name": "Salma Elmalaki",
    "affiliation": "IIT Bombay",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "AutoFR: Automated Filter Rule Generation for Adblocking",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BehaVR: User Identification Based on VR Sensor Data",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1474,
    "paper_ids": [
      804,
      965
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jason Zhijingcheng Yu",
    "display_name": "Jason Zhijingcheng Yu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Capstone: A Capability-based Foundation for Trustless Secure Memory Access",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Elasticlave: An Efficient Memory Model for Enclaves",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1475,
    "paper_ids": [
      1767,
      1769
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Trevor E. Carlson",
    "display_name": "Trevor E. Carlson",
    "affiliation": "National University of Singapore",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Capstone: A Capability-based Foundation for Trustless Secure Memory Access",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Elasticlave: An Efficient Memory Model for Enclaves",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1476,
    "paper_ids": [
      1767,
      1769
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Afonso Tinoco",
    "display_name": "Afonso Tinoco",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "EnigMap: External-Memory Oblivious Map for Secure Enclaves",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1477,
    "paper_ids": [
      2490,
      2491
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simon Wörner",
    "display_name": "Simon Wörner",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2025": 2,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aidfuzzer adaptive interruptdriven firmware fuzzing via runtime state recognition",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "nyx greybox hypervisor fuzzing using fast snapshots and affine types",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "aurora statistical crash analysis for automated root cause explanation",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 7955,
    "paper_ids": [
      101,
      109
    ],
    "papers_without_artifact_ids": [
      113,
      118,
      122
    ]
  },
  {
    "name": "Felix Buchmann",
    "display_name": "Felix Buchmann",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1479,
    "paper_ids": [
      101,
      109
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Danfeng Yao",
    "display_name": "Danfeng Yao",
    "affiliation": "Virginia Tech",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1,
      "ACSAC": 1,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "PETS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SKILLPoV: Towards Accessible and Effective Privacy Notice for Amazon Alexa Skills",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "madeline continuous and lowcost monitoring with graphfree representations to combat cyber threats",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 1480,
    "paper_ids": [
      1191,
      1456
    ],
    "papers_without_artifact_ids": [
      4248
    ]
  },
  {
    "name": "Grace H. Cimaszewski",
    "display_name": "Grace H. Cimaszewski",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "How Effective is Multiple-Vantage-Point Domain Control Validation?",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Creating a Secure Underlay for the Internet",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1481,
    "paper_ids": [
      128,
      129
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Robert Künnemann",
    "display_name": "Robert Künnemann",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Automated Security Analysis of Exposure Notification Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SAPIC+: protocol verifiers of the world, unite!",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7956,
    "paper_ids": [
      4217,
      2521
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cristian-Alexandru Staicu",
    "display_name": "Cristian-Alexandru Staicu",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 3
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "welcome to jurassic park a comprehensive study of security risks in deno and its ecosystem",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "bilingual problems studying the security risks incurred by native extensions in scripting languages",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1483,
    "paper_ids": [
      4184,
      4249
    ],
    "papers_without_artifact_ids": [
      4250,
      404
    ]
  },
  {
    "name": "Zhibo Liu",
    "display_name": "Zhibo Liu",
    "affiliation": "Hong Kong University of Science and Technology",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2
      },
      "NDSS": {
        "2025": 3
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Decompiling x86 Deep Neural Network Executables",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mtzk testing and exploring bugs in zeroknowledge zk compilers",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "compiled models builtin exploits uncovering pervasive bitflip attack surfaces in dnn executables",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "bitshield defending against bitflip attacks on dnn executables",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 1484,
    "paper_ids": [
      945,
      947
    ],
    "papers_without_artifact_ids": [
      952,
      953,
      954
    ]
  },
  {
    "name": "Alexander Dax",
    "display_name": "Alexander Dax",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 3
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Formal Analysis of SPDM: Security Protocol and Data Model version 1.2",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hash gone bad automated discovery of protocol attacks that exploit hash function weaknesses",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1485,
    "paper_ids": [
      1879,
      1881
    ],
    "papers_without_artifact_ids": [
      1882
    ]
  },
  {
    "name": "Aurora Naska",
    "display_name": "Aurora Naska",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Formal Analysis of SPDM: Security Protocol and Data Model version 1.2",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1486,
    "paper_ids": [
      1879,
      1880
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simon Rohlmann",
    "display_name": "Simon Rohlmann",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Every Signature is Broken: On the Insecurity of Microsoft Office's OOXML Signatures",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1487,
    "paper_ids": [
      585,
      589
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christian Mainka",
    "display_name": "Christian Mainka",
    "affiliation": "University of Wuppertal",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Every Signature is Broken: On the Insecurity of Microsoft Office's OOXML Signatures",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "office document security and privacy",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1488,
    "paper_ids": [
      585,
      589
    ],
    "papers_without_artifact_ids": [
      594
    ]
  },
  {
    "name": "Eunsoo Kim",
    "display_name": "Eunsoo Kim",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sharing cyber threat intelligence: Does it really help?",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "firmae towards largescale emulation of iot firmware for dynamic analysis",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 1489,
    "paper_ids": [
      2331,
      1126
    ],
    "papers_without_artifact_ids": [
      2335
    ]
  },
  {
    "name": "CheolJun Park",
    "display_name": "CheolJun Park",
    "affiliation": "Kyung Hee University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 2,
        "2025": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "watching the watchers practical video identification attack in lte networks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "doltest indepth downlink negative testing framework for lte devices",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1490,
    "paper_ids": [
      2331,
      2332
    ],
    "papers_without_artifact_ids": [
      1718,
      2334
    ]
  },
  {
    "name": "Tom van Goethem",
    "display_name": "Tom van Goethem",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "PETS": 3,
      "ATC": 0,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 2
      },
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2021": 1
      },
      "ATC": {},
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "everybodys looking for ssomething a largescale evaluation on the privacy of oauth authentication on the web",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "helping hands measuring the impact of a large threat intelligence sharing community",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "an audit of facebooks political ad policy enforcement",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "the cname of the game largescale analysis of dnsbased tracking evasion",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "timeless timing attacks exploiting concurrency to leak secrets over remote connections",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1491,
    "paper_ids": [
      4251,
      4252
    ],
    "papers_without_artifact_ids": [
      4253,
      3349,
      4254,
      4255,
      3083
    ]
  },
  {
    "name": "Wouter Joosen",
    "display_name": "Wouter Joosen",
    "affiliation": "KU Leuven",
    "artifact_count": 2,
    "total_papers": 12,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "PETS": 3,
      "SC": 0,
      "EUROSYS": 1,
      "ATC": 0,
      "ACSAC": 1,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 2,
        "2022": 2
      },
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2021": 1
      },
      "SC": {},
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {},
      "ACSAC": {
        "2019": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "swipe left for identity theft an analysis of user data privacy risks on locationbased dating apps",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "threat modeling state of practice in dutch organizations",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "everybodys looking for ssomething a largescale evaluation on the privacy of oauth authentication on the web",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "analyzing cyber security research practices through a metaresearch framework",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "helping hands measuring the impact of a large threat intelligence sharing community",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "an audit of facebooks political ad policy enforcement",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "scew programmable bftconsensus with smart contracts for clientcentric p2p web applications",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "the cname of the game largescale analysis of dnsbased tracking evasion",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "timeless timing attacks exploiting concurrency to leak secrets over remote connections",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "premadoma an operational solution for dns registries to prevent malicious domain registrations",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 1492,
    "paper_ids": [
      4251,
      4252
    ],
    "papers_without_artifact_ids": [
      3786,
      4256,
      4253,
      4257,
      3349,
      4254,
      4258,
      4255,
      3083,
      4259
    ]
  },
  {
    "name": "Keno Hassler",
    "display_name": "Keno Hassler",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Systematic Assessment of Fuzzers using Mutation Analysis",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1493,
    "paper_ids": [
      102,
      111
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniël Trujillo",
    "display_name": "Daniël Trujillo",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Inception: Exposing New Attack Surfaces with Training in Transient Execution",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7957,
    "paper_ids": [
      922,
      88
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Luca Di Bartolomeo",
    "display_name": "Luca Di Bartolomeo",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "ARMore: Pushing Love Back Into Binaries",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Hercules Droidot and the murder on the JNI Express",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1495,
    "paper_ids": [
      11,
      14
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Amir Rahmati",
    "display_name": "Amir Rahmati",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Erebus: Access Control for Augmented Reality Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Transferring Adversarial Robustness Through Robust Representation Matching",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "like comment get scammed characterizing comment scams on media platforms",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "biosignal authentication considered harmful today",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1496,
    "paper_ids": [
      4260,
      4237
    ],
    "papers_without_artifact_ids": [
      1118,
      4261
    ]
  },
  {
    "name": "Prashant Hari Narayan Rajput",
    "display_name": "Prashant Hari Narayan Rajput",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ICSQuartz: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial Control Systems",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1497,
    "paper_ids": [
      2515,
      2518
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Constantine Doumanidis",
    "display_name": "Constantine Doumanidis",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ICSQuartz: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial Control Systems",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1498,
    "paper_ids": [
      2515,
      2518
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aiping Xiong",
    "display_name": "Aiping Xiong",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understand Users' Privacy Perception and Decision of V2X Communication in Connected Autonomous Vehicles",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Understanding Unsafe Video Generation",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1499,
    "paper_ids": [
      4262,
      192
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jackson Sippe",
    "display_name": "Jackson Sippe",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "wallbleed a memory disclosure vulnerability in the great firewall of china",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "open to a fault on the passive compromise of tls keys via transient errors",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1500,
    "paper_ids": [
      884,
      885
    ],
    "papers_without_artifact_ids": [
      888,
      4263
    ]
  },
  {
    "name": "Kevin Bock 0001",
    "display_name": "Kevin Bock",
    "affiliation": "BITS Pilani",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2021": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "weaponizing middleboxes for tcp reflected amplification",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "detecting and evading censorshipindepth a case study of irans protocol whitelister",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1501,
    "paper_ids": [
      884,
      2481
    ],
    "papers_without_artifact_ids": [
      2483,
      2484
    ]
  },
  {
    "name": "Eric Wustrow",
    "display_name": "Eric Wustrow",
    "affiliation": "University of Colorado Boulder",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "WOOT": 0,
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "WOOT": {},
      "PETS": {
        "2020": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "wallbleed a memory disclosure vulnerability in the great firewall of china",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "open to a fault on the passive compromise of tls keys via transient errors",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "weaponizing middleboxes for tcp reflected amplification",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "running refraction networking for real",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "httpt a proberesistant proxy",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1502,
    "paper_ids": [
      884,
      885
    ],
    "papers_without_artifact_ids": [
      888,
      4263,
      2483,
      4264,
      4265
    ]
  },
  {
    "name": "Wen Li 0007",
    "display_name": "Wen Li",
    "affiliation": "Utah State University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PolyCruise: A Cross-Language Dynamic Information Flow Analysis",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1503,
    "paper_ids": [
      771,
      772
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Adithya Vadapalli",
    "display_name": "Adithya Vadapalli",
    "affiliation": "IIT Kanpur",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "PETS": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "you may also like privacy recommendation systems meet pir",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 1504,
    "paper_ids": [
      1283,
      1288
    ],
    "papers_without_artifact_ids": [
      4266
    ]
  },
  {
    "name": "Ryan Henry",
    "display_name": "Ryan Henry",
    "affiliation": "University of Calgary",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "PETS": {
        "2025": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "you may also like privacy recommendation systems meet pir",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 1505,
    "paper_ids": [
      1283,
      2562
    ],
    "papers_without_artifact_ids": [
      4266
    ]
  },
  {
    "name": "Simone Colombo 0002",
    "display_name": "Simone Colombo",
    "affiliation": "King's College London, London, UK",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "PETS": {
        "2025": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Authenticated private information retrieval",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Real-World Deniability in Messaging",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1506,
    "paper_ids": [
      1016,
      4267
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Floris Gorter",
    "display_name": "Floris Gorter",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "FloatZone: Accelerating Memory Error Detection using the Floating Point Unit",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RangeSanitizer: Detecting Memory Errors with Efficient Range Checks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1507,
    "paper_ids": [
      85,
      89
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Enrico Barberis",
    "display_name": "Enrico Barberis",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "FloatZone: Accelerating Memory Error Detection using the Floating Point Unit",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rage against the machine clear a systematic analysis of machine clears and their implications for transient execution attacks",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1508,
    "paper_ids": [
      85,
      87
    ],
    "papers_without_artifact_ids": [
      95
    ]
  },
  {
    "name": "Raphael Isemann",
    "display_name": "Raphael Isemann",
    "affiliation": "Vrije Universiteit Amsterdam",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "FloatZone: Accelerating Memory Error Detection using the Floating Point Unit",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1509,
    "paper_ids": [
      85,
      90
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sébastien Bardin",
    "display_name": "Sébastien Bardin",
    "affiliation": "Université Paris-Saclay",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "ACSAC": {
        "2019": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "ProSpeCT: Provably Secure Speculation for the Constant-Time Policy",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Attacker Control and Bug Prioritization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how to kill symbolic deobfuscation for free or unleashing the potential of pathoriented protections",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 7958,
    "paper_ids": [
      1781,
      4268
    ],
    "papers_without_artifact_ids": [
      4269
    ]
  },
  {
    "name": "Deepak Sirone Jegan",
    "display_name": "Deepak Sirone Jegan",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Guarding Serverless Applications with Kalium",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Architecting Trigger-Action Platforms for Security, Performance and Functionality",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1511,
    "paper_ids": [
      2921,
      2922
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ryan Lehmkuhl",
    "display_name": "Ryan Lehmkuhl",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Eos: Efficient Private Delegation of zkSNARK Provers",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Distributional Private Information Retrieval",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "muse secure inference resilient to malicious clients",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "delphi a cryptographic inference service for neural networks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1512,
    "paper_ids": [
      4270,
      1017
    ],
    "papers_without_artifact_ids": [
      674,
      677
    ]
  },
  {
    "name": "Pratyush Mishra 0001",
    "display_name": "Pratyush Mishra",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Eos: Efficient Private Delegation of zkSNARK Provers",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DFS: Delegation-friendly zkSNARK and Private Delegation of Provers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "muse secure inference resilient to malicious clients",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "delphi a cryptographic inference service for neural networks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1513,
    "paper_ids": [
      4270,
      3230
    ],
    "papers_without_artifact_ids": [
      674,
      677
    ]
  },
  {
    "name": "Siddharth Muralee",
    "display_name": "Siddharth Muralee",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LEMIX: Enabling Testing of Embedded Applications as Linux Applications",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "characterizing the security of github ci workflows",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1514,
    "paper_ids": [
      1773,
      1774
    ],
    "papers_without_artifact_ids": [
      2429
    ]
  },
  {
    "name": "Igibek Koishybayev",
    "display_name": "Igibek Koishybayev",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "UntrustIDE: Exploiting Weaknesses in VS Code Extensions",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "characterizing the security of github ci workflows",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1515,
    "paper_ids": [
      1773,
      2265
    ],
    "papers_without_artifact_ids": [
      2429
    ]
  },
  {
    "name": "Antoon Purnal",
    "display_name": "Antoon Purnal",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SpectrEM: Exploiting Electromagnetic Emanations During Transient Execution",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1516,
    "paper_ids": [
      1790,
      1791
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sanchuan Chen",
    "display_name": "Sanchuan Chen",
    "affiliation": "Auburn University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Controlled Data Races in Enclaves: Attacks and Detection",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1517,
    "paper_ids": [
      363,
      368
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benjamin Altpeter",
    "display_name": "Benjamin Altpeter",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Keeping Privacy Labels Honest",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1518,
    "paper_ids": [
      217,
      221
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hao Cui",
    "display_name": "Hao Cui",
    "affiliation": "University of California, Irvine",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1519,
    "paper_ids": [
      960,
      961
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vivek Nair",
    "display_name": "Vivek Nair",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2
      },
      "PETS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Exploring the Privacy Risks of Adversarial VR Game Design",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok data privacy in virtual reality",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "unique identification of 50 000 virtual reality users from head hand motion data",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1520,
    "paper_ids": [
      3277,
      3279
    ],
    "papers_without_artifact_ids": [
      3281,
      3283
    ]
  },
  {
    "name": "Hongyi Liu",
    "display_name": "Hongyi Liu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Remote Direct Memory Introspection",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Bedrock: Programmable Network Support for Secure RDMA Systems",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1521,
    "paper_ids": [
      699,
      700
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Srinivas Devadas",
    "display_name": "Srinivas Devadas",
    "affiliation": "Massachusetts Inst. of Technology",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1,
      "SOSP": 0,
      "ACSAC": 0,
      "CHES": 0,
      "NSDI": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "PETS": {
        "2026": 1
      },
      "SOSP": {},
      "ACSAC": {},
      "CHES": {},
      "NSDI": {
        "2020": 1,
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2026
    ],
    "year_range": "2023-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Remote Direct Memory Introspection",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Making Sense of Private Advertising: A Principled Approach to a Complex Ecosystem",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "spectrum highbandwidth anonymous broadcast",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "xrd scalable messaging system with cryptographic privacy",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 1522,
    "paper_ids": [
      699,
      2445
    ],
    "papers_without_artifact_ids": [
      4271,
      4272
    ]
  },
  {
    "name": "Kyle Soska",
    "display_name": "Kyle Soska",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "PETS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Measurement by Proxy: On the Accuracy of Online Marketplace Measurements",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Blockchain Address Poisoning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1523,
    "paper_ids": [
      3290,
      3291
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sheng Yu",
    "display_name": "Sheng Yu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1524,
    "paper_ids": [
      2273,
      2275
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu Qu",
    "display_name": "Yu Qu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1525,
    "paper_ids": [
      2273,
      2275
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anunay Kulshrestha",
    "display_name": "Anunay Kulshrestha",
    "affiliation": "Princeton University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2021": 1
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Estimating Incidental Collection in Foreign Intelligence Surveillance: Large-Scale Multiparty Private Set Intersection with Union and Sum",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Leveraging strategic connection migration-powered traffic splitting for privacy",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "account verification on social media user perceptions and paid enrollment",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "identifying harmful media in endtoend encrypted communication efficient private membership computation",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1526,
    "paper_ids": [
      4273,
      134
    ],
    "papers_without_artifact_ids": [
      4274,
      4275
    ]
  },
  {
    "name": "Jonathan R. Mayer",
    "display_name": "Jonathan R. Mayer",
    "affiliation": "Princeton University",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 2,
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 2
      },
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Estimating Incidental Collection in Foreign Intelligence Surveillance: Large-Scale Multiparty Private Set Intersection with Union and Sum",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: Machine Learning for Misinformation Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok content moderation for endtoend encryption",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "account verification on social media user perceptions and paid enrollment",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "identifying harmful media in endtoend encrypted communication efficient private membership computation",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "adapting security warnings to counter online disinformation",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "identifying disinformation websites using infrastructure features",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "an empirical study of wireless carrier authentication for sim swaps",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1527,
    "paper_ids": [
      4273,
      4276
    ],
    "papers_without_artifact_ids": [
      4277,
      4274,
      4275,
      4278,
      3382,
      4279
    ]
  },
  {
    "name": "Yupeng Zhang 0001",
    "display_name": "Yupeng Zhang",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Polynomial Commitment with a One-to-Many Prover and Applications",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1528,
    "paper_ids": [
      4280,
      1402
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingyu Li",
    "display_name": "Mingyu Li",
    "affiliation": "Institute of Software, Chinese Academy of Sciences",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "USENIXSEC": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2022": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "A Hardware-Software Co-design for Efficient Intra-Enclave Isolation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Encrypted Databases Made Secure Yet Maintainable",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bringing decentralized search to decentralized services",
        "conference": "OSDI",
        "year": 2021
      }
    ],
    "author_id": 1529,
    "paper_ids": [
      38,
      43
    ],
    "papers_without_artifact_ids": [
      72
    ]
  },
  {
    "name": "Thomas Ristenpart",
    "display_name": "Thomas Ristenpart",
    "affiliation": "University of Toronto",
    "artifact_count": 2,
    "total_papers": 16,
    "total_papers_by_conf": {
      "USENIXSEC": 16,
      "ATC": 0,
      "ACSAC": 0,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 2,
        "2023": 3,
        "2022": 4,
        "2025": 2,
        "2021": 3
      },
      "ATC": {},
      "ACSAC": {},
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 12.5,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Orca: Blocklisting in Sender-Anonymous Messaging",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Might I Get Pwned: A Second Generation Compromised Credential Checking Service",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a framework for abusability analysis the case of passkeys in interpersonal threat models",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "mitigating injection attacks against e2ee applications via viewbased partitioning",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "navigating traumatic stress reactions during computer security interventions",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "exploiting leakage in password managers via injection attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "account security interfaces important unintuitive and untrustworthy",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "the digitalsafety risks of financial technologies for survivors of intimate partner violence",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "araña discovering and characterizing password guessing attacks in practice",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "increasing adversarial uncertainty to scale private similarity testing",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "gossamer securely measuring passwordbased logins",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "the role of computer security customer support in helping survivors of intimate partner violence",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "partitioning oracle attacks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "searching encrypted data with sizelocked indexes",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "pancake frequency smoothing for encrypted data stores",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "the tools and tactics used in intimate partner surveillance an analysis of online infidelity forums",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1530,
    "paper_ids": [
      4281,
      2542
    ],
    "papers_without_artifact_ids": [
      2546,
      4282,
      4283,
      2756,
      4284,
      4285,
      2552,
      4286,
      2555,
      4287,
      4288,
      4289,
      2707,
      4290
    ]
  },
  {
    "name": "Roberta De Viti",
    "display_name": "Roberta De Viti",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "CoVault: Secure, Scalable Analytics of Personal Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1531,
    "paper_ids": [
      1966,
      1967
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Licheng Luo",
    "display_name": "Licheng Luo",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1532,
    "paper_ids": [
      1528,
      1819
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Roya Ensafi",
    "display_name": "Roya Ensafi",
    "affiliation": "University of Michigan",
    "artifact_count": 2,
    "total_papers": 13,
    "total_papers_by_conf": {
      "USENIXSEC": 8,
      "PETS": 3,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4,
        "2023": 2,
        "2022": 2
      },
      "PETS": {
        "2023": 1,
        "2025": 1,
        "2024": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 15.4,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Large-scale Investigation into Geodifferences in Mobile Apps",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Attacking Connection Tracking Frameworks as used by Virtual Private Networks",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the discriminative power of crosslayer rtts in fingerprinting proxy traffic",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "cenpush blockingresistant control channel using push notifications",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "modeling and detecting internet censorship events",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "calculatency leveraging crosslayer network latency measurements to detect proxyenabled abuse",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "fingerprinting obfuscated proxy traffic with encapsulated tls handshakes",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "digital discrimination of users in sanctioned states the case of the cuba embargo",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "bridging barriers a survey of challenges and priorities in the censorship circumvention landscape",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "certainty detecting dns manipulation at scale using tls certificates",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "all of them claim to be the best multiperspective study of vpn users and vpn providers",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "network responses to russias invasion of ukraine in 2022 a cautionary tale for internet freedom",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "openvpn is open to vpn fingerprinting",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1533,
    "paper_ids": [
      4186,
      4291
    ],
    "papers_without_artifact_ids": [
      4292,
      4293,
      4294,
      4295,
      890,
      4296,
      4297,
      4298,
      4299,
      4187,
      4300
    ]
  },
  {
    "name": "Akash Shah",
    "display_name": "Akash Shah",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1534,
    "paper_ids": [
      2533,
      2535
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexandra Dmitrienko",
    "display_name": "Alexandra Dmitrienko",
    "affiliation": "University of Würzburg",
    "artifact_count": 2,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 2,
      "WOOT": 0,
      "PETS": 0,
      "NDSS": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2018": 1,
        "2019": 1
      },
      "WOOT": {},
      "PETS": {},
      "NDSS": {
        "2024": 4
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TwinBreak: Jailbreaking LLM Security Alignments based on Twin Prompts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "crowdguard federated backdoor detection in federated learning",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "freqfed a frequency analysisbased approach for mitigating poisoning attacks in federated learning",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "automatic adversarial adaption for stealthy poisoning attacks in federated learning",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "mirageflow a new bandwidth inflation attack on tor",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "clearstamp a humanvisible and robust modelownership proof based on transposed model training",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "verify your labels trustworthy predictions and datasets via confidence scores",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "drsgx automated and adjustable sidechannel protection for sgx using data location randomization",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "smartor smarter tor with smart contracts improving resilience of topology distribution in the tor network",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 1535,
    "paper_ids": [
      1175,
      4301
    ],
    "papers_without_artifact_ids": [
      2308,
      2309,
      4302,
      4303,
      4304,
      4305,
      1237,
      4019
    ]
  },
  {
    "name": "Wen-jie Lu",
    "display_name": "Wen-jie Lu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bumblebee secure twoparty inference framework for large transformers",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "secure transformer inference made noninteractive",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "squirrel a scalable secure twoparty computation framework for training gradient boosting decision tree",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1536,
    "paper_ids": [
      4306,
      4307
    ],
    "papers_without_artifact_ids": [
      309,
      307,
      4308
    ]
  },
  {
    "name": "Cheng Hong 0001",
    "display_name": "Cheng Hong",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 0,
      "CHES": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {},
      "CHES": {
        "2025": 2
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GraphAce: Secure Two-Party Graph Analysis Achieving Communication Efficiency",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "xboot freexor gates for ckks with applications to transciphering",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "sok fhefriendly symmetric ciphers and transciphering",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "bumblebee secure twoparty inference framework for large transformers",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "accelerating secure collaborative machine learning with protocolaware rdma",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "efficient 3pc for binary circuits with application to maliciouslysecure dnn inference",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "squirrel a scalable secure twoparty computation framework for training gradient boosting decision tree",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1537,
    "paper_ids": [
      4306,
      2816
    ],
    "papers_without_artifact_ids": [
      4245,
      4246,
      309,
      3860,
      1896,
      4308
    ]
  },
  {
    "name": "Ana-Maria Cretu 0002",
    "display_name": "Ana-Maria Cretu",
    "affiliation": "EPFL",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2024": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a zero auxiliary knowledge membership inference attack on aggregate location data",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 1538,
    "paper_ids": [
      3303,
      3194
    ],
    "papers_without_artifact_ids": [
      3305
    ]
  },
  {
    "name": "Ya-Nan Li 0007",
    "display_name": "Ya-Nan Li",
    "affiliation": "University of Sydney",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Pisces: Private and Compliable Cryptocurrency Exchange",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1539,
    "paper_ids": [
      3308,
      3310
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chengbin Pang",
    "display_name": "Chengbin Pang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 2
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Ground Truth for Binary Disassembly is Not Easy",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Debloating Address Sanitizer",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mapping to bits efficiently detecting type confusion errors",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 1540,
    "paper_ids": [
      1754,
      1755
    ],
    "papers_without_artifact_ids": [
      4238
    ]
  },
  {
    "name": "Ruotong Yu",
    "display_name": "Ruotong Yu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ground Truth for Binary Disassembly is Not Easy",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1541,
    "paper_ids": [
      1754,
      1756
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mengjia Yan 0001",
    "display_name": "Mengjia Yan",
    "affiliation": "Massachusetts Inst. of Technology",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Oreo: Protecting ASLR Against Microarchitectural Attacks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cache telepathy leveraging shared resource attacks to learn dnn architectures",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1542,
    "paper_ids": [
      1818,
      4185
    ],
    "papers_without_artifact_ids": [
      3136
    ]
  },
  {
    "name": "Kerem Arikan",
    "display_name": "Kerem Arikan",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure Caches for Compartmentalized Software",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "teeshirt scalable leakagefree cache hierarchies for tees",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 1543,
    "paper_ids": [
      4309,
      4310
    ],
    "papers_without_artifact_ids": [
      4311
    ]
  },
  {
    "name": "Yu David Liu",
    "display_name": "Yu David Liu",
    "affiliation": "Binghamton University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "ATC": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure Caches for Compartmentalized Software",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "teeshirt scalable leakagefree cache hierarchies for tees",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 1544,
    "paper_ids": [
      4309,
      4310
    ],
    "papers_without_artifact_ids": [
      4311
    ]
  },
  {
    "name": "Dmitry Ponomarev 0001",
    "display_name": "Dmitry Ponomarev",
    "affiliation": "Binghamton University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure Caches for Compartmentalized Software",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "teeshirt scalable leakagefree cache hierarchies for tees",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 1545,
    "paper_ids": [
      4309,
      4310
    ],
    "papers_without_artifact_ids": [
      4311
    ]
  },
  {
    "name": "Tal Rabin",
    "display_name": "Tal Rabin",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2021": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Incremental Offline/Online PIR",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gage mpc bypassing residual function leakage for noninteractive mpc",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 1546,
    "paper_ids": [
      1077,
      138
    ],
    "papers_without_artifact_ids": [
      2465
    ]
  },
  {
    "name": "Xinyu Tang 0003",
    "display_name": "Xinyu Tang",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Machine Learning with Differentially Private Labels: Mechanisms and Frameworks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1547,
    "paper_ids": [
      130,
      133
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Milad Nasr",
    "display_name": "Milad Nasr",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2022": 1,
        "2021": 1
      },
      "PETS": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Machine Learning with Differentially Private Labels: Mechanisms and Frameworks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacy side channels in machine learning systems",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "tight auditing of differentially private machine learning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "extracting training data from diffusion models",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "defeating dnnbased traffic analysis systems in realtime with blind adversarial perturbations",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1548,
    "paper_ids": [
      130,
      133
    ],
    "papers_without_artifact_ids": [
      4312,
      4313,
      4314,
      892
    ]
  },
  {
    "name": "Steven Englehardt",
    "display_name": "Steven Englehardt",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 2
      },
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Khaleesi: Breaker of Advertising and Tracking Request Chains",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "no boundaries data exfiltration by third parties embedded on web pages",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 1549,
    "paper_ids": [
      805,
      806
    ],
    "papers_without_artifact_ids": [
      4315
    ]
  },
  {
    "name": "Marcel Böhme",
    "display_name": "Marcel Böhme",
    "affiliation": "Max Planck Society",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Stateful Greybox Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Large Language Model guided Protocol Fuzzing",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "uncovering the limits of machine learning for automatic vulnerability detection",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 7959,
    "paper_ids": [
      3295,
      3296
    ],
    "papers_without_artifact_ids": [
      4316
    ]
  },
  {
    "name": "Lucas Davi",
    "display_name": "Lucas Davi",
    "affiliation": "University of Duisburg-Essen",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ATC": 0,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "ATC": {},
      "ACSAC": {
        "2017": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Kintsugi: Secure Hotpatching for Code-Shadowing Real-Time Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "clepsydracache preventing cache attacks with timebased evictions",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "evmpatch timely and automated patching of ethereum smart contracts",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "teerex discovery and exploitation of memory corruption vulnerabilities in sgx enclaves",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "breaking and fixing destructive code read defenses",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 1551,
    "paper_ids": [
      107,
      3249
    ],
    "papers_without_artifact_ids": [
      1476,
      4317,
      4318,
      125
    ]
  },
  {
    "name": "Miti Mazmudar",
    "display_name": "Miti Mazmudar",
    "affiliation": "University of Waterloo",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Caring about Sharing: User Perceptions of Multiparty Data Sharing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mitigator: Privacy policy compliance using trusted hardware",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1552,
    "paper_ids": [
      1210,
      1285
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Johnny So",
    "display_name": "Johnny So",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Lost in the Mists of Time: Expirations in DNS Footprints of Mobile Apps",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1553,
    "paper_ids": [
      1113,
      1114
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peng Gao 0008",
    "display_name": "Peng Gao",
    "affiliation": "Virginia Tech",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 2
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivGuard: Privacy Regulation Compliance Made Easier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Back-Propagating System Dependency Impact for Attack Investigation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1554,
    "paper_ids": [
      3278,
      2494
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weiteng Chen",
    "display_name": "Weiteng Chen",
    "affiliation": "Microsoft Research",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 4,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2022": 2
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VeriSMo: A Verified Security Module for Confidential VMs",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "syzbridge bridging the gap in exploitability assessment of linux kernel bugs in the linux ecosystem",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "symbisect accurate bisection for fuzzerexposed vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "linkrid vetting imbalance reference counting in linux kernel with symbolic execution",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "koobe towards facilitating exploit generation of kernel outofbounds write vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1555,
    "paper_ids": [
      2220,
      2056
    ],
    "papers_without_artifact_ids": [
      2223,
      2224,
      2227,
      2231
    ]
  },
  {
    "name": "Mazharul Islam 0002",
    "display_name": "Mazharul Islam",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 2,
        "2025": 1
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Might I Get Pwned: A Second Generation Compromised Credential Checking Service",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Detecting Compromise of Passkey Storage on the Cloud",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "compact approximating complex activation functions for secure computation",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "araña discovering and characterizing password guessing attacks in practice",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "gossamer securely measuring passwordbased logins",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1556,
    "paper_ids": [
      2542,
      2543
    ],
    "papers_without_artifact_ids": [
      2548,
      2552,
      2555
    ]
  },
  {
    "name": "Christopher A. Wood",
    "display_name": "Christopher A. Wood",
    "affiliation": "Apple, USA",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Might I Get Pwned: A Second Generation Compromised Credential Checking Service",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Evaluating practical QUIC website fingerprinting defenses for the masses",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oblivious dns over https odoh a practical privacy enhancement to dns",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 1557,
    "paper_ids": [
      2542,
      972
    ],
    "papers_without_artifact_ids": [
      2945
    ]
  },
  {
    "name": "Joseph Bonneau",
    "display_name": "Joseph Bonneau",
    "affiliation": "New York University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1,
      "SOSP": 1,
      "CHES": 0,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2024": 1
      },
      "SOSP": {
        "2024": 1
      },
      "CHES": {},
      "NSDI": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Zero-Knowledge Middleboxes",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NOTRY: Deniable messaging with retroactive avowal",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "zombie middleboxes that dont snoop",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "nope strengthening domain authentication with succinct proofs",
        "conference": "SOSP",
        "year": 2024
      }
    ],
    "author_id": 1558,
    "paper_ids": [
      2869,
      3143
    ],
    "papers_without_artifact_ids": [
      2870,
      2871
    ]
  },
  {
    "name": "Max Mühlhäuser",
    "display_name": "Max Mühlhäuser",
    "affiliation": "TU Darmstadt",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 4,
      "EUROSYS": 2,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 2
      },
      "PETS": {
        "2022": 2,
        "2025": 1,
        "2024": 1
      },
      "EUROSYS": {
        "2023": 1,
        "2024": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Anonify: Decentralized Dual-level Anonymity for Medical Data Donation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "its not my data anymore exploring nonusers privacy perceptions of medical data donation apps",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "sponge inference serving with dynamic slos using inplace vertical scaling",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "reconciling high accuracy costefficiency and low latency of inference serving systems",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "you offer privacy like you offer tea investigating mechanisms for improving guest privacy in iotequipped households",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "userlevel label leakage from gradients in federated learning",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "investigating stateoftheart practices for fostering subjective trust in online voting through interviews",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 7960,
    "paper_ids": [
      4319,
      4320
    ],
    "papers_without_artifact_ids": [
      1246,
      4321,
      4322,
      4323,
      4324,
      4325
    ]
  },
  {
    "name": "Ren Pang",
    "display_name": "Ren Pang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Security Risks of AutoML",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Watch the Watchers! On the Security Risks of Robustness-Enhancing Diffusion Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the difficulty of defending contrastive learning against backdoor attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "on the security risks of knowledge graph reasoning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "graph backdoor",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1560,
    "paper_ids": [
      773,
      1538
    ],
    "papers_without_artifact_ids": [
      1546,
      785,
      1559
    ]
  },
  {
    "name": "Robert McLaughlin",
    "display_name": "Robert McLaughlin",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2,
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Regulator: Dynamic Analysis to Detect ReDoS",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Approve Once, Regret Forever: On the Exploitation of Ethereum's Approve-TransferFrom Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "not your type detecting storage collision vulnerabilities in ethereum smart contracts",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "a large scale study of the ethereum arbitrage ecosystem",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "confusum contractum confused deputy vulnerabilities in ethereum smart contracts",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1561,
    "paper_ids": [
      1151,
      1152
    ],
    "papers_without_artifact_ids": [
      1155,
      1158,
      1159
    ]
  },
  {
    "name": "Jean-Pierre Smith",
    "display_name": "Jean-Pierre Smith",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Website Fingerprinting in the Age of QUIC",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1562,
    "paper_ids": [
      132,
      139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexander Bulekov",
    "display_name": "Alexander Bulekov",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Morphuzz: Bending (Input) Space to Fuzz Virtual Devices",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Saphire: Sandboxing PHP Applications with Tailored System Call Allowlists",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hyperpill fuzzing for hypervisorbugs by leveraging the hardware virtualization interface",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1563,
    "paper_ids": [
      799,
      800
    ],
    "papers_without_artifact_ids": [
      22
    ]
  },
  {
    "name": "Reza Curtmola",
    "display_name": "Reza Curtmola",
    "affiliation": "NJIT",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Rethinking Trust in Forge-Based Git Security",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1564,
    "paper_ids": [
      4326,
      3911
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Corban Villa",
    "display_name": "Corban Villa",
    "affiliation": "University of California, Berkeley",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Exposing the Guardrails: Reverse-Engineering and Jailbreaking Safety Filters in DALL·E Text-to-Image Pipelines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ICSQuartz: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial Control Systems",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "media talks privacy unraveling a decade of privacy discourse around the world",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 1565,
    "paper_ids": [
      3075,
      2518
    ],
    "papers_without_artifact_ids": [
      3076
    ]
  },
  {
    "name": "Yue Duan",
    "display_name": "Yue Duan",
    "affiliation": "Singapore Management University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "CollisionRepair: First-Aid and Automated Patching for Storage Collision Vulnerabilities in Smart Contracts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an llmassisted easytotrigger backdoor attack on code completion models injecting disguised vulnerabilities against strong detection",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "proxy hunting understanding and characterizing proxybased upgradeable smart contracts in blockchains",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1566,
    "paper_ids": [
      4327,
      2275
    ],
    "papers_without_artifact_ids": [
      4328,
      4329
    ]
  },
  {
    "name": "Mu Zhang 0001",
    "display_name": "Mu Zhang",
    "affiliation": "University of Utah",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "CollisionRepair: First-Aid and Automated Patching for Storage Collision Vulnerabilities in Smart Contracts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VETEOS: Statically Vetting EOSIO Contracts for the \"Groundhog Day\" Vulnerabilities",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1567,
    "paper_ids": [
      4327,
      4330
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ningyu He",
    "display_name": "Ningyu He",
    "affiliation": "The Hong Kong Polytechnic University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 2
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Following Devils' Footprint: Towards Real-time Detection of Price Manipulation Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VETEOS: Statically Vetting EOSIO Contracts for the \"Groundhog Day\" Vulnerabilities",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "abusing the ethereum smart contract verification services for fun and profit",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "all your tokens are belong to us demystifying address verification vulnerabilities in solidity smart contracts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "eosafe security analysis of eosio smart contracts",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1568,
    "paper_ids": [
      3954,
      4330
    ],
    "papers_without_artifact_ids": [
      780,
      781,
      791
    ]
  },
  {
    "name": "Haoyu Wang",
    "display_name": "Haoyu Wang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Following Devils' Footprint: Towards Real-time Detection of Price Manipulation Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PRSA: Prompt Stealing Attacks against Real-World Prompt Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1569,
    "paper_ids": [
      3954,
      1541
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yijia Chang",
    "display_name": "Yijia Chang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1570,
    "paper_ids": [
      4331,
      4332
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Murtuza Jadliwala",
    "display_name": "Murtuza Jadliwala",
    "affiliation": "University of Texas at San Antonio",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2,
        "2021": 1
      },
      "PETS": {
        "2026": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LightShed: Defeating Perturbation-based Image Copyright Protections",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "linguistic hooks investigating the role of language triggers in phishing emails targeting african refugees and students",
        "conference": "PETS",
        "year": 2026
      },
      {
        "title": "voiceradar voice deepfake detection using microfrequency and compositional analysis",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "mirageflow a new bandwidth inflation attack on tor",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "acoustics to the rescue physical key inference attack revisited",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1571,
    "paper_ids": [
      4333,
      2303
    ],
    "papers_without_artifact_ids": [
      4334,
      2306,
      4303,
      4335
    ]
  },
  {
    "name": "Changjiang Li",
    "display_name": "Changjiang Li",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2025": 2
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Watch the Watchers! On the Security Risks of Robustness-Enhancing Diffusion Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PRSA: Prompt Stealing Attacks against Real-World Prompt Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improving the robustness of transformerbased large language models with dynamic attention",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "on the difficulty of defending contrastive learning against backdoor attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "on the security risks of knowledge graph reasoning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "seeing is living rethinking the security of facial liveness verification in the deepfake era",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1572,
    "paper_ids": [
      1538,
      1541
    ],
    "papers_without_artifact_ids": [
      1544,
      1546,
      785,
      1557
    ]
  },
  {
    "name": "Minkyoo Song",
    "display_name": "Minkyoo Song",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Refusal Is Not an Option: Unlearning Safety Alignment of Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1573,
    "paper_ids": [
      1717,
      4336
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hanna Kim",
    "display_name": "Hanna Kim",
    "affiliation": "Seoul National University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Refusal Is Not an Option: Unlearning Safety Alignment of Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tweezers a framework for security event detection via event attributioncentric tweet embedding",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "drainclog detecting rogue accounts with illegallyobtained nfts using classifiers learned on graphs",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 1574,
    "paper_ids": [
      1717,
      4336
    ],
    "papers_without_artifact_ids": [
      3158,
      4337
    ]
  },
  {
    "name": "Seungwon Shin 0001",
    "display_name": "Seungwon Shin",
    "affiliation": "KAIST",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ATC": 0,
      "ACSAC": 4,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      },
      "ATC": {},
      "ACSAC": {
        "2021": 1,
        "2022": 2,
        "2017": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 22.2,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Refusal Is Not an Option: Unlearning Safety Alignment of Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tweezers a framework for security event detection via event attributioncentric tweet embedding",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "drainclog detecting rogue accounts with illegallyobtained nfts using classifiers learned on graphs",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "prefetch for fun and profit a revisit of prefetch attacks on apple m1",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "heimdallr fingerprinting sdwan controlplane architecture via encrypted control traffic",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "closing the loophole rethinking reconstruction attacks in federated learning from a privacy standpoint",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "reinhardt realtime reconfigurable hardware architecture for regular expression matching in dpi",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "a securitymode for carriergrade sdn controllers",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 1575,
    "paper_ids": [
      1717,
      4336
    ],
    "papers_without_artifact_ids": [
      3158,
      4337,
      4338,
      4339,
      4340,
      4341,
      4241
    ]
  },
  {
    "name": "Xiaohu Yang 0001",
    "display_name": "Xiaohu Yang",
    "affiliation": "Zhejiang University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Activation Approximations Can Incur Safety Vulnerabilities in Aligned LLMs: Comprehensive Analysis and Defense",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof Delegation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secure transformer inference made noninteractive",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 1576,
    "paper_ids": [
      299,
      1905
    ],
    "papers_without_artifact_ids": [
      307
    ]
  },
  {
    "name": "Junkai Liang",
    "display_name": "Junkai Liang",
    "affiliation": "Peking University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Understanding zk-SNARKs: The Gap Between Research and Practice",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1577,
    "paper_ids": [
      3322,
      1396
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qingni Shen",
    "display_name": "Qingni Shen",
    "affiliation": "Peking University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "CHES": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "ACSAC": {
        "2021": 1
      },
      "CHES": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Understanding zk-SNARKs: The Gap Between Research and Practice",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "practical opcodebased fault attack on aesni",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "badnl backdoor attacks against nlp models with semanticpreserving improvements",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 1578,
    "paper_ids": [
      3322,
      1396
    ],
    "papers_without_artifact_ids": [
      1692,
      209
    ]
  },
  {
    "name": "Zhonghai Wu",
    "display_name": "Zhonghai Wu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Understanding zk-SNARKs: The Gap Between Research and Practice",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "badnl backdoor attacks against nlp models with semanticpreserving improvements",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 1579,
    "paper_ids": [
      3322,
      1396
    ],
    "papers_without_artifact_ids": [
      209
    ]
  },
  {
    "name": "Chenhao Lin",
    "display_name": "Chenhao Lin",
    "affiliation": "Xi'an Jiaotong University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Revisiting Training-Inference Trigger Intensity in Backdoor Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Pretender: Universal Active Defense against Diffusion Finetuning Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "kenku towards efficient and stealthy blackbox adversarial attacks against asr systems",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1580,
    "paper_ids": [
      3312,
      1540
    ],
    "papers_without_artifact_ids": [
      570
    ]
  },
  {
    "name": "Daoyuan Wu",
    "display_name": "Daoyuan Wu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ATC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      },
      "ATC": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input Generators",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "propertygpt llmdriven formal verification of smart contracts through retrievalaugmented property generation",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "using my functions should follow my checks understanding and detecting insecure openzeppelin code in smart contracts",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1581,
    "paper_ids": [
      949,
      950
    ],
    "papers_without_artifact_ids": [
      3127,
      3128
    ]
  },
  {
    "name": "Zongjie Li",
    "display_name": "Zongjie Li",
    "affiliation": "Hong Kong University of Science and Technology",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input Generators",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1582,
    "paper_ids": [
      949,
      950
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junpeng Wan",
    "display_name": "Junpeng Wan",
    "affiliation": "Purdue University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HubBub: Contention-Based Side-Channel Attacks on USB Hubs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Userspace Bypass: Accelerating Syscall-intensive Applications",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1583,
    "paper_ids": [
      4180,
      3053
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yanxiang Bi",
    "display_name": "Yanxiang Bi",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HubBub: Contention-Based Side-Channel Attacks on USB Hubs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Userspace Bypass: Accelerating Syscall-intensive Applications",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1584,
    "paper_ids": [
      4180,
      3053
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ning Yu 0006",
    "display_name": "Ning Yu",
    "affiliation": "Netflix Eyeline Studios",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Meme to Threat: On the Hateful Meme Understanding and Induced Hateful Content Generation in Open-Source Vision Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unganable defending against ganbased face manipulation",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1585,
    "paper_ids": [
      181,
      184
    ],
    "papers_without_artifact_ids": [
      205
    ]
  },
  {
    "name": "Yun Shen",
    "display_name": "Yun Shen",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 8,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 2,
        "2022": 2,
        "2025": 2
      },
      "ACSAC": {
        "2017": 1,
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream Applications",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "quantifying privacy risks of prompts in visual prompt learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "instruction backdoor attacks against customized llms",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a plot is worth a thousand words model information stealing attacks via scientific plots",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "one size does not fit all quantifying the risk of malicious app encounters for different android user profiles",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "a largescale temporal measurement of android malicious apps persistence migration and lessons learned",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "inference attacks against graph neural networks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "the tangled genealogy of iot malware",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "marmite spreading malicious file reputation through download graphs",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 1586,
    "paper_ids": [
      181,
      191
    ],
    "papers_without_artifact_ids": [
      198,
      200,
      204,
      3986,
      2423,
      208,
      4342,
      2427
    ]
  },
  {
    "name": "Junlin Liu",
    "display_name": "Junlin Liu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 3
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition Algorithms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Robust, Efficient, and Widely Available Greybox Fuzzing for COTS Binaries with System Call Pattern Feedback",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i can tell your secrets inferring privacy attributes from miniapp interaction history in superapps",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 1587,
    "paper_ids": [
      2974,
      4343
    ],
    "papers_without_artifact_ids": [
      4344
    ]
  },
  {
    "name": "Yao Zhang",
    "display_name": "Yao Zhang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition Algorithms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "H2O2RAM: A High-Performance Hierarchical Doubly Oblivious RAM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i know what you asked prompt leakage via kvcache sharing in multitenant llm serving",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "waven webassembly memory virtualization for enclaves",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 1588,
    "paper_ids": [
      2974,
      2524
    ],
    "papers_without_artifact_ids": [
      369,
      370
    ]
  },
  {
    "name": "Zhou Zhang 0016",
    "display_name": "Zhou Zhang",
    "affiliation": "Beihang University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1589,
    "paper_ids": [
      2565,
      2567
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bo Zhang",
    "display_name": "Bo Zhang",
    "affiliation": "Northwestern Polytechnical University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "SC": 0,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "SC": {},
      "ATC": {},
      "FAST": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TAPAS: An Efficient Online APT Detection with Task-guided Process Provenance Graph Segmentation and Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flacio flat and collective io for container image service",
        "conference": "FAST",
        "year": 2025
      }
    ],
    "author_id": 1590,
    "paper_ids": [
      2565,
      1125
    ],
    "papers_without_artifact_ids": [
      4345
    ]
  },
  {
    "name": "Yier Jin",
    "display_name": "Yier Jin",
    "affiliation": "University of Florida",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "voltschemer use voltage noise to manipulate your wireless charger",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "breaking secure pairing of bluetooth low energy using downgrade attacks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1591,
    "paper_ids": [
      2565,
      2567
    ],
    "papers_without_artifact_ids": [
      4346,
      397
    ]
  },
  {
    "name": "Zhenyu Guan 0002",
    "display_name": "Zhenyu Guan",
    "affiliation": "Beihang University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1592,
    "paper_ids": [
      2565,
      2567
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Doowon Kim",
    "display_name": "Doowon Kim",
    "affiliation": "University of Tennessee",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sharing cyber threat intelligence: Does it really help?",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an llmassisted easytotrigger backdoor attack on code completion models injecting disguised vulnerabilities against strong detection",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1593,
    "paper_ids": [
      1122,
      1126
    ],
    "papers_without_artifact_ids": [
      4328
    ]
  },
  {
    "name": "Zihang Xiang",
    "display_name": "Zihang Xiang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One Run",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Lifecycle Unlearning Commitment Management: Measuring Sample-level Unlearning Completeness",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1594,
    "paper_ids": [
      896,
      463
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haoyu Wang 0001",
    "display_name": "Haoyu Wang",
    "affiliation": "HUST",
    "artifact_count": 2,
    "total_papers": 11,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "NDSS": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 2,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 4,
        "2025": 1
      }
    },
    "artifact_rate": 18.2,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VoiceWukong: Benchmarking Deepfake Voice Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VETEOS: Statically Vetting EOSIO Contracts for the \"Groundhog Day\" Vulnerabilities",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "be careful of what you embed demystifying ole vulnerabilities",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "masterkey automated jailbreaking of large language model chatbots",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "abusing the ethereum smart contract verification services for fun and profit",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "nodlink an online system for finegrained apt attack detection and investigation",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "all your tokens are belong to us demystifying address verification vulnerabilities in solidity smart contracts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "exploring covert thirdparty identifiers through external storage in the android new era",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "mtsan a feasible and practical memory sanitizer for fuzzing cots binaries",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "distdet a costeffective distributed cyber threat detection system",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "eosafe security analysis of eosio smart contracts",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1595,
    "paper_ids": [
      4347,
      4330
    ],
    "papers_without_artifact_ids": [
      777,
      739,
      780,
      4348,
      781,
      4349,
      915,
      783,
      791
    ]
  },
  {
    "name": "Habiba Farrukh",
    "display_name": "Habiba Farrukh",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "PETS": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1,
        "2022": 1,
        "2025": 2
      },
      "PETS": {
        "2023": 1,
        "2024": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 22.2,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Shadowed Realities: An Investigation of UI Attacks in WebXR",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Scoop: Mitigation of Recapture Attacks on Provenance-Based Media Authentication",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the dark side of ecommerce dropshipping abuse as a business model",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "physical sidechannel attacks against intermittent devices",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "attention please an investigation of the app tracking transparency permission",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "understanding the security and privacy implications of online toxic content on refugees",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "istelan disclosing sensitive user information by mobile magnetometer from finger touches",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "locin inferring semantic location from spatial maps in mixed reality",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "sara secure android remote authorization",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1596,
    "paper_ids": [
      1731,
      1176
    ],
    "papers_without_artifact_ids": [
      1736,
      1737,
      1741,
      1740,
      1742,
      1746,
      1748
    ]
  },
  {
    "name": "Sanjam Garg",
    "display_name": "Sanjam Garg",
    "affiliation": "Univ. of California - Berkeley",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "PETS": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Mempool Privacy via One-time Setup Batched Threshold Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Deletion inference, reconstruction, and compliance in machine (un)learning",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sublonk sublinear prover plonk",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "mempool privacy via batched threshold encryption attacks and defenses",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "zksaas zeroknowledge snarks as a service",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1597,
    "paper_ids": [
      4350,
      4351
    ],
    "papers_without_artifact_ids": [
      4352,
      4353,
      4354
    ]
  },
  {
    "name": "Chuan Yue",
    "display_name": "Chuan Yue",
    "affiliation": "Colorado School of Mines",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2,
      "ATC": 0,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2020": 1,
        "2022": 1
      },
      "ATC": {},
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective PII Extraction from LLMs through Augmented Few-Shot Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploring the privacy concerns of bystanders in smart homes from the perspectives of both owners and bystanders",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "mining least privilege attribute based access control policies",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 1598,
    "paper_ids": [
      3113,
      4355
    ],
    "papers_without_artifact_ids": [
      4356,
      4357
    ]
  },
  {
    "name": "Cong Wu 0003",
    "display_name": "Cong Wu",
    "affiliation": "Wuhan University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2025": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "liveness is not enough enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1599,
    "paper_ids": [
      3125,
      734
    ],
    "papers_without_artifact_ids": [
      1425
    ]
  },
  {
    "name": "Zhibo Wang 0001",
    "display_name": "Zhibo Wang",
    "affiliation": "Zhejiang University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: On Gradient Leakage in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "daap privacypreserving model accuracy estimation on unlabeled datasets through distributionaware adversarial perturbation",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "faceobfuscator defending deep learningbased privacy attacks with gradient descentresistant features in face recognition",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1600,
    "paper_ids": [
      300,
      302
    ],
    "papers_without_artifact_ids": [
      4358,
      316
    ]
  },
  {
    "name": "Jiahui Hu",
    "display_name": "Jiahui Hu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SoK: On Gradient Leakage in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "faceobfuscator defending deep learningbased privacy attacks with gradient descentresistant features in face recognition",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1601,
    "paper_ids": [
      300,
      302
    ],
    "papers_without_artifact_ids": [
      316
    ]
  },
  {
    "name": "Zuchao Ma",
    "display_name": "Zuchao Ma",
    "affiliation": "Nanjing University of Aeronautics and Astronautics, China",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automated Soundness and Completeness Vetting of Polygon zkEVM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1602,
    "paper_ids": [
      688,
      366
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Feng Luo",
    "display_name": "Feng Luo",
    "affiliation": "The Hong Kong Polytechnic University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "FAST": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "maat analyzing and optimizing overcharge on blockchain storage",
        "conference": "FAST",
        "year": 2025
      }
    ],
    "author_id": 1603,
    "paper_ids": [
      688,
      774
    ],
    "papers_without_artifact_ids": [
      775
    ]
  },
  {
    "name": "Zachary Espiritu",
    "display_name": "Zachary Espiritu",
    "affiliation": "MongoDB Research",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PolySys: an Algebraic Leakage Attack Engine",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Attacks on Encrypted Response-Hiding Range Search Schemes in Multiple Dimensions",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "time and spaceefficient aggregate range queries over encrypted databases",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 1604,
    "paper_ids": [
      4359,
      3358
    ],
    "papers_without_artifact_ids": [
      4360
    ]
  },
  {
    "name": "Seny Kamara",
    "display_name": "Seny Kamara",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1,
      "EUROSYS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2024": 1
      },
      "EUROSYS": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PolySys: an Algebraic Leakage Attack Engine",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MAPLE: MArkov Process Leakage attacks on Encrypted Search",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1605,
    "paper_ids": [
      4359,
      4361
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tarik Moataz",
    "display_name": "Tarik Moataz",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1,
      "EUROSYS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2024": 1
      },
      "EUROSYS": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PolySys: an Algebraic Leakage Attack Engine",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MAPLE: MArkov Process Leakage attacks on Encrypted Search",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1606,
    "paper_ids": [
      4359,
      4361
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrew Park",
    "display_name": "Andrew Park",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PolySys: an Algebraic Leakage Attack Engine",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MAPLE: MArkov Process Leakage attacks on Encrypted Search",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1607,
    "paper_ids": [
      4359,
      4361
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Harshad Sathaye",
    "display_name": "Harshad Sathaye",
    "affiliation": "Northeastern University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 2
      },
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GNSS-WASP: GNSS Wide Area SPoofing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LEO-Range: Physical Layer Design for Secure Ranging with Low Earth Orbiting Satellites",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the implications of spoofing and jamming aviation datalink applications",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "an experimental study of gps spoofing and takeover attacks on uavs",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1608,
    "paper_ids": [
      1224,
      1225
    ],
    "papers_without_artifact_ids": [
      4362,
      1763
    ]
  },
  {
    "name": "Geng Hong",
    "display_name": "Geng Hong",
    "affiliation": "Fudan University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "NDSS": {
        "2025": 3
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "misdirection of trust demystifying the abuse of dedicated url shortening service",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "hades attack understanding and evaluating manipulation risks of email blocklists",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "revealing the black box of device search engine scanning assets strategies and ethical consideration",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 1609,
    "paper_ids": [
      232,
      242
    ],
    "papers_without_artifact_ids": [
      243,
      247,
      245
    ]
  },
  {
    "name": "Mingxuan Liu 0006",
    "display_name": "Mingxuan Liu",
    "affiliation": "Zhongguancun Laboratory, Beijing, China",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 2
      },
      "ACSAC": {
        "2021": 1,
        "2019": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding the implementation and security implications of protective dns services",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "tickets or privacy understand the ecosystem of chinese ticket grabbing apps",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "into the dark unveiling internal site search abused for black hat seo",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "detecting and characterizing sms spearphishing attacks",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "casino royale a deep exploration of illegal online gambling",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 1610,
    "paper_ids": [
      232,
      242
    ],
    "papers_without_artifact_ids": [
      909,
      911,
      914,
      918,
      3059
    ]
  },
  {
    "name": "Ardalan Amiri Sani",
    "display_name": "Ardalan Amiri Sani",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1,
        "2021": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scoop: Mitigation of Recapture Attacks on Provenance-Based Media Authentication",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Undo Workarounds for Kernel Bugs",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gleefuzz fuzzing webgl through error message guided mutation",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1611,
    "paper_ids": [
      1176,
      2221
    ],
    "papers_without_artifact_ids": [
      25
    ]
  },
  {
    "name": "Min Chen 0032",
    "display_name": "Min Chen",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2,
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lmsanitator defending prompttuning against taskagnostic backdoors",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "privgraph differentially private graph data publication by exploiting community information",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "faceauditor data auditing in facial recognition systems",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "inference attacks against graph neural networks",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1612,
    "paper_ids": [
      2328,
      1542
    ],
    "papers_without_artifact_ids": [
      2329,
      2330,
      203,
      208
    ]
  },
  {
    "name": "Zhongyun Hua",
    "display_name": "Zhongyun Hua",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Atkscopes: Multiresolution Adversarial Perturbation as a Unified Attack on Perceptual Hashing and Beyond",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1613,
    "paper_ids": [
      1561,
      4363
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tao Xiang 0001",
    "display_name": "Tao Xiang",
    "affiliation": "Virginia Tech",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "impact tracing identifying the culprit of misinformation in encrypted messaging systems",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 1614,
    "paper_ids": [
      1561,
      4364
    ],
    "papers_without_artifact_ids": [
      4365
    ]
  },
  {
    "name": "Jin-Dong Dong",
    "display_name": "Jin-Dong Dong",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Blockchain Address Poisoning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on recruiting and retaining users for securitysensitive longitudinal measurement panels",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1615,
    "paper_ids": [
      3291,
      3148
    ],
    "papers_without_artifact_ids": [
      3294
    ]
  },
  {
    "name": "Aaron Johnson 0001",
    "display_name": "Aaron Johnson",
    "affiliation": "University of Kentucky",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 3,
      "NDSS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2020": 1,
        "2023": 1,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {},
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Censorship Evasion with Unidentified Protocol Generation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TEEMS: A Trusted Execution Environment based Metadata-protected Messaging System",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "throwing your weight around fixing tors positional weighting",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "editors introduction",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "editors introduction",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 1616,
    "paper_ids": [
      1141,
      1287
    ],
    "papers_without_artifact_ids": [
      4366,
      810,
      810
    ]
  },
  {
    "name": "Binghui Wang",
    "display_name": "Binghui Wang",
    "affiliation": "Illinois Institute of Technology",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 3
      },
      "ACSAC": {
        "2021": 1,
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AGNNCert: Defending Graph Neural Networks against Arbitrary Perturbations with Deterministic Certification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "poisonedrag knowledge corruption attacks to retrievalaugmented generation of large language models",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "inf2guard an informationtheoretic framework for learning privacypreserving representations against inference attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "neuguard lightweight neuronguided defense against membership inference attacks",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "on detecting growingup behaviors of malicious accounts in privacycentric mobile social networks",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 1617,
    "paper_ids": [
      4367,
      3260
    ],
    "papers_without_artifact_ids": [
      3326,
      4368,
      4369,
      575
    ]
  },
  {
    "name": "Ting Yu 0001",
    "display_name": "Ting Yu",
    "affiliation": "MBZUAI",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 0,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2,
        "2021": 2
      },
      "ACSAC": {},
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LLMxCPG: Context-Aware Vulnerability Detection Through Code Property Graph-Guided Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "detecting and mitigating sampling bias in cybersecurity with unlabeled data",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "compromised or attackerowned a large scale classification and study of hosting domains of malicious urls",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "eosafe security analysis of eosio smart contracts",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1618,
    "paper_ids": [
      4370,
      4371
    ],
    "papers_without_artifact_ids": [
      4372,
      4373,
      791
    ]
  },
  {
    "name": "Issa Khalil",
    "display_name": "Issa Khalil",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LLMxCPG: Context-Aware Vulnerability Detection Through Code Property Graph-Guided Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "detecting and mitigating sampling bias in cybersecurity with unlabeled data",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "compromised or attackerowned a large scale classification and study of hosting domains of malicious urls",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1619,
    "paper_ids": [
      4370,
      4371
    ],
    "papers_without_artifact_ids": [
      4372,
      4373
    ]
  },
  {
    "name": "Xinyue Shen 0001",
    "display_name": "Xinyue Shen",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Meme to Threat: On the Hateful Meme Understanding and Induced Hateful Content Generation in Open-Source Vision Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "prompt stealing attacks against texttoimage generation models",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "evil under the sun understanding and discovering attacks on ethereum decentralized applications",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1620,
    "paper_ids": [
      182,
      184
    ],
    "papers_without_artifact_ids": [
      197,
      613
    ]
  },
  {
    "name": "Savvas Zannettou",
    "display_name": "Savvas Zannettou",
    "affiliation": "TU Delft",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Meme to Threat: On the Hateful Meme Understanding and Induced Hateful Content Generation in Open-Source Vision Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1621,
    "paper_ids": [
      182,
      184
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tian Chen",
    "display_name": "Tian Chen",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1622,
    "paper_ids": [
      233,
      238
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Letian Yuan",
    "display_name": "Letian Yuan",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1623,
    "paper_ids": [
      233,
      238
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Youkun Shi",
    "display_name": "Youkun Shi",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "backporting security patches of web applications a prototype design and implementation on injection vulnerability patches",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1624,
    "paper_ids": [
      233,
      236
    ],
    "papers_without_artifact_ids": [
      252
    ]
  },
  {
    "name": "Jiqiang Liu",
    "display_name": "Jiqiang Liu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Risk to Resilience: Towards Assessing and Mitigating the Risk of Data Reconstruction Attacks in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lurking in the shadows unveiling stealthy backdoor attacks against personalized federated learning",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1625,
    "paper_ids": [
      4374,
      1424
    ],
    "papers_without_artifact_ids": [
      4375
    ]
  },
  {
    "name": "Georgios Smaragdakis",
    "display_name": "Georgios Smaragdakis",
    "affiliation": "TU Delft",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "EUROSYS": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "EUROSYS": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Trust but Verify: An Assessment of Vulnerability Tagging Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Catch-22: Uncovering Compromised Hosts using SSH Public Keys",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ladder multiobjective backdoor attack via evolutionary algorithm",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 1626,
    "paper_ids": [
      3336,
      2928
    ],
    "papers_without_artifact_ids": [
      2288
    ]
  },
  {
    "name": "Yury Zhauniarovich",
    "display_name": "Yury Zhauniarovich",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 3
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Trust but Verify: An Assessment of Vulnerability Tagging Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "EvilEDR: Repurposing EDR as an Offensive Tool",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "high stakes low certainty evaluating the efficacy of highlevel indicators of compromise in ransomware attribution",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "the unpatchables why municipalities persist in running vulnerable hosts",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1627,
    "paper_ids": [
      3336,
      3337
    ],
    "papers_without_artifact_ids": [
      3340,
      3344
    ]
  },
  {
    "name": "Baoxiang Jiang",
    "display_name": "Baoxiang Jiang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sometimes Simpler is Better: A Comprehensive Analysis of State-of-the-Art Provenance-Based Intrusion Detection Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1628,
    "paper_ids": [
      4376,
      4377
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tristan Bilot",
    "display_name": "Tristan Bilot",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sometimes Simpler is Better: A Comprehensive Analysis of State-of-the-Art Provenance-Based Intrusion Detection Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1629,
    "paper_ids": [
      4376,
      4377
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nour El Madhoun",
    "display_name": "Nour El Madhoun",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sometimes Simpler is Better: A Comprehensive Analysis of State-of-the-Art Provenance-Based Intrusion Detection Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1630,
    "paper_ids": [
      4376,
      4377
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Khaldoun Al Agha",
    "display_name": "Khaldoun Al Agha",
    "affiliation": "LRI, University of Paris XI, Orsay Cedex, France",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sometimes Simpler is Better: A Comprehensive Analysis of State-of-the-Art Provenance-Based Intrusion Detection Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1631,
    "paper_ids": [
      4376,
      4377
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anis Zouaoui",
    "display_name": "Anis Zouaoui",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sometimes Simpler is Better: A Comprehensive Analysis of State-of-the-Art Provenance-Based Intrusion Detection Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1632,
    "paper_ids": [
      4376,
      4377
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas Pasquier",
    "display_name": "Thomas Pasquier",
    "affiliation": "University of British Columbia",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Sometimes Simpler is Better: A Comprehensive Analysis of State-of-the-Art Provenance-Based Intrusion Detection Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fetchbpf customizable prefetching policies in linux with ebpf",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 1633,
    "paper_ids": [
      4376,
      4377
    ],
    "papers_without_artifact_ids": [
      4378
    ]
  },
  {
    "name": "Fabian Fischer 0009",
    "display_name": "Fabian Fischer",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How Transparent is Usable Privacy and Security Research? A Meta-Study on Current Research Transparency Practices",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1634,
    "paper_ids": [
      1242,
      1245
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jan-Ulrich Holtgrave",
    "display_name": "Jan-Ulrich Holtgrave",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How Transparent is Usable Privacy and Security Research? A Meta-Study on Current Research Transparency Practices",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1635,
    "paper_ids": [
      1242,
      1245
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Florian Schaub",
    "display_name": "Florian Schaub",
    "affiliation": "University of Michigan",
    "artifact_count": 2,
    "total_papers": 15,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "PETS": 9,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1,
        "2025": 1,
        "2021": 3
      },
      "PETS": {
        "2020": 1,
        "2022": 1,
        "2023": 2,
        "2025": 2,
        "2024": 1,
        "2021": 1,
        "2026": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 13.3,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How Transparent is Usable Privacy and Security Research? A Meta-Study on Current Research Transparency Practices",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Increasing Adoption of Tor Browser Using Informational and Planning Nudges",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how we define privacy literacy teaching experiences challenges of communityengaged privacy educators",
        "conference": "PETS",
        "year": 2026
      },
      {
        "title": "usercentric textual descriptions of privacyenhancing technologies for ad tracking and analytics",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "misalignments and demographic differences in expected and actual privacy settings on facebook",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "crosscontextual examination of older adults privacy concerns behaviors and vulnerabilities",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "privacy rarely considered exploring considerations in the adoption of thirdparty services by websites",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "researchers experiences in analyzing privacy policies challenges and opportunities",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "aunties strangers and the fbi online privacy concerns and experiences of muslimamerican women",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "awareness adoption and misconceptions of web privacy tools",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "now im a bit angry individuals awareness perception and responses to data breaches that affected them",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "the role of computer security customer support in helping survivors of intimate partner violence",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "its stressful having all these phones investigating sex workers safety goals risks and practices online",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "listen only when spoken to interpersonal communication cues as smart speaker privacy controls",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "from intent to action nudging users towards secure mobile payments",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1636,
    "paper_ids": [
      1242,
      2500
    ],
    "papers_without_artifact_ids": [
      4379,
      4380,
      4381,
      4030,
      116,
      4382,
      4383,
      2513,
      874,
      4287,
      1276,
      4384,
      2514
    ]
  },
  {
    "name": "Junming Chen",
    "display_name": "Junming Chen",
    "affiliation": "George Mason University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Rowhammer-Based Trojan Injection: One Bit Flip Is Sufficient for Backdooring DNNs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple AirTag Without Root Privileges",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1637,
    "paper_ids": [
      4385,
      4386
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lannan Luo",
    "display_name": "Lannan Luo",
    "affiliation": "George Mason University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 2
      },
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Rowhammer-Based Trojan Injection: One Bit Flip Is Sufficient for Backdooring DNNs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple AirTag Without Root Privileges",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "from one thousand pages of specification to unveiling hidden bugs large language model assisted fuzzing of matter iot devices",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "can a deep learning model for one architecture be used for others retargetedarchitecture binary code analysis",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "westworld fuzzingassisted remote dynamic symbolic execution of smart apps on iot cloud platforms",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 1638,
    "paper_ids": [
      4385,
      4386
    ],
    "papers_without_artifact_ids": [
      4387,
      4388,
      4389
    ]
  },
  {
    "name": "Qiang Zeng 0001",
    "display_name": "Qiang Zeng",
    "affiliation": "George Mason University",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 2,
        "2025": 2,
        "2021": 1
      },
      "ACSAC": {
        "2021": 1,
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 22.2,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Rowhammer-Based Trojan Injection: One Bit Flip Is Sufficient for Backdooring DNNs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple AirTag Without Root Privileges",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "do you see how i pose using poses as an implicit authentication factor for qr code payment",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "from one thousand pages of specification to unveiling hidden bugs large language model assisted fuzzing of matter iot devices",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "can a deep learning model for one architecture be used for others retargetedarchitecture binary code analysis",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "detecting and handling iot interaction threats in multiplatform multicontrolchannel smart homes",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "westworld fuzzingassisted remote dynamic symbolic execution of smart apps on iot cloud platforms",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "hawatcher semanticsaware anomaly detection for appified smart homes",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "attacking graphbased classification without changing existing connections",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 1639,
    "paper_ids": [
      4385,
      4386
    ],
    "papers_without_artifact_ids": [
      4390,
      4387,
      4388,
      4391,
      4389,
      4392,
      4393
    ]
  },
  {
    "name": "Mingyuan Fan 0003",
    "display_name": "Mingyuan Fan",
    "affiliation": "East China Normal University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Boosting Gradient Leakage Attacks: Data Reconstruction in Realistic FL Settings",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1640,
    "paper_ids": [
      838,
      4394
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cen Chen 0001",
    "display_name": "Cen Chen",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Boosting Gradient Leakage Attacks: Data Reconstruction in Realistic FL Settings",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1641,
    "paper_ids": [
      838,
      4394
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kai-Hsiang Chou",
    "display_name": "Kai-Hsiang Chou",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2025,
      2026
    ],
    "year_range": "2025-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Bots can Snoop: Uncovering and Mitigating Privacy Risks of Bots in Group Chats",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Bot Among Us: Exploring User Awareness and Privacy Concerns About Chatbots in Group Chats",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1642,
    "paper_ids": [
      3352,
      3353
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yi-An Wang",
    "display_name": "Yi-An Wang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2025,
      2026
    ],
    "year_range": "2025-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Bots can Snoop: Uncovering and Mitigating Privacy Risks of Bots in Group Chats",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Bot Among Us: Exploring User Awareness and Privacy Concerns About Chatbots in Group Chats",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1643,
    "paper_ids": [
      3352,
      3353
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hiraku Morita",
    "display_name": "Hiraku Morita",
    "affiliation": "University of St. Gallen",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MAESTRO: Multi-Party AES Using Lookup Tables",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Constant-Round Private Decision Tree Evaluation for Secret Shared Data",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "adam in private secure and fast training of deep neural networks with adaptive moment estimation",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 1644,
    "paper_ids": [
      4395,
      4396
    ],
    "papers_without_artifact_ids": [
      4397
    ]
  },
  {
    "name": "Kazunari Tozawa",
    "display_name": "Kazunari Tozawa",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MAESTRO: Multi-Party AES Using Lookup Tables",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Constant-Round Private Decision Tree Evaluation for Secret Shared Data",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1645,
    "paper_ids": [
      4395,
      4396
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu-Jye Tung",
    "display_name": "Yu-Jye Tung",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hercules Droidot and the murder on the JNI Express",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Mixed-Methods Study of Open-Source Software Maintainers On Vulnerability Management and Platform Security Features",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1646,
    "paper_ids": [
      14,
      4398
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jessy Ayala",
    "display_name": "Jessy Ayala",
    "affiliation": "University of California, Irvine",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hercules Droidot and the murder on the JNI Express",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Mixed-Methods Study of Open-Source Software Maintainers On Vulnerability Management and Platform Security Features",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1647,
    "paper_ids": [
      14,
      4398
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joshua Garcia",
    "display_name": "Joshua Garcia",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hercules Droidot and the murder on the JNI Express",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Mixed-Methods Study of Open-Source Software Maintainers On Vulnerability Management and Platform Security Features",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1648,
    "paper_ids": [
      14,
      4398
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Konrad Wolsing",
    "display_name": "Konrad Wolsing",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "powerduck a goose data set of cyberattacks in substations",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1649,
    "paper_ids": [
      2983,
      3090
    ],
    "papers_without_artifact_ids": [
      2985
    ]
  },
  {
    "name": "Xinyi Huang 0001",
    "display_name": "Xinyi Huang",
    "affiliation": "Boise State University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Purity to Peril: Backdooring Merged Models From \"Harmless\" Benign Components",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1650,
    "paper_ids": [
      4332,
      2569
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jian Weng 0001",
    "display_name": "Jian Weng",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 0,
      "CHES": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2025": 2
      },
      "ACSAC": {},
      "CHES": {
        "2024": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hints from hertz dynamic frequency scaling sidechannel analysis of number theoretic transform in latticebased kems",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "prisrv privacyenhanced and highly usable service discovery in wireless communications",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "breaking secure pairing of bluetooth low energy using downgrade attacks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1651,
    "paper_ids": [
      4332,
      445
    ],
    "papers_without_artifact_ids": [
      4127,
      3071,
      397
    ]
  },
  {
    "name": "Zihao Li 0001",
    "display_name": "Zihao Li",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "FAST": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated Soundness and Completeness Vetting of Polygon zkEVM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "maat analyzing and optimizing overcharge on blockchain storage",
        "conference": "FAST",
        "year": 2025
      }
    ],
    "author_id": 1652,
    "paper_ids": [
      366,
      774
    ],
    "papers_without_artifact_ids": [
      775
    ]
  },
  {
    "name": "Sylvain Ruhault",
    "display_name": "Sylvain Ruhault",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "A Tale of Two Worlds, a Formal Story of WireGuard Hybridization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Unified Symbolic Analysis of WireGuard",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1653,
    "paper_ids": [
      3138,
      3139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qingchuan Zhao",
    "display_name": "Qingchuan Zhao",
    "affiliation": "City University of Hong Kong",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2025": 3
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "nonintrusive and unconstrained keystroke inference in vr platforms via infrared side channel",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "a thorough security analysis of ble proximity tracking protocols",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "eavesdropping mobile app activity via radiofrequency energy harvesting",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "firmscope automatic uncovering of privilegeescalation vulnerabilities in preinstalled apps in android firmware",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1654,
    "paper_ids": [
      2488,
      1563
    ],
    "papers_without_artifact_ids": [
      2526,
      2489,
      4399,
      399
    ]
  },
  {
    "name": "Weili Han",
    "display_name": "Weili Han",
    "affiliation": "Fudan University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 2
      },
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "HawkEye: Statically and Accurately Profiling the Communication Cost of Models in Multi-party Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improving realworld password guessing attacks via bidirectional transformers",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "digit semantics based optimization for practical password cracking tools",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 1656,
    "paper_ids": [
      4400,
      3323
    ],
    "papers_without_artifact_ids": [
      4401,
      4402
    ]
  },
  {
    "name": "Peng Deng",
    "display_name": "Peng Deng",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply Chains",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1657,
    "paper_ids": [
      235,
      240
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xuhua Ding",
    "display_name": "Xuhua Ding",
    "affiliation": "Singapore Management University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "ACSAC": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TETD: Trusted Execution in Trust Domains",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Oblivious Digital Tokens",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scrutinizer towards secure forensics on compromised trustzone",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 1659,
    "paper_ids": [
      2153,
      446
    ],
    "papers_without_artifact_ids": [
      776
    ]
  },
  {
    "name": "Tianyang Tao",
    "display_name": "Tianyang Tao",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Provably Robust Multi-bit Watermarking for AI-generated Text",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1660,
    "paper_ids": [
      1903,
      1904
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei Zou",
    "display_name": "Wei Zou",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2025": 3,
        "2021": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Provably Robust Multi-bit Watermarking for AI-generated Text",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TracLLM: A Generic Framework for Attributing Long Context LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "poisonedrag knowledge corruption attacks to retrievalaugmented generation of large language models",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "aifore smart fuzzing based on automatic input format reverse engineering",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "maze towards automated heap feng shui",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "mvp detecting vulnerabilities using patchenhanced vulnerability signatures",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1661,
    "paper_ids": [
      1903,
      3325
    ],
    "papers_without_artifact_ids": [
      3326,
      23,
      1898,
      3132
    ]
  },
  {
    "name": "Brian Tang",
    "display_name": "Brian Tang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2,
        "2025": 1
      },
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Navigating Cookie Consent Violations Across the Globe",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Face-Off: Adversarial Face Obfuscation",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "eyeshield realtime protection of mobile device screen information from shoulder surfing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "fairness properties of face recognition and obfuscation systems",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1662,
    "paper_ids": [
      4403,
      3390
    ],
    "papers_without_artifact_ids": [
      4404,
      3393
    ]
  },
  {
    "name": "Duc Bui",
    "display_name": "Duc Bui",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Navigating Cookie Consent Violations Across the Globe",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automated Extraction and Presentation of Data Practices in Privacy Policies",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1663,
    "paper_ids": [
      4403,
      4405
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kang G. Shin",
    "display_name": "Kang G. Shin",
    "affiliation": "University of Michigan",
    "artifact_count": 2,
    "total_papers": 14,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "PETS": 3,
      "SOSP": 0,
      "SC": 0,
      "EUROSYS": 0,
      "ATC": 0,
      "ACSAC": 2,
      "FAST": 3,
      "NSDI": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "PETS": {
        "2020": 1,
        "2024": 1,
        "2021": 1
      },
      "SOSP": {},
      "SC": {},
      "EUROSYS": {},
      "ATC": {},
      "ACSAC": {
        "2021": 1,
        "2022": 1
      },
      "FAST": {
        "2011": 1,
        "2023": 1,
        "2022": 1
      },
      "NSDI": {
        "2017": 1,
        "2019": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Navigating Cookie Consent Violations Across the Globe",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Automated Extraction and Presentation of Data Practices in Privacy Policies",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacylens ondevice pii removal from rgb images using thermallyenhanced sensing",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "go go gadget hammer flipping nested pointers for arbitrary data leakage",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "fast application launch on personal computingcommunication devices",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "eyeshield realtime protection of mobile device screen information from shoulder surfing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "are there wireless hidden cameras spying on me",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "hydra resilient and highly available remote memory",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "fuzzing hardware like software",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "s2can sufficiently secure controller area network",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "spy car steering reveals your trip route",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "tiresias a gpu cluster manager for distributed deep learning",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "efficient memory disaggregation with infiniswap",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "fast quick application launch on solidstate drives",
        "conference": "FAST",
        "year": 2011
      }
    ],
    "author_id": 1664,
    "paper_ids": [
      4403,
      4405
    ],
    "papers_without_artifact_ids": [
      4406,
      1505,
      4407,
      4404,
      2333,
      1361,
      2236,
      4408,
      4409,
      1956,
      1957,
      4410
    ]
  },
  {
    "name": "Elizabeth Lin",
    "display_name": "Elizabeth Lin",
    "affiliation": "North Carolina State University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Context Matters: Qualitative Insights into Developers' Approaches and Challenges with Software Composition Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "UntrustIDE: Exploiting Weaknesses in VS Code Extensions",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1665,
    "paper_ids": [
      2264,
      2265
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nael B. Abu-Ghazaleh",
    "display_name": "Nael B. Abu-Ghazaleh",
    "affiliation": "Univ. of California - Riverside",
    "artifact_count": 2,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 8,
      "EUROSYS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 2,
        "2025": 2,
        "2021": 2
      },
      "EUROSYS": {
        "2024": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure Caches for Compartmentalized Software",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Not so Refreshing: Attacking GPUs using RFM Rowhammer Mitigation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "core graph exploiting edge centrality to speedup the evaluation of iterative graph queries",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "teeshirt scalable leakagefree cache hierarchies for tees",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "that doesnt go there attacks on shared state in multiuser augmented reality applications",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "going through the motions arvr keylogging from user head motions",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "its all in your headset sidechannel attacks on arvr systems",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "syzvegas beating kernel fuzzing odds with reinforcement learning",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "csprop ciphertext and signature propagation lowoverhead publickey cryptosystem for iot environments",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "opening digital borders cautiously yet decisively digital filtering in saudi arabia",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1666,
    "paper_ids": [
      4310,
      4411
    ],
    "papers_without_artifact_ids": [
      4412,
      4311,
      4413,
      4414,
      4415,
      2228,
      4416,
      4417
    ]
  },
  {
    "name": "Jiliang Li",
    "display_name": "Jiliang Li",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Investigating the Impact of Online Community Involvement on Safety Practices and Perceived Risks Among People Who Use Drugs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1667,
    "paper_ids": [
      3309,
      3849
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Robert H. Deng",
    "display_name": "Robert H. Deng",
    "affiliation": "Singapore Management University",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0,
      "ACSAC": 4,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "ATC": {},
      "ACSAC": {
        "2018": 1,
        "2022": 1,
        "2019": 1,
        "2020": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 22.2,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Keyword Private Information Retrieval from Key-to-Index Mappings",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "impact tracing identifying the culprit of misinformation in encrypted messaging systems",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "siniel distributed privacypreserving zksnark",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "prisrv privacyenhanced and highly usable service discovery in wireless communications",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "compressed federated learning based on adaptive local differential privacy",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "secure and verifiable inference in deep neural networks",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "an empirical study of sms onetime password authentication in android apps",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "typingproof usable secure and lowcost twofactor authentication based on keystroke timings",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 1668,
    "paper_ids": [
      3257,
      445
    ],
    "papers_without_artifact_ids": [
      4365,
      4418,
      3071,
      4419,
      4420,
      769,
      3072
    ]
  },
  {
    "name": "Yuxin Cao",
    "display_name": "Yuxin Cao",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1669,
    "paper_ids": [
      1569,
      2300
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jie Hao 0001",
    "display_name": "Jie Hao",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1670,
    "paper_ids": [
      1569,
      2300
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jin Song Dong 0001",
    "display_name": "Jin Song Dong",
    "affiliation": "National University of Singapore",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "SC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1,
        "2022": 1,
        "2025": 2,
        "2021": 1
      },
      "SC": {},
      "NDSS": {}
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "less defined knowledge and more true alarms referencebased phishing detection without a predefined reference list",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "phishdecloaker detecting captchacloaked phishing websites via hybrid visionbased interactive models",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "knowledge expansion and counterfactual interaction for referencebased phishing detection",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "inferring phishing intention via webpage appearance and dynamics a deep vision based approach",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "phishpedia a hybrid deep learning based approach to visually identify phishing webpages",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1671,
    "paper_ids": [
      1569,
      4421
    ],
    "papers_without_artifact_ids": [
      4422,
      4423,
      4424,
      4425,
      4426
    ]
  },
  {
    "name": "Yixian Yang",
    "display_name": "Yixian Yang",
    "affiliation": "BUPT",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1672,
    "paper_ids": [
      1569,
      2300
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xinyi Wang 0013",
    "display_name": "Xinyi Wang",
    "affiliation": "Chinese Academy of Sciences (CAS), Institute of Information Engineering, China",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZIPPER: Static Taint Analysis for PHP Applications with Precision and Efficiency",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "leveraging semantic relations in code and data to enhance taint analysis of embedded systems",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1673,
    "paper_ids": [
      3362,
      3363
    ],
    "papers_without_artifact_ids": [
      3366
    ]
  },
  {
    "name": "Feng Li 0045",
    "display_name": "Feng Li",
    "affiliation": "Chinese Academy of Sciences, Institute of Information Engineering, School of Cyber Security, Key Laboratory of Network Assessment Technology, Beijing, China",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2025": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZIPPER: Static Taint Analysis for PHP Applications with Precision and Efficiency",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mvp detecting vulnerabilities using patchenhanced vulnerability signatures",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1674,
    "paper_ids": [
      3362,
      3363
    ],
    "papers_without_artifact_ids": [
      3132
    ]
  },
  {
    "name": "Guorui Liao",
    "display_name": "Guorui Liao",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Shimmer: a Provably Secure Steganography Based on Entropy Collecting Mechanism",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Framework for Designing Provably Secure Steganography",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1675,
    "paper_ids": [
      4427,
      4428
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinshuai Yang",
    "display_name": "Jinshuai Yang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Shimmer: a Provably Secure Steganography Based on Entropy Collecting Mechanism",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Framework for Designing Provably Secure Steganography",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1676,
    "paper_ids": [
      4427,
      4428
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yongfeng Huang 0001",
    "display_name": "Yongfeng Huang",
    "affiliation": "IISc Bangalore",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Shimmer: a Provably Secure Steganography Based on Entropy Collecting Mechanism",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Framework for Designing Provably Secure Steganography",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1677,
    "paper_ids": [
      4427,
      4428
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anna Maria Mandalari",
    "display_name": "Anna Maria Mandalari",
    "affiliation": "Imperial College London, UK",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2020": 1,
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Big Help or Big Brother? Auditing Tracking, Profiling, and Personalization in Generative AI Assistants",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "blocking without breaking identification and mitigation of nonessential iot traffic",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 1678,
    "paper_ids": [
      807,
      3313
    ],
    "papers_without_artifact_ids": [
      3321
    ]
  },
  {
    "name": "Yunyi Zhang",
    "display_name": "Yunyi Zhang",
    "affiliation": "National University of Defense Technology, Tsinghua University",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2025": 2
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Misty Registry: An Empirical Study of Flawed Domain Registry Operation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hades attack understanding and evaluating manipulation risks of email blocklists",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "cross the zone toward a covert domain hijacking via shared dns infrastructure",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "into the dark unveiling internal site search abused for black hat seo",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "rethinking the security threats of stale dns glue records",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1679,
    "paper_ids": [
      902,
      242
    ],
    "papers_without_artifact_ids": [
      247,
      913,
      914,
      912
    ]
  },
  {
    "name": "Min Zhang 0054",
    "display_name": "Min Zhang",
    "affiliation": "National University of Defense Technology, College of Electronic Engineering, Hefei, China",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 6
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2023": 1,
        "2025": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Misty Registry: An Empirical Study of Flawed Domain Registry Operation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cross the zone toward a covert domain hijacking via shared dns infrastructure",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "into the dark unveiling internal site search abused for black hat seo",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "rethinking the security threats of stale dns glue records",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "alphaexp an expert system for identifying securitysensitive kernel objects",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1680,
    "paper_ids": [
      902,
      242
    ],
    "papers_without_artifact_ids": [
      913,
      914,
      912,
      1894
    ]
  },
  {
    "name": "Fan Shi 0003",
    "display_name": "Fan Shi",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2025": 2
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Misty Registry: An Empirical Study of Flawed Domain Registry Operation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cross the zone toward a covert domain hijacking via shared dns infrastructure",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "into the dark unveiling internal site search abused for black hat seo",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "rethinking the security threats of stale dns glue records",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1681,
    "paper_ids": [
      902,
      242
    ],
    "papers_without_artifact_ids": [
      913,
      914,
      912
    ]
  },
  {
    "name": "Fabian Ising",
    "display_name": "Fabian Ising",
    "affiliation": "University of Applied Sciences Münster",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "S/MINE: Collecting and Analyzing S/MIME Certificates at Scale",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "landscape exploring ldap weaknesses and data leaks at internet scale",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "contenttype multipartoracle tapping into format oracles in email endtoend encryption",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "office document security and privacy",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1682,
    "paper_ids": [
      4429,
      4430
    ],
    "papers_without_artifact_ids": [
      4431,
      4432,
      594
    ]
  },
  {
    "name": "Sebastian Schinzel",
    "display_name": "Sebastian Schinzel",
    "affiliation": "FH Mnster, Fachbereich Elektrotechnik und Informatik, Steinfurt, Germany",
    "artifact_count": 2,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 2
      },
      "WOOT": {}
    },
    "artifact_rate": 28.6,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "S/MINE: Collecting and Analyzing S/MIME Certificates at Scale",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "landscape exploring ldap weaknesses and data leaks at internet scale",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "contenttype multipartoracle tapping into format oracles in email endtoend encryption",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "i dont know why i check this investigating expert users strategies to detect email signature spoofing attacks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "alpaca application layer protocol confusion analyzing and mitigating cracks in tls authentication",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "office document security and privacy",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1683,
    "paper_ids": [
      4429,
      4430
    ],
    "papers_without_artifact_ids": [
      4431,
      4432,
      959,
      592,
      594
    ]
  },
  {
    "name": "Yanyan Zou 0002",
    "display_name": "Yanyan Zou",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "leveraging semantic relations in code and data to enhance taint analysis of embedded systems",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1684,
    "paper_ids": [
      3363,
      3364
    ],
    "papers_without_artifact_ids": [
      3366
    ]
  },
  {
    "name": "Zheng Li 0023",
    "display_name": "Zheng Li",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 1,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 2
      },
      "ACSAC": {
        "2019": 1
      },
      "PETS": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enhanced Label-Only Membership Inference Attacks with Fewer Queries",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Membership Inference Attacks Against Vision-Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a comprehensive study of privacy risks in curriculum learning",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "securitynet assessing machine learning vulnerabilities on public models",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "unganable defending against ganbased face manipulation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "how to prove your model belongs to you a blindwatermark based framework to protect intellectual property of dnn",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 1685,
    "paper_ids": [
      186,
      187
    ],
    "papers_without_artifact_ids": [
      194,
      199,
      205,
      213
    ]
  },
  {
    "name": "Phani Vadrevu",
    "display_name": "Phani Vadrevu",
    "affiliation": "Louisiana State University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2,
        "2021": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Doubly Dangerous: Evading Phishing Reporting Systems by Leveraging Email Tracking Techniques",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PhishPrint: Evading Phishing Detection Crawlers by Prior Profiling",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "please dont send that bot anything a mixedmethods study of personal impersonation attacks targeting digital payments on social media",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 1686,
    "paper_ids": [
      1115,
      3219
    ],
    "papers_without_artifact_ids": [
      4433
    ]
  },
  {
    "name": "Jingyi Zheng",
    "display_name": "Jingyi Zheng",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unsafe LLM-Based Search: Quantitative Analysis and Mitigation of Safety Risks in AI Web Search",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1687,
    "paper_ids": [
      3370,
      4434
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tao Luo",
    "display_name": "Tao Luo",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 1,
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "USENIXSEC": {
        "2025": 1
      },
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RollingEvidence: Autoregressive Video Evidence via Rolling Shutter Effect",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privacy Budget Scheduling",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "arboretum a planner for largescale federated analytics with differential privacy",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 1688,
    "paper_ids": [
      3598,
      1354
    ],
    "papers_without_artifact_ids": [
      2729
    ]
  },
  {
    "name": "Xiaowei Zhu 0001",
    "display_name": "Xiaowei Zhu",
    "affiliation": "University of Surrey",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "USENIXSEC": {
        "2025": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "GraphAce: Secure Two-Party Graph Analysis Achieving Communication Efficiency",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TriCache: A User-Transparent Block Cache Enabling High-Performance Out-of-Core Processing with In-Memory Programs",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1689,
    "paper_ids": [
      2816,
      2817
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhengyao Lin",
    "display_name": "Zhengyao Lin",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Towards Practical, End-to-End Formally Verified X.509 Certificate Validators with Verdict",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Vest: Verified, Secure, High-Performance Parsing and Serialization for Rust",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1690,
    "paper_ids": [
      717,
      720
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jing Chen 0003",
    "display_name": "Jing Chen",
    "affiliation": "Ontario Tech University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "EmbedX: Embedding-Based Cross-Trigger Backdoor Attack Against Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "formal analysis and patching of blesc pairing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "liveness is not enough enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1691,
    "paper_ids": [
      734,
      4435
    ],
    "papers_without_artifact_ids": [
      4436,
      1425
    ]
  },
  {
    "name": "Kun He 0008",
    "display_name": "Kun He",
    "affiliation": "Wuhan University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "EmbedX: Embedding-Based Cross-Trigger Backdoor Attack Against Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "formal analysis and patching of blesc pairing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "liveness is not enough enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1692,
    "paper_ids": [
      734,
      4435
    ],
    "papers_without_artifact_ids": [
      4436,
      1425
    ]
  },
  {
    "name": "Oliver Wiese",
    "display_name": "Oliver Wiese",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"That's my perspective from 30 years of doing this\": An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a mixedmethods study on user experiences and challenges of recovery codes for an endtoend encrypted service",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "i need this back later an exploration of practical secret sharing",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 1693,
    "paper_ids": [
      1243,
      1245
    ],
    "papers_without_artifact_ids": [
      1248,
      4437
    ]
  },
  {
    "name": "Zekeriya Erkin",
    "display_name": "Zekeriya Erkin",
    "affiliation": "TU Delft",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "PETS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Batchable Secure Outsourced Computation: Depth-Aware Arithmetization of Common Primitives for BFV & BGV",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Topology-Based Reconstruction Prevention for Decentralised Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacypreserving membership queries for federated anomaly detection",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "privacypreserving data aggregation with public verifiability against internal adversaries",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1694,
    "paper_ids": [
      1131,
      1133
    ],
    "papers_without_artifact_ids": [
      4438,
      1136
    ]
  },
  {
    "name": "Theodor Schnitzler",
    "display_name": "Theodor Schnitzler",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "PETS": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 2,
        "2025": 1
      },
      "PETS": {
        "2022": 2,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 22.2,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scanned and Scammed: Insecurity by ObsQRity? Measuring User Susceptibility and Awareness of QR Code-Based Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "amplifying threats the role of multisender coordination in smstimingbased location inference attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "freaky leaky sms extracting user locations by analyzing sms timings",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "proofofvax studying user preferences and perception of covid vaccination certificates",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "as soon as its a risk i want to require mfa how administrators configure riskbased authentication",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "fast easy convenient studying adoption and perception of digital covid certificates",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "sok managing longitudinal privacy of publicly shared personal online data",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "you still use the password after all exploring fido2 security keys in a small company",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1695,
    "paper_ids": [
      4439,
      4252
    ],
    "papers_without_artifact_ids": [
      3077,
      3078,
      4440,
      4441,
      4442,
      3082,
      4443
    ]
  },
  {
    "name": "Kazuki Nomoto",
    "display_name": "Kazuki Nomoto",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Invisible but Detected: Physical Adversarial Shadow Attack and Defense on LiDAR Object Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1696,
    "paper_ids": [
      4444,
      4445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tatsuya Mori",
    "display_name": "Tatsuya Mori",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "PETS": 1,
      "ACSAC": 1,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "PETS": {
        "2022": 1
      },
      "ACSAC": {
        "2019": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Invisible but Detected: Physical Adversarial Shadow Attack and Defense on LiDAR Object Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "negative effects of social triggers on user security and privacy behaviors",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "understanding nonexperts security and privacyrelated questions on a qa site",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "why they ignore english emails the challenges of nonnative speakers in identifying phishing emails",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "eiger automated ioc generation for accurate and interpretable endpoint malware detection",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 1697,
    "paper_ids": [
      4444,
      4445
    ],
    "papers_without_artifact_ids": [
      4446,
      4447,
      4448,
      4449
    ]
  },
  {
    "name": "Juan Carlos Carrillo",
    "display_name": "Juan Carlos Carrillo",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2025,
      2026
    ],
    "year_range": "2025-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Malicious LLM-Based Conversational AI Makes Users Reveal Personal Information",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Personal Data Flows and Privacy Policy Traceability in Third-party LLM Apps in the GPT Ecosystem",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1698,
    "paper_ids": [
      4450,
      4451
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jose Such",
    "display_name": "Jose Such",
    "affiliation": "King's College London",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "PETS": {
        "2024": 1,
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2025,
      2026
    ],
    "year_range": "2025-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Malicious LLM-Based Conversational AI Makes Users Reveal Personal Information",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Personal Data Flows and Privacy Policy Traceability in Third-party LLM Apps in the GPT Ecosystem",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "my best friends husband sees and knows everything a crosscontextual and crosscountry approach to understanding smart home privacy",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "voice app developer experiences with alexa and google assistant juggling risks liability and security",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1699,
    "paper_ids": [
      4450,
      4451
    ],
    "papers_without_artifact_ids": [
      4029,
      4452
    ]
  },
  {
    "name": "Siyuan Cheng 0005",
    "display_name": "Siyuan Cheng",
    "affiliation": "Purdue University",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 2
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "censor defense against gradient inversion via orthogonal subspace bayesian sampling",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "exploring inherent backdoors in deep learning models",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "rethinking the invisible protection against unauthorized image usage in stable diffusion",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "hardlabel blackbox universal adversarial patch attack",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1700,
    "paper_ids": [
      3031,
      4453
    ],
    "papers_without_artifact_ids": [
      3032,
      4454,
      4455,
      4456
    ]
  },
  {
    "name": "Zian Su",
    "display_name": "Zian Su",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1701,
    "paper_ids": [
      3031,
      4453
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ashish Kundu",
    "display_name": "Ashish Kundu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "translating c to rust lessons from a user study",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 1702,
    "paper_ids": [
      3031,
      1169
    ],
    "papers_without_artifact_ids": [
      1770
    ]
  },
  {
    "name": "Xiangyu Zhang 0001",
    "display_name": "Xiangyu Zhang",
    "affiliation": "Purdue University",
    "artifact_count": 2,
    "total_papers": 17,
    "total_papers_by_conf": {
      "USENIXSEC": 11,
      "NDSS": 2,
      "ATC": 0,
      "ACSAC": 4,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 4,
        "2022": 1,
        "2025": 1,
        "2021": 2
      },
      "NDSS": {
        "2025": 2
      },
      "ATC": {},
      "ACSAC": {
        "2024": 1,
        "2018": 1,
        "2017": 2
      },
      "WOOT": {}
    },
    "artifact_rate": 11.8,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "censor defense against gradient inversion via orthogonal subspace bayesian sampling",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "exploring inherent backdoors in deep learning models",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "rethinking the invisible protection against unauthorized image usage in stable diffusion",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "costeffective attack forensics by recording and correlating file system changes",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "pelican exploiting backdoors of naturally trained deep learning models in binary code analysis",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "extracting protocol format as state machine via controlled static loop analysis",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "your exploit is mine instantly synthesizing counterattack smart contract",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "hardlabel blackbox universal adversarial patch attack",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "profactory improving iot security via formalized protocol customization",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "atlas a sequencebased learning approach for attack investigation",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "android smarttvs vulnerability discovery via logguided fuzzing",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "from control model to program investigating robotic aerial vehicle accidents with mayday",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "lprov practical libraryaware provenance tracing",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "analysis of seandroid policies combining mac and dac in android",
        "conference": "ACSAC",
        "year": 2017
      },
      {
        "title": "revarm a platformagnostic arm binary rewriter for security applications",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 1703,
    "paper_ids": [
      3031,
      4453
    ],
    "papers_without_artifact_ids": [
      3032,
      4454,
      4455,
      4457,
      4458,
      4459,
      393,
      4456,
      26,
      1752,
      2277,
      4182,
      4460,
      2271,
      1454
    ]
  },
  {
    "name": "Shu Wang 0004",
    "display_name": "Shu Wang",
    "affiliation": "IIT Bombay",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DISPATCH: Unraveling Security Patches from Entangled Code Changes",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TYPEPULSE: Detecting Type Confusion Bugs in Rust Programs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "compensating removed frequency components thwarting voice spectrum reduction attacks",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "what if is not enough fixing null pointer dereference with contextual check",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1704,
    "paper_ids": [
      548,
      1458
    ],
    "papers_without_artifact_ids": [
      555,
      568
    ]
  },
  {
    "name": "Jingwen Yan",
    "display_name": "Jingwen Yan",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "No Way to Sign Out? Unpacking Non-Compliance with Google Play's App Account Deletion Requirements",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SKILLPoV: Towards Accessible and Effective Privacy Notice for Amazon Alexa Skills",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1705,
    "paper_ids": [
      1455,
      1456
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohammed Aldeen",
    "display_name": "Mohammed Aldeen",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "No Way to Sign Out? Unpacking Non-Compliance with Google Play's App Account Deletion Requirements",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SKILLPoV: Towards Accessible and Effective Privacy Notice for Amazon Alexa Skills",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1706,
    "paper_ids": [
      1455,
      1456
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenting Zheng",
    "display_name": "Wenting Zheng",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "SOSP": 0,
      "EUROSYS": 0,
      "NSDI": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2025": 1,
        "2021": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "NSDI": {
        "2017": 2
      },
      "OSDI": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FABLE: Batched Evaluation on Confidential Lookup Tables in 2PC",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "delphi a cryptographic inference service for neural networks",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "opaque an oblivious and encrypted distributed analytics platform",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "scl simplifying distributed sdn control planes",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 1707,
    "paper_ids": [
      3298,
      468
    ],
    "papers_without_artifact_ids": [
      677,
      499,
      2865
    ]
  },
  {
    "name": "Yizhong Liu",
    "display_name": "Yizhong Liu",
    "affiliation": "Beihang University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Aion: Robust and Efficient Multi-Round Single-Mask Secure Aggregation Against Malicious Participants",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1708,
    "paper_ids": [
      2566,
      1134
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bocheng Xiang",
    "display_name": "Bocheng Xiang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pig in a Poke: Automatically Detecting and Exploiting Link Following Vulnerabilities in Windows File Operations",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1709,
    "paper_ids": [
      237,
      238
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zihan Lin",
    "display_name": "Zihan Lin",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pig in a Poke: Automatically Detecting and Exploiting Link Following Vulnerabilities in Windows File Operations",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1710,
    "paper_ids": [
      237,
      238
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tianshuo Cong",
    "display_name": "Tianshuo Cong",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "From Purity to Peril: Backdooring Merged Models From \"Harmless\" Benign Components",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Safety Misalignment Against Large Language Models",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1711,
    "paper_ids": [
      2569,
      3371
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wentao Guo 0005",
    "display_name": "Wentao Guo",
    "affiliation": "Epic Systems, Verona, WI, USA",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2025,
      2026
    ],
    "year_range": "2025-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "How Researchers De-Identify Data in Practice",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "How Experts Personalize Privacy & Security Advice for At-Risk Users",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the role of professional product reviewers in evaluating security and privacy",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1712,
    "paper_ids": [
      862,
      1263
    ],
    "papers_without_artifact_ids": [
      1273
    ]
  },
  {
    "name": "Xinyou Huang",
    "display_name": "Xinyou Huang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1714,
    "paper_ids": [
      238,
      240
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marc Juarez",
    "display_name": "Marc Juarez",
    "affiliation": "University of Edinburgh",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Crack in the Bark: Leveraging Public Knowledge to Remove Tree-Ring Watermarks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MixMatch: Flow Matching for Mixnet Traffic",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1715,
    "paper_ids": [
      4461,
      1908
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "James C. Davis 0001",
    "display_name": "James C. Davis",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      },
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "An Industry Interview Study of Software Signing for Supply Chain Security",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LEMIX: Enabling Testing of Embedded Applications as Linux Applications",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an interview study on thirdparty cyber threat hunting processes in the us department of homeland security",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1717,
    "paper_ids": [
      4462,
      1774
    ],
    "papers_without_artifact_ids": [
      4463
    ]
  },
  {
    "name": "Yongheng Liu",
    "display_name": "Yongheng Liu",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1718,
    "paper_ids": [
      239,
      240
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yaliang Li",
    "display_name": "Yaliang Li",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unlocking the Power of Differentially Private Zeroth-order Optimization for Fine-tuning LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Exploiting Task-Level Vulnerabilities: An Automatic Jailbreak Attack and Defense Benchmarking for LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1719,
    "paper_ids": [
      4464,
      4465
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stefano Longari",
    "display_name": "Stefano Longari",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: Automated TTP Extraction from CTI Reports - Are We There Yet?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1720,
    "paper_ids": [
      1437,
      3065
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas Bourgeat",
    "display_name": "Thomas Bourgeat",
    "affiliation": "EPFL",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "USENIXSEC": {
        "2025": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Save what must be saved: Secure context switching with Sailor",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Performance Interfaces for Hardware Accelerators",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1721,
    "paper_ids": [
      3775,
      1594
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anmin Fu",
    "display_name": "Anmin Fu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TAPAS: An Efficient Online APT Detection with Task-guided Process Provenance Graph Segmentation and Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum!",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1722,
    "paper_ids": [
      1125,
      1397
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Louis Bettels",
    "display_name": "Louis Bettels",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC",
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HyTrack: Resurrectable and Persistent Tracking Across Android Apps and the Web",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Comma Separated Vulnerabilities: Detecting Formula Injection in the Wild",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1723,
    "paper_ids": [
      218,
      220
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wendy Hui Wang",
    "display_name": "Wendy Hui Wang",
    "affiliation": "Stevens Institute of Technology",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 3,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2023": 1,
        "2024": 2
      },
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gclleak link membership inference attacks against graph contrastive learning",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "subgraph structure membership inference attacks against graph neural networks",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "link membership inference attacks against unsupervised graph representation learning",
        "conference": "ACSAC",
        "year": 2023
      }
    ],
    "author_id": 1724,
    "paper_ids": [
      3260,
      1756
    ],
    "papers_without_artifact_ids": [
      4466,
      4467,
      4468
    ]
  },
  {
    "name": "Yuan Hong 0001",
    "display_name": "Yuan Hong",
    "affiliation": "University of Connecticut",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Delay-allowed Differentially Private Data Stream Release",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "inf2guard an informationtheoretic framework for learning privacypreserving representations against inference attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "an llmassisted easytotrigger backdoor attack on code completion models injecting disguised vulnerabilities against strong detection",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "videodp a flexible platform for video analytics with differential privacy",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 1725,
    "paper_ids": [
      3260,
      303
    ],
    "papers_without_artifact_ids": [
      4368,
      4328,
      4469
    ]
  },
  {
    "name": "Wenbo Guo 0002",
    "display_name": "Wenbo Guo",
    "affiliation": "Univ. of California - Santa Barbara",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 3,
        "2025": 1,
        "2021": 2
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CADE: Detecting and Explaining Concept Drift Samples for Security Applications",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Adversarial Policy Training against Deep Reinforcement Learning",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mind the inconspicuous revealing the hidden weakness in aligned llms refusal boundaries",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "textguard provable defense against backdoor attacks on text classification",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "guideenricher protecting the anonymity of ethereum mixing service users with deep reinforcement learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "unique identification of 50 000 virtual reality users from head hand motion data",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "airs explanation for deep reinforcement learning based security applications",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "patrol provable defense against adversarial policy in twoplayer games",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1726,
    "paper_ids": [
      936,
      937
    ],
    "papers_without_artifact_ids": [
      938,
      3280,
      1157,
      3283,
      941,
      942
    ]
  },
  {
    "name": "Pierre Laperdrix",
    "display_name": "Pierre Laperdrix",
    "affiliation": "CRIStAL",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "PETS": {
        "2024": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Déjà vu: Abusing Browser Cache Headers to Identify and Track Online Users",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the devil is in the details detection measurement and lawfulness of serverside tracking on the web",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 6285,
    "paper_ids": [
      1116,
      4470
    ],
    "papers_without_artifact_ids": [
      4471
    ]
  },
  {
    "name": "Koushik Sen",
    "display_name": "Koushik Sen",
    "affiliation": "Univ. of California - Berkeley",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 2,
      "SC": 0,
      "ACSAC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2021": 1
      },
      "SC": {},
      "ACSAC": {
        "2019": 1
      },
      "NSDI": {
        "2011": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ansor: Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "partemu enabling dynamic analysis of realworld trustzone software using emulation",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "eiger automated ioc generation for accurate and interpretable endpoint malware detection",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "fate and destini a framework for cloud recovery testing",
        "conference": "NSDI",
        "year": 2011
      }
    ],
    "author_id": 1727,
    "paper_ids": [
      670,
      472
    ],
    "papers_without_artifact_ids": [
      4472,
      4449,
      2036
    ]
  },
  {
    "name": "Enrico Bacis",
    "display_name": "Enrico Bacis",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1,
      "ACSAC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "PETS": {
        "2025": 1
      },
      "ACSAC": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SEApp: Bringing Mandatory Access Control to Android Apps",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dont interrupt me a largescale study of ondevice permission prompt quieting in chrome",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 1728,
    "paper_ids": [
      4473,
      4474
    ],
    "papers_without_artifact_ids": [
      4475
    ]
  },
  {
    "name": "Jedidiah R. Crandall",
    "display_name": "Jedidiah R. Crandall",
    "affiliation": "Arizona State University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2021": 1
      },
      "PETS": {
        "2024": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Blind In/On-Path Attacks and Applications to VPNs",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Attacking Connection Tracking Frameworks as used by Virtual Private Networks",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "openvpn is open to vpn fingerprinting",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1729,
    "paper_ids": [
      4476,
      4291
    ],
    "papers_without_artifact_ids": [
      4300
    ]
  },
  {
    "name": "Lachlan J. Gunn",
    "display_name": "Lachlan J. Gunn",
    "affiliation": "Aalto University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      },
      "PETS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "USENIXSEC"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PACStack: an Authenticated Call Stack",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1730,
    "paper_ids": [
      1193,
      1195
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Milan Stute",
    "display_name": "Milan Stute",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 2
      },
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS",
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privatedrop practical privacypreserving authentication for apple airdrop",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1731,
    "paper_ids": [
      414,
      417
    ],
    "papers_without_artifact_ids": [
      424
    ]
  },
  {
    "name": "Vyas Sekar",
    "display_name": "Vyas Sekar",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 2,
    "total_papers": 24,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 3,
      "ATC": 0,
      "NSDI": 18,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "USENIXSEC": {
        "2022": 1,
        "2021": 2
      },
      "ATC": {},
      "NSDI": {
        "2021": 1,
        "2014": 1,
        "2017": 1,
        "2024": 1,
        "2019": 2,
        "2023": 2,
        "2012": 1,
        "2016": 3,
        "2020": 1,
        "2022": 1,
        "2008": 1,
        "2018": 1,
        "2015": 2
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 8.3,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "USENIXSEC"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Accurately Measuring Global Risk of Amplification Attacks using AmpMap",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Achieving 100Gbps Intrusion Prevention on a Single Server",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "heimdall towards riskaware network management outsourcing",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "trustsketch trustworthy sketchbased telemetry on cloud hosts",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "exchain exception dependency analysis for root cause diagnosis",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "exoplane an operating system for onrack switch resource augmentation",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "sketchovsky enabling ensembles of sketches on programmable switches",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "sketchlib enabling efficient sketchbased monitoring on programmable switches",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "lumos identifying and localizing diverse hidden iot devices in an unfamiliar environment",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "dont yank my chain auditable nf service chaining",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "jaqen a highperformance switchnative approach for detecting and mitigating volumetric ddos attacks with programmable switches",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "netsmc a custom symbolic model checker for stateful network verification",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "alembic automated model inference for stateful network functions",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "freeflow softwarebased virtual rdma networking for containerized clouds",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "efficient and correct test scheduling for ensembles of network policies",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "pytheas enabling datadriven quality of experience optimization using groupbased explorationexploitation",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "cfa a practical prediction system for video qoe optimization",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "buzz testing contextdependent policies in stateful networks",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "simplifying softwaredefined network optimization using sol",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "c3 internetscale control plane for video quality optimization",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "klotski reprioritizing web content to improve user experience on mobile devices",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "enforcing networkwide policies in the presence of dynamic middlebox actions using flowtags",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "design and implementation of a consolidated middlebox architecture",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "csamp a system for networkwide flow monitoring",
        "conference": "NSDI",
        "year": 2008
      }
    ],
    "author_id": 1732,
    "paper_ids": [
      4477,
      4478
    ],
    "papers_without_artifact_ids": [
      4479,
      4480,
      3482,
      4481,
      4482,
      4483,
      4484,
      724,
      1012,
      3406,
      4485,
      2832,
      3407,
      4486,
      503,
      4487,
      4176,
      507,
      3437,
      4488,
      4177,
      4178
    ]
  },
  {
    "name": "Andrew D. Zonenberg",
    "display_name": "Andrew D. Zonenberg",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "WOOT": 2,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 2
      },
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Extraction of Secrets from 40nm CMOS Gate Dielectric Breakdown Antifuses by FIB Passive Voltage Contrast",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Security through Transparency: Tales from the RP2350 Hacking Challenge",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1733,
    "paper_ids": [
      4489,
      1520
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Manuel Karl",
    "display_name": "Manuel Karl",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "WOOT": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "WOOT": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS",
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Comma Separated Vulnerabilities: Detecting Formula Injection in the Wild",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "The Impact of Default Mobile SDK Usage on Privacy and Data Protection",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1734,
    "paper_ids": [
      220,
      223
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Janus Varmarken",
    "display_name": "Janus Varmarken",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The TV is Smart and Full of Trackers: Measuring Smart TV Advertising and Tracking",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "FingerprinTV: Fingerprinting Smart TV Apps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1735,
    "paper_ids": [
      808,
      963
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rasmus Dahlberg",
    "display_name": "Rasmus Dahlberg",
    "affiliation": "Independent",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2025": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Website Fingerprinting with Website Oracles",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Onion-Location Measurements and Fingerprinting",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "timeless timing attacks and preload defenses in tors dns cache",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "privacypreserving incrementallydeployable support for certificate transparency in tor",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 1736,
    "paper_ids": [
      3385,
      1701
    ],
    "papers_without_artifact_ids": [
      3386,
      3387
    ]
  },
  {
    "name": "Hamza Harkous",
    "display_name": "Hamza Harkous",
    "affiliation": "Google, Zurich, Switzerland",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Privacy Policy Landscape After the GDPR",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Website Data Transparency in the Browser",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a decade of privacyrelevant android app reviews large scale trends",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "automated cookie notice analysis and enforcement",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "prisec a privacy settings enforcement controller",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1737,
    "paper_ids": [
      3388,
      3425
    ],
    "papers_without_artifact_ids": [
      1269,
      3394,
      3397
    ]
  },
  {
    "name": "Chelsea Komlo",
    "display_name": "Chelsea Komlo",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Mind the Gap: Ceremonies for Applied Secret Sharing",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "DPrio: Efficient Differential Privacy with High Utility for Prio",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "walking onions scaling anonymity networks while protecting users",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1738,
    "paper_ids": [
      1211,
      4490
    ],
    "papers_without_artifact_ids": [
      1291
    ]
  },
  {
    "name": "Wouter Lueks",
    "display_name": "Wouter Lueks",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2023": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2020": 2
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tandem: Securing Keys by Using a Central Server While Preserving Privacy",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Private Collection Matching Protocols",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "crowdnotifier decentralized privacypreserving presence tracing",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "voteagain a scalable coercionresistant voting system",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "datasharenetwork a decentralized privacypreserving search engine for investigative journalists",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1739,
    "paper_ids": [
      970,
      973
    ],
    "papers_without_artifact_ids": [
      975,
      977,
      978
    ]
  },
  {
    "name": "Borja Balle",
    "display_name": "Borja Balle",
    "affiliation": "Amazon Research, Cambridge, UK",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 2
      },
      "USENIXSEC": {
        "2023": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automatic Discovery of Privacy-Utility Pareto Fronts",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tight auditing of differentially private machine learning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "extracting training data from diffusion models",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1740,
    "paper_ids": [
      4491,
      4492
    ],
    "papers_without_artifact_ids": [
      4313,
      4314
    ]
  },
  {
    "name": "Mohammad Saidur Rahman 0002",
    "display_name": "Mohammad Saidur Rahman",
    "affiliation": "University of Texas - El Paso",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GANDaLF: GAN for Data-Limited Fingerprinting",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1741,
    "paper_ids": [
      4493,
      4494
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nate Mathews",
    "display_name": "Nate Mathews",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GANDaLF: GAN for Data-Limited Fingerprinting",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1742,
    "paper_ids": [
      4493,
      4494
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matthew Wright 0001",
    "display_name": "Matthew Wright",
    "affiliation": "Rochester Inst. of Technology",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2021": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2021
    ],
    "year_range": "2020-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GANDaLF: GAN for Data-Limited Fingerprinting",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1743,
    "paper_ids": [
      4493,
      4494
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ludovic Barman",
    "display_name": "Ludovic Barman",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2023": 1
      },
      "USENIXSEC": {},
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PriFi: Low-Latency Anonymity for Organizational Networks",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Evaluating practical QUIC website fingerprinting defenses for the masses",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "groove flexible metadataprivate messaging",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 1744,
    "paper_ids": [
      2667,
      972
    ],
    "papers_without_artifact_ids": [
      988
    ]
  },
  {
    "name": "Apostolos Pyrgelis",
    "display_name": "Apostolos Pyrgelis",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "PETS": 5,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1,
        "2023": 1,
        "2021": 2
      },
      "USENIXSEC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PriFi: Low-Latency Anonymity for Organizational Networks",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacypreserving federated recurrent neural networks",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "scalable privacypreserving distributed learning",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "sok privacypreserving collaborative treebased model learning",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "privacy and integrity preserving computations with crisp",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1745,
    "paper_ids": [
      2667,
      2557
    ],
    "papers_without_artifact_ids": [
      3401,
      3402,
      3403,
      3404
    ]
  },
  {
    "name": "Daniel J. Dubois",
    "display_name": "Daniel J. Dubois",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Echoes of Privacy: Uncovering the Profiling Practices of Voice Assistants",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "blocking without breaking identification and mitigation of nonessential iot traffic",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 1746,
    "paper_ids": [
      3313,
      4495
    ],
    "papers_without_artifact_ids": [
      3321
    ]
  },
  {
    "name": "David R. Choffnes",
    "display_name": "David R. Choffnes",
    "affiliation": "Northeastern University",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "PETS": 7,
      "USENIXSEC": 0,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1,
        "2023": 1,
        "2025": 3,
        "2021": 1
      },
      "USENIXSEC": {},
      "NSDI": {
        "2013": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2025
    ],
    "year_range": "2020-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Echoes of Privacy: Uncovering the Profiling Practices of Voice Assistants",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gig work at what cost exploring privacy risks of gig work platform participation in the us",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "empirically measuring data localization in the eu",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "not your average app a largescale privacy analysis of android browsers",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "moby a blackoutresistant anonymity network for mobile devices",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "blocking without breaking identification and mitigation of nonessential iot traffic",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "dasu pushing experiments to the internets edge",
        "conference": "NSDI",
        "year": 2013
      }
    ],
    "author_id": 1747,
    "paper_ids": [
      3313,
      4495
    ],
    "papers_without_artifact_ids": [
      4496,
      4497,
      2927,
      2668,
      3321,
      4498
    ]
  },
  {
    "name": "Phillipp Schoppmann",
    "display_name": "Phillipp Schoppmann",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2023": 1,
        "2025": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Verifiable Distributed Aggregation Functions",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the differential privacy and interactivity of privacy sandbox reports",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "communicationcomputation tradeoffs in pir",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1748,
    "paper_ids": [
      4492,
      4499
    ],
    "papers_without_artifact_ids": [
      4500,
      4501
    ]
  },
  {
    "name": "Damien Desfontaines",
    "display_name": "Damien Desfontaines",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 4
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 2,
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Differentially Private SQL with Bounded User Contribution",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Differentially private partition selection",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dpsips a simpler more scalable mechanism for differentially private partition selection",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "sok differential privacies",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 1749,
    "paper_ids": [
      4502,
      4503
    ],
    "papers_without_artifact_ids": [
      4504,
      4505
    ]
  },
  {
    "name": "Bryant Gipson",
    "display_name": "Bryant Gipson",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Differentially Private SQL with Bounded User Contribution",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Differentially private partition selection",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1750,
    "paper_ids": [
      4502,
      4503
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunsi Fei",
    "display_name": "Yunsi Fei",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "PETS": 1,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2022": 1
      },
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Masking Feedforward Neural Networks Against Power Analysis Attacks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1751,
    "paper_ids": [
      4506,
      4507
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Davide Frey",
    "display_name": "Davide Frey",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2025": 1
      },
      "ATC": {},
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hidden Issuer Anonymous Credential",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Low-Cost Privacy-Preserving Decentralized Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "donar anonymous voip over tor",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 1752,
    "paper_ids": [
      4508,
      3429
    ],
    "papers_without_artifact_ids": [
      4509
    ]
  },
  {
    "name": "Darion Cassel",
    "display_name": "Darion Cassel",
    "affiliation": "Amazon Web Services",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1753,
    "paper_ids": [
      2586,
      3405
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pithayuth Charnsethikul",
    "display_name": "Pithayuth Charnsethikul",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "I know what you did on Venmo: Discovering privacy leaks in mobile social payments",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Navigating Social Media Privacy: Awareness, Preferences, and Discoverability",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1754,
    "paper_ids": [
      2194,
      2195
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kanav Gupta",
    "display_name": "Kanav Gupta",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LLAMA: A Low Latency Math Library for Secure Inference",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SIGMA: Secure GPT Inference with Function Secret Sharing",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1755,
    "paper_ids": [
      2534,
      2536
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Quinn Burke 0002",
    "display_name": "Quinn Burke",
    "affiliation": "University of Wisconsin-Madison",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "PETS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2022": 1
      },
      "FAST": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building a Privacy-Preserving Smart Camera System",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure IP Address Allocation at Cloud Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on scalable integrity checking for secure cloud disks",
        "conference": "FAST",
        "year": 2025
      }
    ],
    "author_id": 1756,
    "paper_ids": [
      2165,
      3038
    ],
    "papers_without_artifact_ids": [
      3409
    ]
  },
  {
    "name": "Blaine Hoak",
    "display_name": "Blaine Hoak",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building a Privacy-Preserving Smart Camera System",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure IP Address Allocation at Cloud Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the space of adversarial strategies",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1757,
    "paper_ids": [
      2165,
      3038
    ],
    "papers_without_artifact_ids": [
      3410
    ]
  },
  {
    "name": "Ryan Sheatsley",
    "display_name": "Ryan Sheatsley",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "NDSS": 1,
      "PETS": 1,
      "FAST": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2022": 1
      },
      "FAST": {
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building a Privacy-Preserving Smart Camera System",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure IP Address Allocation at Cloud Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on scalable integrity checking for secure cloud disks",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "the space of adversarial strategies",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1758,
    "paper_ids": [
      2165,
      3038
    ],
    "papers_without_artifact_ids": [
      3409,
      3410
    ]
  },
  {
    "name": "Eric Pauley",
    "display_name": "Eric Pauley",
    "affiliation": "Virginia Tech",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "NDSS": 1,
      "PETS": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2023": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building a Privacy-Preserving Smart Camera System",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Secure IP Address Allocation at Cloud Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the space of adversarial strategies",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "dscope a cloudnative internet telescope",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1759,
    "paper_ids": [
      2165,
      3038
    ],
    "papers_without_artifact_ids": [
      3410,
      3411
    ]
  },
  {
    "name": "Tom Biselli",
    "display_name": "Tom Biselli",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 4
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Supporting Informed Choices about Browser Cookies: The Impact of Personalised Cookie Banners",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "support personas a concept for tailored support of users of privacyenhancing technologies",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "privacy concerns and acceptance factors of osint for cybersecurity a representative survey",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 1760,
    "paper_ids": [
      3412,
      3413
    ],
    "papers_without_artifact_ids": [
      3415,
      3416
    ]
  },
  {
    "name": "Juan Ramón Troncoso-Pastoriza",
    "display_name": "Juan Ramón Troncoso-Pastoriza",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 4,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2021": 3
      },
      "USENIXSEC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Multiparty Homomorphic Encryption from Ring-Learning-with-Errors",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scalable privacypreserving distributed learning",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "sok privacypreserving collaborative treebased model learning",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "privacy and integrity preserving computations with crisp",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 7961,
    "paper_ids": [
      2557,
      3400
    ],
    "papers_without_artifact_ids": [
      3402,
      3403,
      3404
    ]
  },
  {
    "name": "Daniel Smullen",
    "display_name": "Daniel Smullen",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "PETS": 5,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1,
        "2025": 1,
        "2021": 2
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Increasing Adoption of Tor Browser Using Informational and Planning Nudges",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Defining Privacy Engineering as a Profession",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "awareness adoption and misconceptions of web privacy tools",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "managing potentially intrusive practices in the browser a usercentered perspective",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "the best of both worlds mitigating tradeoffs between accuracy and user burden in capturing mobile app privacy preferences",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "from intent to action nudging users towards secure mobile payments",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1762,
    "paper_ids": [
      2500,
      4510
    ],
    "papers_without_artifact_ids": [
      2513,
      4511,
      4512,
      2514
    ]
  },
  {
    "name": "Christo Wilson",
    "display_name": "Christo Wilson",
    "affiliation": "Northeastern University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "EUROSYS": 0,
      "USENIXSEC": 0,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2024": 1
      },
      "EUROSYS": {},
      "USENIXSEC": {},
      "NSDI": {
        "2016": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Setting the Bar Low: Are Websites Complying With the Minimum Requirements of the CCPA?",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Johnny Still Can't Opt-out: Assessing the IAB CCPA Compliance Framework",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploring crossapplication cellular traffic optimization with baidu trafficguard",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 1763,
    "paper_ids": [
      4513,
      4514
    ],
    "papers_without_artifact_ids": [
      635
    ]
  },
  {
    "name": "Haohuang Wen",
    "display_name": "Haohuang Wen",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "NDSS": 1,
      "PETS": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "PETS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "egg hunt in tesla infotainment a first look at reverse engineering of qt binaries",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "plugnpwned comprehensive vulnerability analysis of obdii dongles as a new overtheair attack surface in automotive iot",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1764,
    "paper_ids": [
      385,
      386
    ],
    "papers_without_artifact_ids": [
      392,
      396
    ]
  },
  {
    "name": "Mona Wang",
    "display_name": "Mona Wang",
    "affiliation": "Princeton University",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2025": 1,
        "2026": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022,
      2025
    ],
    "year_range": "2022-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Leveraging strategic connection migration-powered traffic splitting for privacy",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "What WeChat Knows: Pervasive First-Party Tracking in a Billion-User Super-App Ecosystem",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "quicstep evaluating connection migration based quic censorship circumvention",
        "conference": "PETS",
        "year": 2026
      },
      {
        "title": "account verification on social media user perceptions and paid enrollment",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1765,
    "paper_ids": [
      134,
      137
    ],
    "papers_without_artifact_ids": [
      140,
      4274
    ]
  },
  {
    "name": "Lennart Oldenburg",
    "display_name": "Lennart Oldenburg",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2024": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From \"Onion Not Found\" to Guard Discovery",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MixMatch: Flow Matching for Mixnet Traffic",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1766,
    "paper_ids": [
      1907,
      1908
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Donghang Lu",
    "display_name": "Donghang Lu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "RPM: Robust Anonymity at Scale",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1767,
    "paper_ids": [
      2575,
      2576
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Takao Murakami",
    "display_name": "Takao Murakami",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2023": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a Location Trace Anonymization Contest",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces with Cluster-Specific Features",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "communicationefficient triangle counting under local differential privacy",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "locally differentially private analysis of graph statistics",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "exposing private user behaviors of collaborative filtering via model inversion techniques",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 1768,
    "paper_ids": [
      4515,
      4516
    ],
    "papers_without_artifact_ids": [
      4517,
      4518,
      4519
    ]
  },
  {
    "name": "Koki Hamada",
    "display_name": "Koki Hamada",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 4
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2023": 2,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a Location Trace Anonymization Contest",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces with Cluster-Specific Features",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "efficient decision tree training with new data structure for secure multiparty computation",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "adam in private secure and fast training of deep neural networks with adaptive moment estimation",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 1769,
    "paper_ids": [
      4515,
      4516
    ],
    "papers_without_artifact_ids": [
      4520,
      4397
    ]
  },
  {
    "name": "Takuma Hatano",
    "display_name": "Takuma Hatano",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a Location Trace Anonymization Contest",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces with Cluster-Specific Features",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1770,
    "paper_ids": [
      4515,
      4516
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hannah Davis",
    "display_name": "Hannah Davis",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Verifiable Distributed Aggregation Functions",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1771,
    "paper_ids": [
      4499,
      2596
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christopher Patton",
    "display_name": "Christopher Patton",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Verifiable Distributed Aggregation Functions",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1772,
    "paper_ids": [
      4499,
      2596
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Franziska Boenisch",
    "display_name": "Franziska Boenisch",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Unified Framework for Quantifying Privacy Risk in Synthetic Data",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1773,
    "paper_ids": [
      4521,
      4522
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alfredo Rial",
    "display_name": "Alfredo Rial",
    "affiliation": "Thomas J. Watson Research Center, Yorktown Heights, USA",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2021": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Compact and Divisible E-Cash with Threshold Issuance",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Unlinkable Updatable Hiding Databases and Privacy-Preserving Loyalty Programs",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1774,
    "paper_ids": [
      4523,
      4524
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simon Hanisch",
    "display_name": "Simon Hanisch",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding Person Identification Through Gait",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Fantômas: Understanding Face Anonymization Reversibility",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a false sense of privacy towards a reliable evaluation methodology for the anonymization of biometric data",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 6615,
    "paper_ids": [
      2174,
      2176
    ],
    "papers_without_artifact_ids": [
      2179
    ]
  },
  {
    "name": "Thomas Engel 0001",
    "display_name": "Thomas Engel",
    "affiliation": "University of Luxembourg",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1775,
    "paper_ids": [
      4525,
      4526
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sikhar Patranabis",
    "display_name": "Sikhar Patranabis",
    "affiliation": "IBM Research India, Bangalore, India",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "CHES": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 1
      },
      "CHES": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SWiSSSE: System-Wide Security for Searchable Symmetric Encryption",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rassle return address stack based sidechannel leakage",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 1776,
    "paper_ids": [
      2383,
      4224
    ],
    "papers_without_artifact_ids": [
      2387
    ]
  },
  {
    "name": "Evangelia Anna Markatou",
    "display_name": "Evangelia Anna Markatou",
    "affiliation": "TU Delft",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attacks on Encrypted Response-Hiding Range Search Schemes in Multiple Dimensions",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "time and spaceefficient aggregate range queries over encrypted databases",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 1777,
    "paper_ids": [
      3358,
      3359
    ],
    "papers_without_artifact_ids": [
      4360
    ]
  },
  {
    "name": "Nishat Koti",
    "display_name": "Nishat Koti",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 4,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 2,
        "2025": 2
      },
      "USENIXSEC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ruffle: Rapid 3-Party Shuffle Protocols",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MultiCent: Secure and Scalable Computation of Centrality Measures on Multilayer Graphs",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "match quest fast and secure pattern matching",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "find thy neighbourhood privacypreserving local clustering",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "swift superfast and robust privacypreserving machine learning",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1778,
    "paper_ids": [
      4527,
      2969
    ],
    "papers_without_artifact_ids": [
      4528,
      4529,
      3123
    ]
  },
  {
    "name": "Varsha Bhat Kukkala",
    "display_name": "Varsha Bhat Kukkala",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 5
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2023": 2,
        "2025": 2
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2025
    ],
    "year_range": "2023-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ruffle: Rapid 3-Party Shuffle Protocols",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "MultiCent: Secure and Scalable Computation of Centrality Measures on Multilayer Graphs",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "match quest fast and secure pattern matching",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "find thy neighbourhood privacypreserving local clustering",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "identifying influential spreaders in a social network while preserving privacy",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 1779,
    "paper_ids": [
      4527,
      2969
    ],
    "papers_without_artifact_ids": [
      4528,
      4529,
      4530
    ]
  },
  {
    "name": "Marc Rivinius",
    "display_name": "Marc Rivinius",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Convolutions in Overdrive: Maliciously Secure Convolutions for MPC",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Multipars: Reduced-Communication MPC over Z2k",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1780,
    "paper_ids": [
      4531,
      4532
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pascal Reisert",
    "display_name": "Pascal Reisert",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 1,
        "2026": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Convolutions in Overdrive: Maliciously Secure Convolutions for MPC",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Multipars: Reduced-Communication MPC over Z2k",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gaze3p gazebased prediction of userperceived privacy",
        "conference": "PETS",
        "year": 2026
      }
    ],
    "author_id": 1781,
    "paper_ids": [
      4531,
      4532
    ],
    "papers_without_artifact_ids": [
      4533
    ]
  },
  {
    "name": "Sebastian Hasler",
    "display_name": "Sebastian Hasler",
    "affiliation": "University of Stuttgart",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Convolutions in Overdrive: Maliciously Secure Convolutions for MPC",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Multipars: Reduced-Communication MPC over Z2k",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1782,
    "paper_ids": [
      4531,
      4532
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ralf Küsters",
    "display_name": "Ralf Küsters",
    "affiliation": "University of Stuttgart",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 1,
        "2026": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Convolutions in Overdrive: Maliciously Secure Convolutions for MPC",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Multipars: Reduced-Communication MPC over Z2k",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gaze3p gazebased prediction of userperceived privacy",
        "conference": "PETS",
        "year": 2026
      }
    ],
    "author_id": 7962,
    "paper_ids": [
      4531,
      4532
    ],
    "papers_without_artifact_ids": [
      4533
    ]
  },
  {
    "name": "Hayim Shaul",
    "display_name": "Hayim Shaul",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 4,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2023": 1,
        "2024": 2
      },
      "CHES": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privacy Preserving Feature Selection for Sparse Linear Regression",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secure rangesearching using copyandrecurse",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "secure kish nearest neighbors classifier",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 1784,
    "paper_ids": [
      4534,
      4535
    ],
    "papers_without_artifact_ids": [
      4536,
      4537
    ]
  },
  {
    "name": "Andrea Cavallaro",
    "display_name": "Andrea Cavallaro",
    "affiliation": "Queen Mary University of London",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Learning Privacy from Visual Entities",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Identifying Privacy Personas",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1785,
    "paper_ids": [
      4538,
      4539
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Catuscia Palamidessi",
    "display_name": "Catuscia Palamidessi",
    "affiliation": "cole Polytechnique, Paris, France",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enhancing Metric Privacy With a Shuffler",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PRIVIC: A privacy-preserving method for incremental collection of location data",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1786,
    "paper_ids": [
      4540,
      3431
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hao Cui 0004",
    "display_name": "Hao Cui",
    "affiliation": "Nanjing University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understanding Privacy Norms through Web Forms",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "BehaVR: User Identification Based on VR Sensor Data",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1787,
    "paper_ids": [
      964,
      965
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ha Dao",
    "display_name": "Ha Dao",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Intractable Cookie Crumbs: Unveiling the Nexus of Stateful Banner Interaction and Tracking Cookies",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Unmasking the Shadows: A Cross-Country Study of Online Tracking in Illegal Movie Streaming Services",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1788,
    "paper_ids": [
      3360,
      3361
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Julia B. Kieserman",
    "display_name": "Julia B. Kieserman",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tracker Installations Are Not Created Equal: Understanding Tracker Configuration of Form Data Collection",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "More and Scammier Ads: The Perils of YouTube's Ad Privacy Settings",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1789,
    "paper_ids": [
      4541,
      4542
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Athanasios Andreou",
    "display_name": "Athanasios Andreou",
    "affiliation": "New York University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tracker Installations Are Not Created Equal: Understanding Tracker Configuration of Form Data Collection",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "More and Scammier Ads: The Perils of YouTube's Ad Privacy Settings",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1790,
    "paper_ids": [
      4541,
      4542
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tobias Lauinger",
    "display_name": "Tobias Lauinger",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      },
      "USENIXSEC": {
        "2022": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tracker Installations Are Not Created Equal: Understanding Tracker Configuration of Form Data Collection",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "More and Scammier Ads: The Perils of YouTube's Ad Privacy Settings",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an audit of facebooks political ad policy enforcement",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "swiped analyzing groundtruth data of a marketplace for stolen debit and credit cards",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1791,
    "paper_ids": [
      4541,
      4542
    ],
    "papers_without_artifact_ids": [
      4254,
      4543
    ]
  },
  {
    "name": "Damon McCoy",
    "display_name": "Damon McCoy",
    "affiliation": "New York University",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "PETS": 5,
      "USENIXSEC": 4,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2025": 2,
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2022": 1,
        "2021": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 22.2,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tracker Installations Are Not Created Equal: Understanding Tracker Configuration of Form Data Collection",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "More and Scammier Ads: The Perils of YouTube's Ad Privacy Settings",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "what to expect when youre accessing an exploration of user privacy rights in people search websites",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "say im in publici dont want my nudes to pop up user threat models for using vault applications",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "no privacy among spies assessing the functionality and insecurity of consumer android spyware apps",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "it feels like whackamole user experiences of data removal from people search websites",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "an audit of facebooks political ad policy enforcement",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "swiped analyzing groundtruth data of a marketplace for stolen debit and credit cards",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "the tools and tactics used in intimate partner surveillance an analysis of online infidelity forums",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1792,
    "paper_ids": [
      4541,
      4542
    ],
    "papers_without_artifact_ids": [
      4544,
      4545,
      4546,
      4547,
      4254,
      4543,
      4290
    ]
  },
  {
    "name": "Yongqin Wang",
    "display_name": "Yongqin Wang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PIGEON: A High Throughput Framework for Private Inference of Neural Networks using Secure Multiparty Computation",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1793,
    "paper_ids": [
      2600,
      2601
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hassan Jameel Asghar",
    "display_name": "Hassan Jameel Asghar",
    "affiliation": "Macquarie University",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "PETS": 6,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 2,
        "2022": 1,
        "2023": 1,
        "2025": 2
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical, Private Assurance of the Value of Collaboration via Fully Homomorphic Encryption",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unintended memorization and timing attacks in named entity recognition models",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "making the most of parallel composition in differential privacy",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "not all attributes are created equal dx private mechanisms for linear queries",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "averaging attacks on bounded noisebased disclosure control algorithms",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 1794,
    "paper_ids": [
      4548,
      4549
    ],
    "papers_without_artifact_ids": [
      4550,
      4551,
      4552,
      4553
    ]
  },
  {
    "name": "Zhigang Lu 0001",
    "display_name": "Zhigang Lu",
    "affiliation": "Western Sydney University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical, Private Assurance of the Value of Collaboration via Fully Homomorphic Encryption",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dppromise differentially private diffusion probabilistic models for image synthesis",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1795,
    "paper_ids": [
      4548,
      1571
    ],
    "papers_without_artifact_ids": [
      1577
    ]
  },
  {
    "name": "Dali Kaafar",
    "display_name": "Dali Kaafar",
    "affiliation": "Macquarie University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 4,
      "ACSAC": 0,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2025": 1,
        "2021": 1,
        "2026": 1
      },
      "ACSAC": {},
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025,
      2026
    ],
    "year_range": "2025-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical, Private Assurance of the Value of Collaboration via Fully Homomorphic Encryption",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "dX-Privacy for Text and the Curse of Dimensionality",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fast identity online with anonymous credentials fidoac",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "the audio auditor userlevel membership inference in internet of things voice services",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "averaging attacks on bounded noisebased disclosure control algorithms",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 1796,
    "paper_ids": [
      4548,
      4554
    ],
    "papers_without_artifact_ids": [
      4555,
      1580,
      4553
    ]
  },
  {
    "name": "Primal Pappachan",
    "display_name": "Primal Pappachan",
    "affiliation": "Portland State University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Time-Efficient Locally Relevant Geo-Location Privacy Protection",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1797,
    "paper_ids": [
      4556,
      4557
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Frank Kargl",
    "display_name": "Frank Kargl",
    "affiliation": "University of Ulm",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 0,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2021": 1
      },
      "USENIXSEC": {},
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PrePaMS: Privacy-Preserving Participant Management System for Studies with Rewards and Prerequisites",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1798,
    "paper_ids": [
      3420,
      1441
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nurullah Demir",
    "display_name": "Nurullah Demir",
    "affiliation": "Institut for Internet Security",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding Regional Filter Lists: Efficacy and Impact",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Large-Scale Study of Cookie Banner Interaction Tools and their Impact on Users' Privacy",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1799,
    "paper_ids": [
      110,
      2203
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Norbert Pohlmann",
    "display_name": "Norbert Pohlmann",
    "affiliation": "Westphalia University of Applied Sciences Gelsenkirchen, Germany",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "EUROSYS": 0,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      },
      "EUROSYS": {},
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding Regional Filter Lists: Efficacy and Impact",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Large-Scale Study of Cookie Banner Interaction Tools and their Impact on Users' Privacy",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 1800,
    "paper_ids": [
      110,
      2203
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tobias Urban",
    "display_name": "Tobias Urban",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 4,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 2,
        "2025": 1,
        "2024": 1
      },
      "ACSAC": {
        "2019": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding Regional Filter Lists: Efficacy and Impact",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Large-Scale Study of Cookie Banner Interaction Tools and their Impact on Users' Privacy",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "we may share the number of diaper changes a privacy and security analysis of mobile child care applications",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "investigating gdpr fines in the light of data flows",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 1801,
    "paper_ids": [
      110,
      2203
    ],
    "papers_without_artifact_ids": [
      4558,
      4559
    ]
  },
  {
    "name": "René Raab",
    "display_name": "René Raab",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "SoK: Descriptive Statistics Under Local Differential Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Estimating Group Means Under Local Differential Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7963,
    "paper_ids": [
      4560,
      4561
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anne-Marie Kermarrec",
    "display_name": "Anne-Marie Kermarrec",
    "affiliation": "EPFL",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "SOSP": 0,
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      },
      "SOSP": {},
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Low-Cost Privacy-Preserving Decentralized Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Noiseless Privacy-Preserving Decentralized Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "decentralized learning made easy with decentralizepy",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 1803,
    "paper_ids": [
      3429,
      3430
    ],
    "papers_without_artifact_ids": [
      4562
    ]
  },
  {
    "name": "Rafael Pires 0001",
    "display_name": "Rafael Pires",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      },
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Low-Cost Privacy-Preserving Decentralized Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Noiseless Privacy-Preserving Decentralized Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "decentralized learning made easy with decentralizepy",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 1804,
    "paper_ids": [
      3429,
      3430
    ],
    "papers_without_artifact_ids": [
      4562
    ]
  },
  {
    "name": "Rishi Sharma 0001",
    "display_name": "Rishi Sharma",
    "affiliation": "Stony Brook University",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      },
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Low-Cost Privacy-Preserving Decentralized Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Noiseless Privacy-Preserving Decentralized Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "decentralized learning made easy with decentralizepy",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 1805,
    "paper_ids": [
      3429,
      3430
    ],
    "papers_without_artifact_ids": [
      4562
    ]
  },
  {
    "name": "Ni Trieu",
    "display_name": "Ni Trieu",
    "affiliation": "Arizona State University",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "PETS": 6
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2025": 2,
        "2024": 3
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Achieving Data Reconstruction Hardness and Efficient Computation in Multiparty Minimax Training",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Delegated Private Matching For Compute",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secureed secure multiparty edit distance for genomic sequences",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "toward a practical multiparty private set union",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "multiparty private set intersection cardinality and its applications",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "practical privacypreserving kmeans clustering",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 1806,
    "paper_ids": [
      4563,
      2598
    ],
    "papers_without_artifact_ids": [
      2599,
      4564,
      4565,
      4566
    ]
  },
  {
    "name": "Ye Zheng",
    "display_name": "Ye Zheng",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Locally Differentially Private Frequency Estimation via Joint Randomized Response",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Optimal Piecewise-based Mechanism for Collecting Bounded Numerical Data under Local Differential Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1807,
    "paper_ids": [
      4567,
      4568
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yidan Hu",
    "display_name": "Yidan Hu",
    "affiliation": "Purdue University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Locally Differentially Private Frequency Estimation via Joint Randomized Response",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Optimal Piecewise-based Mechanism for Collecting Bounded Numerical Data under Local Differential Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1808,
    "paper_ids": [
      4567,
      4568
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Konstantinos Psounis",
    "display_name": "Konstantinos Psounis",
    "affiliation": "University of Southern California",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 4,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 2,
        "2025": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Echoes of Privacy: Uncovering the Profiling Practices of Voice Assistants",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SPINML: Customized Synthetic Data Generation for Private Training of Specialized ML Models",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a utilitypreserving obfuscation approach for youtube recommendations",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "how much privacy does federated learning with secure aggregation guarantee",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 1809,
    "paper_ids": [
      4495,
      4569
    ],
    "papers_without_artifact_ids": [
      811,
      4570
    ]
  },
  {
    "name": "Margaret Pierce",
    "display_name": "Margaret Pierce",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Silent Splitter: Privacy for Payment Splitting via New Protocols for Distributed Point Functions",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Onion Franking: Abuse Reports for Mix-Based Private Messaging",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1810,
    "paper_ids": [
      1512,
      1516
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jeffrey Knockel",
    "display_name": "Jeffrey Knockel",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2,
        "2024": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "What WeChat Knows: Pervasive First-Party Tracking in a Billion-User Super-App Ecosystem",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Attacking Connection Tracking Frameworks as used by Virtual Private Networks",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an analysis of chinese censorship bias in llms",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "how great is the great firewall measuring chinas dns censorship",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1811,
    "paper_ids": [
      137,
      4291
    ],
    "papers_without_artifact_ids": [
      4571,
      2993
    ]
  },
  {
    "name": "Pratik Sarkar",
    "display_name": "Pratik Sarkar",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1812,
    "paper_ids": [
      2596,
      2597
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiang Zhang 0003",
    "display_name": "Jiang Zhang",
    "affiliation": "Meta Platforms, Inc., Menlo Park, CA, USA",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "PETS": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "PETS": {
        "2023": 2,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "PETS"
    ],
    "years": [
      2021,
      2025
    ],
    "year_range": "2021-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SPINML: Customized Synthetic Data Generation for Private Training of Specialized ML Models",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "SANRAZOR: Reducing Redundant Sanitizer Checks in C/C++ Programs",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a utilitypreserving obfuscation approach for youtube recommendations",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "how much privacy does federated learning with secure aggregation guarantee",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 1813,
    "paper_ids": [
      4569,
      951
    ],
    "papers_without_artifact_ids": [
      811,
      4570
    ]
  },
  {
    "name": "Adi Akavia",
    "display_name": "Adi Akavia",
    "affiliation": "University of Haifa",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 3,
      "CHES": 0,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1,
        "2026": 1
      },
      "CHES": {},
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Message Authentication Code with Fast Verification over Encrypted Data and Applications",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Privacy Preserving Feature Selection for Sparse Linear Regression",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "argmax and xgboost training over fully homomorphic encryption",
        "conference": "PETS",
        "year": 2026
      },
      {
        "title": "csher a system for compact storage with heretrieval",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 1814,
    "paper_ids": [
      4572,
      4535
    ],
    "papers_without_artifact_ids": [
      4573,
      4574
    ]
  },
  {
    "name": "Nirajan Koirala",
    "display_name": "Nirajan Koirala",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HyDia: FHE-based Facial Matching with Hybrid Approximations and Diagonalization",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1815,
    "paper_ids": [
      4575,
      4576
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Taeho Jung",
    "display_name": "Taeho Jung",
    "affiliation": "University of Notre Dame",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HyDia: FHE-based Facial Matching with Hybrid Approximations and Diagonalization",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1816,
    "paper_ids": [
      4575,
      4576
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sajin Sasy",
    "display_name": "Sajin Sasy",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TEEMS: A Trusted Execution Environment based Metadata-protected Messaging System",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok metadataprotecting communication systems",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 1817,
    "paper_ids": [
      1287,
      1288
    ],
    "papers_without_artifact_ids": [
      1289
    ]
  },
  {
    "name": "Matthew Gregoire",
    "display_name": "Matthew Gregoire",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CheckOut: User-Controlled Anonymization for Customer Loyalty Programs",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Onion Franking: Abuse Reports for Mix-Based Private Messaging",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1818,
    "paper_ids": [
      1513,
      1516
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gabriel Kaptchuk",
    "display_name": "Gabriel Kaptchuk",
    "affiliation": "Univ. of Maryland - College Park",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "PETS": 5,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2025": 1,
        "2024": 1,
        "2026": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2026
    ],
    "year_range": "2024-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SocIoTy: Practical Cryptography in Smart Home Contexts",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Making Sense of Private Advertising: A Principled Approach to a Complex Ecosystem",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "models matter setting accurate privacy expectations for local and central differential privacy",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "efficient proofs of software exploitability for realworld processors",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "what are the chances explaining the epsilon parameter in differential privacy",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "efficient set membership proofs using mpcinthehead",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 1819,
    "paper_ids": [
      3237,
      2445
    ],
    "papers_without_artifact_ids": [
      3209,
      4207,
      3215,
      4208
    ]
  },
  {
    "name": "Joe Champeau",
    "display_name": "Joe Champeau",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Website Data Transparency in the Browser",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Generalizable Active Privacy Choice: Designing a Graphical User Interface for Global Privacy Control",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1820,
    "paper_ids": [
      3425,
      3426
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Johannes Müller 0001",
    "display_name": "Johannes Müller",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 2
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeVoS: Deniable Yet Verifiable Vote Updating",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Post-quantum XML and SAML Single Sign-On",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok secure evoting with everlasting privacy",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 7964,
    "paper_ids": [
      4577,
      4578
    ],
    "papers_without_artifact_ids": [
      4579
    ]
  },
  {
    "name": "Se Eun Oh",
    "display_name": "Se Eun Oh",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeTorrent: An Adversarial Padding-only Traffic Analysis Defense",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GANDaLF: GAN for Data-Limited Fingerprinting",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1822,
    "paper_ids": [
      4580,
      4494
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nicholas Hopper",
    "display_name": "Nicholas Hopper",
    "affiliation": "University of Minnesota",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2024": 1,
        "2021": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeTorrent: An Adversarial Padding-only Traffic Analysis Defense",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "GANDaLF: GAN for Data-Limited Fingerprinting",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "regulator a straightforward website fingerprinting defense",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 1823,
    "paper_ids": [
      4580,
      4494
    ],
    "papers_without_artifact_ids": [
      4581
    ]
  },
  {
    "name": "Killian Davitt",
    "display_name": "Killian Davitt",
    "affiliation": "University College London",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1,
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2026
    ],
    "year_range": "2024-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Are we collaborative yet? A Usability Perspective on Mixnet Latency for Real-Time Applications",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1824,
    "paper_ids": [
      4582,
      4583
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dan Ristea",
    "display_name": "Dan Ristea",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1,
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2026
    ],
    "year_range": "2024-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Are we collaborative yet? A Usability Perspective on Mixnet Latency for Real-Time Applications",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1825,
    "paper_ids": [
      4582,
      4583
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Steven J. Murdoch",
    "display_name": "Steven J. Murdoch",
    "affiliation": "University College London",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1,
        "2026": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2026
    ],
    "year_range": "2024-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Are we collaborative yet? A Usability Perspective on Mixnet Latency for Real-Time Applications",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1826,
    "paper_ids": [
      4582,
      4583
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ashish Panwar",
    "display_name": "Ashish Panwar",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "OSDI",
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SIGMA: Secure GPT Inference with Function Secret Sharing",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Taming Throughput-Latency Tradeoff in LLM Inference with Sarathi-Serve",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1827,
    "paper_ids": [
      2536,
      3795
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Srdan Krstic",
    "display_name": "Srdan Krstic",
    "affiliation": "ETH Zurich",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "User-Controlled Privacy: Taint, Track, and Control",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Model-driven Privacy",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1828,
    "paper_ids": [
      448,
      449
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ethan Witwer",
    "display_name": "Ethan Witwer",
    "affiliation": "Linköping University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1,
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024,
      2026
    ],
    "year_range": "2024-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Raising the Bar: Improved Fingerprinting Attacks and Defenses for Video Streaming Traffic",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Ephemeral Network-Layer Fingerprinting Defenses",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1829,
    "paper_ids": [
      1918,
      1919
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nathan Reitinger",
    "display_name": "Nathan Reitinger",
    "affiliation": "University of Maryland",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "PETS": 4,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 2,
        "2021": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "What Does It Mean to Be Creepy? Responses to Visualizations of Personal Browsing Activity, Online Tracking, and Targeted Ads",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ML-CB: Machine Learning Canvas Block",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "help me help you privacy considerations for third party iot device repair",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "contextualizing interpersonal data sharing in smart homes",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "pursuing usable and useful data downloads under gdprccpa access rights via codesign",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "what twitter knows characterizing ad targeting practices user perceptions and ad explanations through users own twitter data",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1830,
    "paper_ids": [
      1261,
      1262
    ],
    "papers_without_artifact_ids": [
      4584,
      4585,
      1274,
      1278
    ]
  },
  {
    "name": "Michal Król",
    "display_name": "Michal Król",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "PETS": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "EL PASSO: Efficient and Lightweight Privacy-preserving Single Sign On",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Content Censorship in the InterPlanetary File System",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "guardians of the galaxy content moderation in the interplanetary file system",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 7965,
    "paper_ids": [
      2915,
      4586
    ],
    "papers_without_artifact_ids": [
      4587
    ]
  },
  {
    "name": "Etienne Rivière",
    "display_name": "Etienne Rivière",
    "affiliation": "Université Catholique de Louvain",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "NDSS": 1,
      "PETS": 2,
      "EUROSYS": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "PETS": {
        "2022": 1,
        "2021": 1
      },
      "EUROSYS": {},
      "NSDI": {
        "2009": 1,
        "2022": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2021,
      2024
    ],
    "year_range": "2021-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "EL PASSO: Efficient and Lightweight Privacy-preserving Single Sign On",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Content Censorship in the InterPlanetary File System",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "donar anonymous voip over tor",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "sok privacyenhancing smart home hubs",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "splay distributed systems evaluation made simple or how to turn ideas into live systems in a breeze",
        "conference": "NSDI",
        "year": 2009
      }
    ],
    "author_id": 7966,
    "paper_ids": [
      2915,
      4586
    ],
    "papers_without_artifact_ids": [
      4509,
      4588,
      4589
    ]
  },
  {
    "name": "Mahmood Sharif",
    "display_name": "Mahmood Sharif",
    "affiliation": "Tel Aviv University",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "NDSS": 1,
      "PETS": 1,
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "PETS": {
        "2026": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2024,
      2026
    ],
    "year_range": "2024-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bot Among Us: Exploring User Awareness and Privacy Concerns About Chatbots in Group Chats",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Group-based Robustness: A General Framework for Customized Robustness in the Real World",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a high coverage cybersecurity scale predictive of user behavior",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "adversarial training for rawbinary malware classifiers",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "how risky are real users ifttt applets",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1833,
    "paper_ids": [
      3353,
      2588
    ],
    "papers_without_artifact_ids": [
      4590,
      2593,
      1827
    ]
  },
  {
    "name": "Eric Zeng 0001",
    "display_name": "Eric Zeng",
    "affiliation": "University of Wisconsin - Madison",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "NDSS": 2,
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "PETS": {
        "2026": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS",
      "PETS"
    ],
    "years": [
      2024,
      2026
    ],
    "year_range": "2024-2026",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Location-Enhanced Information Flow for Home Automations",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Attributions for ML-based ICS Anomaly Detection: From Theory to Practice",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "transparency or information overload evaluating users comprehension and perceptions of the ios app privacy report",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "antiprivacy and antisecurity advice on tiktok case studies of technologyenabled surveillance and control in intimate partner and parentchild relationships",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 1834,
    "paper_ids": [
      2587,
      2589
    ],
    "papers_without_artifact_ids": [
      2590,
      4154
    ]
  },
  {
    "name": "Kevin Gallagher 0001",
    "display_name": "Kevin Gallagher",
    "affiliation": "BITS Pilani",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 4
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2024": 1,
        "2026": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Obscura: Enabling Ephemeral Proxies for Traffic Encapsulation in WebRTC Media Streams Against Cost-Effective Censors",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "ReporTor: Facilitating User Reporting of Issues Encountered in Naturalistic Web Browsing via Tor Browser",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "what to expect when youre accessing an exploration of user privacy rights in people search websites",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "it feels like whackamole user experiences of data removal from people search websites",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 1835,
    "paper_ids": [
      4591,
      4195
    ],
    "papers_without_artifact_ids": [
      4544,
      4547
    ]
  },
  {
    "name": "Henry Hoffmann",
    "display_name": "Henry Hoffmann",
    "affiliation": "University of Chicago",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "NDSS": 1,
      "SOSP": 0,
      "SC": 0,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2020": 1
      },
      "NDSS": {
        "2024": 1
      },
      "SOSP": {},
      "SC": {},
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "both",
    "conferences": [
      "NDSS",
      "OSDI"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Acoustic Keystroke Leakage on Smart Televisions",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LinnOS: Predictability on Unpredictable Flash Storage with a Light Neural Network",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "chameleonapi automatic and efficient customization of neural networks for ml applications",
        "conference": "OSDI",
        "year": 2024
      }
    ],
    "author_id": 1836,
    "paper_ids": [
      3378,
      3631
    ],
    "papers_without_artifact_ids": [
      3483
    ]
  },
  {
    "name": "Zitao Chen 0001",
    "display_name": "Zitao Chen",
    "affiliation": "University of Kansas",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "A Method to Facilitate Membership Inference Attacks in Deep Learning Models",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1837,
    "paper_ids": [
      3027,
      3028
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianwei Liu 0001",
    "display_name": "Jianwei Liu",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "NDSS": 2,
      "CHES": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "CHES": {
        "2023": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacypreserving multiple sequence alignment scheme for long gene sequence",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "some new methods to generate short addition chains",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 1838,
    "paper_ids": [
      2567,
      1134
    ],
    "papers_without_artifact_ids": [
      4592,
      4593
    ]
  },
  {
    "name": "Mahdi Rahimi 0003",
    "display_name": "Mahdi Rahimi",
    "affiliation": "KU Leuven",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 2,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "LARMix: Latency-Aware Routing in Mix Networks",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LAMP: Lightweight Approaches for Latency Minimization in Mixnets with Practical Deployment Considerations",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1839,
    "paper_ids": [
      1909,
      1910
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Piyush Kumar Sharma",
    "display_name": "Piyush Kumar Sharma",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 6,
    "total_papers_by_conf": {
      "NDSS": 2,
      "PETS": 4
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "PETS": {
        "2020": 2,
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024,
      2025
    ],
    "year_range": "2024-2025",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "LARMix: Latency-Aware Routing in Mix Networks",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "LAMP: Lightweight Approaches for Latency Minimization in Mixnets with Practical Deployment Considerations",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cenpush blockingresistant control channel using push notifications",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "dolphin a cellular voice based internet shutdown resistance system",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "siegebreaker an sdn based practical decoy routing system",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "the road not taken rethinking the feasibility of voice calling over tor",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 1840,
    "paper_ids": [
      1909,
      1910
    ],
    "papers_without_artifact_ids": [
      4293,
      4594,
      4595,
      4596
    ]
  },
  {
    "name": "Yan Pang",
    "display_name": "Yan Pang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 2
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Black-box Membership Inference Attacks against Fine-tuned Diffusion Models",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      },
      {
        "title": "Towards Understanding Unsafe Video Generation",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "whitebox membership inference attacks against diffusion models",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 1841,
    "paper_ids": [
      897,
      192
    ],
    "papers_without_artifact_ids": [
      195
    ]
  },
  {
    "name": "Ayush Goel",
    "display_name": "Ayush Goel",
    "affiliation": "University of Michigan",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 2,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2022": 1
      },
      "NSDI": {
        "2024": 1,
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Horcrux: Automatic JavaScript Parallelism for Resource-Efficient Web Computation",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Jawa: Web Archival in the Era of JavaScript",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sprinter speeding up highfidelity crawling of the modern web",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "nearoptimal latency versus cost tradeoffs in geodistributed storage",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 1843,
    "paper_ids": [
      2609,
      2610
    ],
    "papers_without_artifact_ids": [
      2616,
      1955
    ]
  },
  {
    "name": "Shizhi Tang",
    "display_name": "Shizhi Tang",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "PET: Optimizing Tensor Programs with Partially Equivalent Transformations and Automated Corrections",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "EINNET: Optimizing Tensor Programs with Derivation-Based Transformations",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1844,
    "paper_ids": [
      1616,
      1619
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mark Theng",
    "display_name": "Mark Theng",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GoJournal: a verified, concurrent, crash-safe journaling system",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Verifying the DaisyNFS concurrent and crash-safe file system with sequential reasoning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1845,
    "paper_ids": [
      983,
      984
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonathan Eyolfson",
    "display_name": "Jonathan Eyolfson",
    "affiliation": "University of Waterloo",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2022": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "MemLiner: Lining up Tracing and Application for a Far-Memory-Friendly Runtime",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bamboo making preemptible instances resilient for affordable training of large dnns",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 1846,
    "paper_ids": [
      1617,
      2940
    ],
    "papers_without_artifact_ids": [
      1621
    ]
  },
  {
    "name": "Irina Calciu",
    "display_name": "Irina Calciu",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2022": 1
      },
      "SOSP": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021,
      2022
    ],
    "year_range": "2021-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "NrOS: Effective Replication and Sharing in an Operating System",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Application-Informed Kernel Synchronization Primitives",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1848,
    "paper_ids": [
      527,
      528
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gerd Zellweger",
    "display_name": "Gerd Zellweger",
    "affiliation": "VMware Research",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 3,
      "SOSP": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2023": 1,
        "2020": 1
      },
      "SOSP": {
        "2021": 1
      },
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021,
      2023
    ],
    "year_range": "2021-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "NrOS: Effective Replication and Sharing in an Operating System",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Sharding the State Machine: Automated Modular Reasoning for Complex Concurrent Systems",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how to diagnose nanosecond network latencies in rich endhost stacks",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "isolation in rust what is missing",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "redleaf isolation and communication in a safe operating system",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 1849,
    "paper_ids": [
      527,
      721
    ],
    "papers_without_artifact_ids": [
      3447,
      2841,
      2842
    ]
  },
  {
    "name": "Yuchen Qian",
    "display_name": "Yuchen Qian",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 2
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Application-Informed Kernel Synchronization Primitives",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "ODINFS: Scaling PM Performance with Opportunistic Delegation",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1850,
    "paper_ids": [
      528,
      529
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chuanxiong Guo",
    "display_name": "Chuanxiong Guo",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 14,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 0,
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 11,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2020": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {},
      "NSDI": {
        "2019": 3,
        "2023": 2,
        "2022": 2,
        "2018": 1,
        "2011": 1,
        "2015": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 14.3,
    "repro_rate": 50.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FAERY: An FPGA-accelerated Embedding-based Retrieval System",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "A Unified Architecture for Accelerating Distributed DNN Training in Heterogeneous GPU/CPU Clusters",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lyra elastic scheduling for deep learning clusters",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "srnic a scalable architecture for rdma nics",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "bgl gpuefficient gnn training by optimizing graph data io and preprocessing",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "tiara a scalable and efficient hardware acceleration architecture for stateful layer4 load balancing",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "collie finding performance anomalies in rdma subsystems",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "netbouncer active device and link failure localization in data center networks",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "tiresias a gpu cluster manager for distributed deep learning",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "freeflow softwarebased virtual rdma networking for containerized clouds",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "deepview virtual disk failure diagnosis and pattern detection for azure",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "explicit path control in commodity data centers design and applications",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "cubicring enabling onehop failure detection and recovery for distributed inmemory storage systems",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "serverswitch a programmable and high performance platform for data center networks",
        "conference": "NSDI",
        "year": 2011
      }
    ],
    "author_id": 1852,
    "paper_ids": [
      3711,
      2830
    ],
    "papers_without_artifact_ids": [
      2528,
      3862,
      2831,
      3863,
      2120,
      2854,
      1956,
      2832,
      3721,
      3864,
      4597,
      4598
    ]
  },
  {
    "name": "Jayashree Mohan",
    "display_name": "Jayashree Mohan",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 1,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2024": 1
      },
      "SOSP": {
        "2023": 1
      },
      "FAST": {
        "2021": 1,
        "2019": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Looking Beyond GPUs for DNN Scheduling on Multi-Tenant Clusters",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Taming Throughput-Latency Tradeoff in LLM Inference with Sarathi-Serve",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "project silica towards sustainable cloud archival storage in glass",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "checkfreq frequent finegrained dnn checkpointing",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "instalytics cluster filesystem codesign for bigdata analytics",
        "conference": "FAST",
        "year": 2019
      }
    ],
    "author_id": 1853,
    "paper_ids": [
      2684,
      3795
    ],
    "papers_without_artifact_ids": [
      4599,
      2689,
      3549
    ]
  },
  {
    "name": "Amar Phanishayee",
    "display_name": "Amar Phanishayee",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 10,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 0,
      "SC": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 2,
      "NSDI": 4
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2020": 1
      },
      "SOSP": {},
      "SC": {
        "2021": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {},
      "FAST": {
        "2008": 1,
        "2021": 1
      },
      "NSDI": {
        "2014": 1,
        "2017": 1,
        "2020": 1,
        "2007": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Looking Beyond GPUs for DNN Scheduling on Multi-Tenant Clusters",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Heterogeneity-Aware Cluster Scheduling Policies for Deep Learning Workloads",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "blox a modular toolkit for deep learning schedulers",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "checkfreq frequent finegrained dnn checkpointing",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "efficient largescale language model training on gpu clusters using megatronlm",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "themis fair and efficient gpu cluster scheduling",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "rail a case for redundant arrays of inexpensive links in data center networks",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "bolt data management for connected homes",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "measurement and analysis of tcp throughput collapse in clusterbased storage systems",
        "conference": "FAST",
        "year": 2008
      },
      {
        "title": "ricochet lateral error correction for timecritical multicast",
        "conference": "NSDI",
        "year": 2007
      }
    ],
    "author_id": 1854,
    "paper_ids": [
      2684,
      2654
    ],
    "papers_without_artifact_ids": [
      1310,
      2689,
      2658,
      1313,
      2123,
      3496,
      1338,
      4600
    ]
  },
  {
    "name": "Haoyu Li",
    "display_name": "Haoyu Li",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 0,
      "ATC": 2,
      "USENIXSEC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 2
      },
      "SOSP": {},
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "USENIXSEC": {},
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "ROLLER: Fast and Efficient Tensor Compilation for Deep Learning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "XRP: In-Kernel Storage Functions with eBPF",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hydrarpc rpc in the cxl era",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "rubbledb cpuefficient replication with nvmeof",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "linklab 20 a multitenant programmable iot testbed for experimentation with edgecloud integration",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 1855,
    "paper_ids": [
      150,
      1355
    ],
    "papers_without_artifact_ids": [
      1934,
      1358,
      4601
    ]
  },
  {
    "name": "Yuqing Xia",
    "display_name": "Yuqing Xia",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "ROLLER: Fast and Efficient Tensor Compilation for Deep Learning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Welder: Scheduling Deep Learning Memory Access via Tile-graph",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1856,
    "paper_ids": [
      150,
      153
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei Cui",
    "display_name": "Wei Cui",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "ROLLER: Fast and Efficient Tensor Compilation for Deep Learning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Rammer: Enabling Holistic Deep Learning Compiler Optimizations with rTasks",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1857,
    "paper_ids": [
      150,
      156
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuhong Zhong",
    "display_name": "Yuhong Zhong",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2024": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 50.0,
    "functional_rate": 50.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022,
      2024
    ],
    "year_range": "2022-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "XRP: In-Kernel Storage Functions with eBPF",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Managing Memory Tiers with CXL in Virtualized Environments",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1858,
    "paper_ids": [
      1355,
      1356
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Gasch",
    "display_name": "Michael Gasch",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2022
    ],
    "year_range": "2020-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Automatic Reliability Testing For Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Building Scalable and Flexible Cluster Managers Using Declarative Programming",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1859,
    "paper_ids": [
      621,
      3445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vishal Gupta 0006",
    "display_name": "Vishal Gupta",
    "affiliation": "Indian Institute of Technology, Kanpur, Department of Computer Science and Engineering, India",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2023": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022,
      2023
    ],
    "year_range": "2022-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "ODINFS: Scaling PM Performance with Opportunistic Delegation",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Ship your Critical Section, Not Your Data: Enabling Transparent Delegation with TCLOCKS",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1862,
    "paper_ids": [
      529,
      530
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ziqiao Zhou",
    "display_name": "Ziqiao Zhou",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VeriSMo: A Verified Security Module for Confidential VMs",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1863,
    "paper_ids": [
      2056,
      3448
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jie Zhao 0002",
    "display_name": "Jie Zhao",
    "affiliation": "Hunan University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023,
      2024
    ],
    "year_range": "2023-2024",
    "recent_count": 2,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Enabling Tensor Language Model to Assist in Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Effectively Scheduling Computational Graphs of Deep Neural Networks toward Their Domain-Specific Accelerators",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1864,
    "paper_ids": [
      4602,
      4603
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haoran Zhang 0009",
    "display_name": "Haoran Zhang",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2020": 1
      },
      "SOSP": {
        "2023": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Beaver: Practical Partial Snapshots for Distributed Cloud Services",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Fault-tolerant and transactional stateful serverless workflows",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mucache a general framework for caching in microservice graphs",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "xfaas hyperscale and low cost serverless functions at meta",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 1865,
    "paper_ids": [
      1938,
      1080
    ],
    "papers_without_artifact_ids": [
      1082,
      4604
    ]
  },
  {
    "name": "Dan R. K. Ports",
    "display_name": "Dan R. K. Ports",
    "affiliation": "Microsoft Research",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 6
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2020": 1
      },
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2021": 1,
        "2023": 1,
        "2022": 3,
        "2015": 1
      }
    },
    "artifact_rate": 22.2,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2024
    ],
    "year_range": "2020-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Beaver: Practical Partial Snapshots for Distributed Cloud Services",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Pegasus: Tolerating Skewed Workloads in Distributed Storage with In-Network Coherence Directories",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hydra serializationfree network ordering for strongly consistent distributed applications",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "netvrm virtual register memory for programmable networks",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "unlocking the power of inline floatingpoint operations on programmable switches",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "swish distributed shared state abstractions for programmable switches",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "scaling distributed machine learning with innetwork aggregation",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "prism rethinking the rdma interface for distributed systems",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "designing distributed systems using approximate synchrony in data center networks",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 1866,
    "paper_ids": [
      1938,
      998
    ],
    "papers_without_artifact_ids": [
      4605,
      1010,
      1651,
      3814,
      1653,
      3490,
      1944
    ]
  },
  {
    "name": "Hugo Sadok",
    "display_name": "Hugo Sadok",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 2,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1,
        "2020": 1
      },
      "NSDI": {
        "2021": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Ensō: A Streaming Interface for NIC-Application Communication",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Achieving 100Gbps Intrusion Prevention on a Single Server",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bbq a fast and scalable integer priority queue for hardware packet scheduling",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "dont yank my chain auditable nf service chaining",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 1871,
    "paper_ids": [
      2696,
      4478
    ],
    "papers_without_artifact_ids": [
      4606,
      724
    ]
  },
  {
    "name": "Nirav Atre",
    "display_name": "Nirav Atre",
    "affiliation": "",
    "artifact_count": 2,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1,
        "2020": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 66.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Ensō: A Streaming Interface for NIC-Application Communication",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Achieving 100Gbps Intrusion Prevention on a Single Server",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bbq a fast and scalable integer priority queue for hardware packet scheduling",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 1872,
    "paper_ids": [
      2696,
      4478
    ],
    "papers_without_artifact_ids": [
      4606
    ]
  },
  {
    "name": "Zhipeng Zhao",
    "display_name": "Zhipeng Zhao",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1,
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Ensō: A Streaming Interface for NIC-Application Communication",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Achieving 100Gbps Intrusion Prevention on a Single Server",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1873,
    "paper_ids": [
      2696,
      4478
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "James C. Hoe",
    "display_name": "James C. Hoe",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1,
        "2020": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Ensō: A Streaming Interface for NIC-Application Communication",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Achieving 100Gbps Intrusion Prevention on a Single Server",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1874,
    "paper_ids": [
      2696,
      4478
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Justine Sherry",
    "display_name": "Justine Sherry",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 2,
    "total_papers": 8,
    "total_papers_by_conf": {
      "OSDI": 2,
      "NSDI": 6
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1,
        "2020": 1
      },
      "NSDI": {
        "2021": 1,
        "2014": 1,
        "2024": 1,
        "2010": 1,
        "2016": 1,
        "2018": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Ensō: A Streaming Interface for NIC-Application Communication",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Achieving 100Gbps Intrusion Prevention on a Single Server",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bbq a fast and scalable integer priority queue for hardware packet scheduling",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "dont yank my chain auditable nf service chaining",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "elastic scaling of stateful network functions",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "embark securely outsourcing middleboxes to the cloud",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "recursively cautious congestion control",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "reverse traceroute",
        "conference": "NSDI",
        "year": 2010
      }
    ],
    "author_id": 1875,
    "paper_ids": [
      2696,
      4478
    ],
    "papers_without_artifact_ids": [
      4606,
      724,
      4607,
      682,
      4608,
      3440
    ]
  },
  {
    "name": "Zeyu Mi",
    "display_name": "Zeyu Mi",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 2,
    "total_papers": 9,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 3,
      "EUROSYS": 0,
      "ATC": 2,
      "FAST": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 2
      },
      "SOSP": {
        "2021": 1,
        "2024": 2
      },
      "EUROSYS": {},
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "FAST": {
        "2026": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 22.2,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Encrypted Databases Made Secure Yet Maintainable",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Security and Performance in the Delegated User-level Virtualization",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "solidattention lowlatency ssdbased serving on memoryconstrained pcs",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "cpc flexible secure and efficient cvm maintenance with confidential procedure calls",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "vpri efficient io page fault handling via softwarehardware codesign for iaas clouds",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "powerinfer fast large language model serving with a consumergrade gpu",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "bifrost analysis and optimization of network io tax in confidential virtual machines",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "twinvisor hardwareisolated confidential virtual machines for arm",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "mostly exitless vm protection from untrusted hypervisor through disaggregated nested virtualization",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 1876,
    "paper_ids": [
      43,
      45
    ],
    "papers_without_artifact_ids": [
      47,
      52,
      4609,
      60,
      61,
      73,
      74
    ]
  },
  {
    "name": "David Mazières",
    "display_name": "David Mazières",
    "affiliation": "Stanford University",
    "artifact_count": 2,
    "total_papers": 14,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "USENIXSEC": 0,
      "NSDI": 11,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1,
        "2020": 1
      },
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "USENIXSEC": {},
      "NSDI": {
        "2013": 1,
        "2014": 1,
        "2024": 1,
        "2019": 1,
        "2023": 1,
        "2006": 2,
        "2008": 1,
        "2005": 1,
        "2004": 1,
        "2007": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 14.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Accountable authentication with privacy protection: The Larch system for universal login",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "SafetyPin: Encrypted Backups with Human-Memorable Secrets",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sidekick innetwork assistance for secure endtoend transport protocols",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "speedex a scalable parallelizable and economically efficient decentralized exchange",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "syrup userdefined scheduling across the stack",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "shinjuku preemptive scheduling for μsecondscale tail latency",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "i know what your packet did last hop using packet histories to troubleshoot networks",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "eyeq practical network performance isolation at the edge",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "securing distributed systems with information flow control",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "beyond onethird faulty replicas in byzantine fault tolerant systems",
        "conference": "NSDI",
        "year": 2007
      },
      {
        "title": "oasis anycast for any service",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "re reliable email",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "shark scaling file servers via cooperative caching",
        "conference": "NSDI",
        "year": 2005
      },
      {
        "title": "democratizing content publication with coral",
        "conference": "NSDI",
        "year": 2004
      }
    ],
    "author_id": 7967,
    "paper_ids": [
      1018,
      1019
    ],
    "papers_without_artifact_ids": [
      4610,
      4611,
      4612,
      2642,
      4613,
      3763,
      991,
      4614,
      3806,
      3807,
      3808,
      3809
    ]
  },
  {
    "name": "Yuan-Hao Chang 0001",
    "display_name": "Yuan-Hao Chang",
    "affiliation": "IISc Bangalore",
    "artifact_count": 2,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1,
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020,
      2023
    ],
    "year_range": "2020-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "RON: One-Way Circular Shortest Routing to Achieve Efficient and Bounded-waiting Spinlocks",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Determinizing Crash Behavior with a Verified Snapshot-Consistent Flash Translation Layer",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1878,
    "paper_ids": [
      4615,
      4616
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "K. V. Rashmi",
    "display_name": "K. V. Rashmi",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 2,
    "total_papers": 11,
    "total_papers_by_conf": {
      "OSDI": 3,
      "SOSP": 1,
      "SC": 1,
      "FAST": 3,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2020": 2
      },
      "SOSP": {
        "2024": 1
      },
      "SC": {
        "2021": 1
      },
      "FAST": {
        "2015": 1,
        "2023": 1,
        "2019": 1
      },
      "NSDI": {
        "2024": 1,
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 18.2,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "PACEMAKER: Avoiding HeART attacks in storage clusters with disk-adaptive redundancy",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "A large scale analysis of hundreds of in-memory cache clusters at Twitter",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sieve is simpler than lru an efficient turnkey eviction algorithm for web caches",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "morph efficient filelifetime redundancy management for cluster file systems",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "glcache grouplevel learning for efficient and highperformance caching",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "tambur efficient loss recovery for videoconferencing via streaming codes",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "c2dn how to harness erasure codes at the edge for efficient content delivery",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "tiger diskadaptive redundancy without placement restrictions",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "arithmeticintensityguided fault tolerance for neural network inference on gpus",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "cluster storage systems gotta have heart improving storage efficiency by exploiting diskreliability heterogeneity",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "having your cake and eating it too jointly optimal erasure codes for io storage and networkbandwidth",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 1879,
    "paper_ids": [
      1324,
      1959
    ],
    "papers_without_artifact_ids": [
      1960,
      1327,
      1961,
      4617,
      1962,
      1329,
      4618,
      1333,
      4619
    ]
  },
  {
    "name": "Anirudh Sivaraman",
    "display_name": "Anirudh Sivaraman",
    "affiliation": "New York University",
    "artifact_count": 2,
    "total_papers": 10,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 0,
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 7
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 2
      },
      "SOSP": {},
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {},
      "NSDI": {
        "2021": 1,
        "2013": 1,
        "2017": 1,
        "2025": 1,
        "2020": 1,
        "2022": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "PANIC: A High-Performance Programmable NIC for Multi-tenant Networks",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Gauntlet: Finding Bugs in Compilers for Programmable Packet Processing",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "statecompute replication parallelizing highspeed stateful packet processing",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "erlang applicationaware autoscaling for cloud microservices",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "netvrm virtual register memory for programmable networks",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "isolation mechanisms for highspeed packetprocessing pipelines",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "breaking the transienceequilibrium nexus a new approach to datacenter packet transport",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "programmable calendar queues for highspeed packet scheduling",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "encoding fast and slow lowlatency video processing using thousands of tiny threads",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "stochastic forecasts achieve high throughput and low delay over cellular networks",
        "conference": "NSDI",
        "year": 2013
      }
    ],
    "author_id": 1880,
    "paper_ids": [
      2891,
      4620
    ],
    "papers_without_artifact_ids": [
      4621,
      4622,
      1010,
      2862,
      3759,
      4623,
      3146,
      4624
    ]
  },
  {
    "name": "Joshua Fried",
    "display_name": "Joshua Fried",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 2,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 1,
      "NSDI": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 2
      },
      "SOSP": {
        "2021": 1
      },
      "NSDI": {
        "2024": 1,
        "2019": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 40.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 2,
    "badges_functional": 2,
    "badges_reproducible": 2,
    "papers": [
      {
        "title": "Caladan: Mitigating Interference at Microsecond Timescales",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      },
      {
        "title": "Overload Control for µs-scale RPCs with Breakwater",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "making kernel bypass practical for the cloud with junction",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "when idling is ideal optimizing taillatency for heavytailed datacenter workloads with perséphone",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "shenango achieving high cpu efficiency for latencysensitive datacenter workloads",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 7870,
    "paper_ids": [
      2633,
      2634
    ],
    "papers_without_artifact_ids": [
      2636,
      3459,
      2643
    ]
  },
  {
    "name": "Upamanyu Sharma",
    "display_name": "Upamanyu Sharma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Grove: a Separation-Logic Library for Verifying Distributed Systems",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "verifying vmvcc a highperformance transaction library using multiversion concurrency control",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 1881,
    "paper_ids": [
      979
    ],
    "papers_without_artifact_ids": [
      986
    ]
  },
  {
    "name": "Taehyung Lee 0001",
    "display_name": "Taehyung Lee",
    "affiliation": "Virginia Tech",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MEMTIS: Efficient Memory Tiering with Dynamic Page Classification and Page Size Determination",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1882,
    "paper_ids": [
      1583
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sumit Kumar Monga",
    "display_name": "Sumit Kumar Monga",
    "affiliation": "Virginia Tech",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MEMTIS: Efficient Memory Tiering with Dynamic Page Classification and Page Size Determination",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "birds of a feather flock together scaling rdma rpcs with flock",
        "conference": "SOSP",
        "year": 2021
      }
    ],
    "author_id": 1883,
    "paper_ids": [
      1583
    ],
    "papers_without_artifact_ids": [
      533
    ]
  },
  {
    "name": "Musa Unal",
    "display_name": "Musa Unal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Achieving Microsecond-Scale Tail Latency Efficiently with Approximate Optimal Scheduling",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1884,
    "paper_ids": [
      1593
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marios Kogias",
    "display_name": "Marios Kogias",
    "affiliation": "Imperial College London",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SOSP": 2,
      "EUROSYS": 3,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2024": 1,
        "2021": 1
      },
      "ATC": {},
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Achieving Microsecond-Scale Tail Latency Efficiently with Approximate Optimal Scheduling",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shattering the ephemeral storage cost barrier for dataintensive serverless workflows",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "sird a senderinformed receiverdriven datacenter transport protocol",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "guarantee towards attestable and private ml with cca",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "smartharvest harvesting idle cpus safely and efficiently in the cloud",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "when idling is ideal optimizing taillatency for heavytailed datacenter workloads with perséphone",
        "conference": "SOSP",
        "year": 2021
      }
    ],
    "author_id": 1885,
    "paper_ids": [
      1593
    ],
    "papers_without_artifact_ids": [
      4625,
      4626,
      3192,
      2128,
      3459
    ]
  },
  {
    "name": "Wentao Zhang",
    "display_name": "Wentao Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Acto: Automatic End-to-End Testing for Operation Correctness of Cloud System Management",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1886,
    "paper_ids": [
      616
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuxuan Jiang 0016",
    "display_name": "Yuxuan Jiang",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "NSDI": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Acto: Automatic End-to-End Testing for Operation Correctness of Cloud System Management",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "onesizefitsnone understanding and enhancing slowfault tolerance in modern distributed systems",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 757,
    "paper_ids": [
      616
    ],
    "papers_without_artifact_ids": [
      1925
    ]
  },
  {
    "name": "Mandana Vaziri",
    "display_name": "Mandana Vaziri",
    "affiliation": "IBM T.J. Watson Research Center, Hawthorne, NY, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Acto: Automatic End-to-End Testing for Operation Correctness of Cloud System Management",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1887,
    "paper_ids": [
      616
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Owolabi Legunsen",
    "display_name": "Owolabi Legunsen",
    "affiliation": "Cornell University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Acto: Automatic End-to-End Testing for Operation Correctness of Cloud System Management",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "testing configuration changes in context to prevent production failures",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 1888,
    "paper_ids": [
      616
    ],
    "papers_without_artifact_ids": [
      633
    ]
  },
  {
    "name": "Saurabh Agarwal",
    "display_name": "Saurabh Agarwal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bagpipe: Accelerating Deep Recommendation Model Training",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "blox a modular toolkit for deep learning schedulers",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 1889,
    "paper_ids": [
      1304
    ],
    "papers_without_artifact_ids": [
      1310
    ]
  },
  {
    "name": "Chengpo Yan",
    "display_name": "Chengpo Yan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bagpipe: Accelerating Deep Recommendation Model Training",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1890,
    "paper_ids": [
      1304
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Deepti Raghavan",
    "display_name": "Deepti Raghavan",
    "affiliation": "Brown University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cornflakes: Zero-Copy Serialization for Microsecond-Scale Networking",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "alto an efficient network orchestrator for compound ai systems",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 1891,
    "paper_ids": [
      2652
    ],
    "papers_without_artifact_ids": [
      2655
    ]
  },
  {
    "name": "Shreya Ravi",
    "display_name": "Shreya Ravi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cornflakes: Zero-Copy Serialization for Microsecond-Scale Networking",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1892,
    "paper_ids": [
      2652
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gina Yuan",
    "display_name": "Gina Yuan",
    "affiliation": "Stanford University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "ATC": {},
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cornflakes: Zero-Copy Serialization for Microsecond-Scale Networking",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sidekick innetwork assistance for secure endtoend transport protocols",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 1893,
    "paper_ids": [
      2652
    ],
    "papers_without_artifact_ids": [
      4610
    ]
  },
  {
    "name": "Pratiksha Thaker",
    "display_name": "Pratiksha Thaker",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cornflakes: Zero-Copy Serialization for Microsecond-Scale Networking",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "alto an efficient network orchestrator for compound ai systems",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 1894,
    "paper_ids": [
      2652
    ],
    "papers_without_artifact_ids": [
      2655
    ]
  },
  {
    "name": "Sanjari Srivastava",
    "display_name": "Sanjari Srivastava",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cornflakes: Zero-Copy Serialization for Microsecond-Scale Networking",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1895,
    "paper_ids": [
      2652
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Micah Murray",
    "display_name": "Micah Murray",
    "affiliation": "UC Berkeley, Berkeley, CA, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cornflakes: Zero-Copy Serialization for Microsecond-Scale Networking",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 765,
    "paper_ids": [
      2652
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pedro Henrique Penna",
    "display_name": "Pedro Henrique Penna",
    "affiliation": "Pontifical Catholic University of Minas Gerais, Belo Horizonte, Brazil",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cornflakes: Zero-Copy Serialization for Microsecond-Scale Networking",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the demikernel datapath os architecture for microsecondscale datacenter systems",
        "conference": "SOSP",
        "year": 2021
      }
    ],
    "author_id": 1896,
    "paper_ids": [
      2652
    ],
    "papers_without_artifact_ids": [
      3509
    ]
  },
  {
    "name": "Philip Alexander Levis",
    "display_name": "Philip Alexander Levis",
    "affiliation": "Stanford University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 4,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {},
      "NSDI": {
        "2020": 1,
        "2005": 1,
        "2004": 2
      },
      "OSDI": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cornflakes: Zero-Copy Serialization for Microsecond-Scale Networking",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "alto an efficient network orchestrator for compound ai systems",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "learning in situ a randomized experiment in video streaming",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "active sensor networks",
        "conference": "NSDI",
        "year": 2005
      },
      {
        "title": "the emergence of networking abstractions and techniques in tinyos",
        "conference": "NSDI",
        "year": 2004
      },
      {
        "title": "trickle a selfregulating algorithm for code propagation and maintenance in wireless sensor networks awarded best paper",
        "conference": "NSDI",
        "year": 2004
      }
    ],
    "author_id": 1897,
    "paper_ids": [
      2652
    ],
    "papers_without_artifact_ids": [
      2655,
      4627,
      4628,
      4629,
      4630
    ]
  },
  {
    "name": "Irene Zhang",
    "display_name": "Irene Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 4,
      "EUROSYS": 0,
      "ATC": 0,
      "ACSAC": 1,
      "NSDI": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 3
      },
      "EUROSYS": {},
      "ATC": {},
      "ACSAC": {
        "2020": 1
      },
      "NSDI": {
        "2009": 1
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cornflakes: Zero-Copy Serialization for Microsecond-Scale Networking",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the demikernel datapath os architecture for microsecondscale datacenter systems",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "when idling is ideal optimizing taillatency for heavytailed datacenter workloads with perséphone",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "prism rethinking the rdma interface for distributed systems",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "talek private group messaging with hidden access patterns",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "persistent state machines for recoverable inmemory storage systems with nvram",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "flexible widearea storage for distributed systems with wheelfs",
        "conference": "NSDI",
        "year": 2009
      }
    ],
    "author_id": 1898,
    "paper_ids": [
      2652
    ],
    "papers_without_artifact_ids": [
      3509,
      3459,
      3490,
      726,
      4631,
      1296
    ]
  },
  {
    "name": "Zhicheng Ji",
    "display_name": "Zhicheng Ji",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Falcon: Fast OLTP Engine for Persistent Cache and Non-Volatile Memory",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1899,
    "paper_ids": [
      636
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leping Wang",
    "display_name": "Leping Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Falcon: Fast OLTP Engine for Persistent Cache and Non-Volatile Memory",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1900,
    "paper_ids": [
      636
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Woosuk Kwon",
    "display_name": "Woosuk Kwon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Memory Management for Large Language Model Serving with PagedAttention",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "skypilot an intercloud broker for sky computing",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 1901,
    "paper_ids": [
      465
    ],
    "papers_without_artifact_ids": [
      482
    ]
  },
  {
    "name": "Joseph Gonzalez 0001",
    "display_name": "Joseph Gonzalez",
    "affiliation": "Univ. of California - Berkeley",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Memory Management for Large Language Model Serving with PagedAttention",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cilantro performanceaware resource allocation for general objectives via online feedback",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 1902,
    "paper_ids": [
      465
    ],
    "papers_without_artifact_ids": [
      483
    ]
  },
  {
    "name": "Jinqi Hua",
    "display_name": "Jinqi Hua",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Partial Failure Resilient Memory Management System for (CXL-based) Distributed Shared Memory",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1903,
    "paper_ids": [
      637
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ning Ding",
    "display_name": "Ning Ding",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Partial Failure Resilient Memory Management System for (CXL-based) Distributed Shared Memory",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1904,
    "paper_ids": [
      637
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fan Du",
    "display_name": "Fan Du",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Partial Failure Resilient Memory Management System for (CXL-based) Distributed Shared Memory",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1905,
    "paper_ids": [
      637
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Renjie Liu 0001",
    "display_name": "Renjie Liu",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "gSampler: General and Efficient GPU-based Graph Sampling for Graph Learning",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1906,
    "paper_ids": [
      1601
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zunyao Mao",
    "display_name": "Zunyao Mao",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "gSampler: General and Efficient GPU-based Graph Sampling for Graph Learning",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1907,
    "paper_ids": [
      1601
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minjie Wang",
    "display_name": "Minjie Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "SC": 0,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "SC": {},
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "gSampler: General and Efficient GPU-based Graph Sampling for Graph Learning",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1908,
    "paper_ids": [
      1601
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhuozhao Li",
    "display_name": "Zhuozhao Li",
    "affiliation": "SUSTech",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "gSampler: General and Efficient GPU-based Graph Sampling for Graph Learning",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1909,
    "paper_ids": [
      1601
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kelvin K. W. Ng",
    "display_name": "Kelvin K. W. Ng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Paella: Low-latency Model Serving with Software-defined GPU Scheduling",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1910,
    "paper_ids": [
      1937
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhenning Yang",
    "display_name": "Zhenning Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Oobleck: Resilient Distributed Training of Large Models Using Pipeline Templates",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1911,
    "paper_ids": [
      993
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pasindu Tennage",
    "display_name": "Pasindu Tennage",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "QuePaxa: Escaping the tyranny of timeouts in consensus",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1912,
    "paper_ids": [
      2663
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cristina Basescu",
    "display_name": "Cristina Basescu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "QuePaxa: Escaping the tyranny of timeouts in consensus",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1913,
    "paper_ids": [
      2663
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ewa Syta",
    "display_name": "Ewa Syta",
    "affiliation": "Trinity College",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "NSDI": {
        "2016": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "QuePaxa: Escaping the tyranny of timeouts in consensus",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "anonrep towards trackingresistant anonymous reputation",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 1914,
    "paper_ids": [
      2663
    ],
    "papers_without_artifact_ids": [
      2669
    ]
  },
  {
    "name": "Philipp Jovanovic",
    "display_name": "Philipp Jovanovic",
    "affiliation": "University College London",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 0,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "USENIXSEC": {},
      "WOOT": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "QuePaxa: Escaping the tyranny of timeouts in consensus",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1915,
    "paper_ids": [
      2663
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vero Estrada-Galiñanes",
    "display_name": "Vero Estrada-Galiñanes",
    "affiliation": "EPFL",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "QuePaxa: Escaping the tyranny of timeouts in consensus",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7968,
    "paper_ids": [
      2663
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yiwen Zhang",
    "display_name": "Yiwen Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 0,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2026": 1,
        "2019": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "UGACHE: A Unified GPU Cache for Embedding-based Deep Learning",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fast cloud storage for ai jobs via grouped io api with transparent readwrite optimizations",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "geardb a gcfree keyvalue store on hmsmr drives with gear compaction",
        "conference": "FAST",
        "year": 2019
      }
    ],
    "author_id": 1917,
    "paper_ids": [
      31
    ],
    "papers_without_artifact_ids": [
      1317,
      4632
    ]
  },
  {
    "name": "Yazhuo Zhang",
    "display_name": "Yazhuo Zhang",
    "affiliation": "Emory University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FIFO queues are all you need for cache eviction",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sieve is simpler than lru an efficient turnkey eviction algorithm for web caches",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 1918,
    "paper_ids": [
      1958
    ],
    "papers_without_artifact_ids": [
      1960
    ]
  },
  {
    "name": "Ziyue Qiu",
    "display_name": "Ziyue Qiu",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 2,
      "EUROSYS": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FIFO queues are all you need for cache eviction",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "data caching for enterprisegrade petabytescale olap",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "reducing crosscloudregion costs with the autoconfiguring macaron cache",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "frozenhot cache rethinking cache management for modern hardware",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 1919,
    "paper_ids": [
      1958
    ],
    "papers_without_artifact_ids": [
      4633,
      1328,
      1026
    ]
  },
  {
    "name": "Rashmi Vinayak",
    "display_name": "Rashmi Vinayak",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "NSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FIFO queues are all you need for cache eviction",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "segcache a memoryefficient and scalable inmemory keyvalue cache for small objects",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 1920,
    "paper_ids": [
      1958
    ],
    "papers_without_artifact_ids": [
      1963
    ]
  },
  {
    "name": "Yuming Xu",
    "display_name": "Yuming Xu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SPFresh: Incremental In-Place Update for Billion-Scale Vector Search",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1921,
    "paper_ids": [
      145
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hengyu Liang",
    "display_name": "Hengyu Liang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SPFresh: Incremental In-Place Update for Billion-Scale Vector Search",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1922,
    "paper_ids": [
      145
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jin Li 0050",
    "display_name": "Jin Li",
    "affiliation": "Harvard University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SPFresh: Incremental In-Place Update for Billion-Scale Vector Search",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1923,
    "paper_ids": [
      145
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuxin Su 0001",
    "display_name": "Yuxin Su",
    "affiliation": "Sun Yat-sen University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "FAST": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ditto: An Elastic and Adaptive Memory-Disaggregated Caching System",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fusee a fully memorydisaggregated keyvalue store",
        "conference": "FAST",
        "year": 2023
      }
    ],
    "author_id": 1924,
    "paper_ids": [
      1608
    ],
    "papers_without_artifact_ids": [
      1613
    ]
  },
  {
    "name": "Hao Feng",
    "display_name": "Hao Feng",
    "affiliation": "Huawei Cloud, Shenzhen, China",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "SC": 0,
      "ATC": 2,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "SC": {},
      "ATC": {
        "2022": 2
      },
      "FAST": {
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ditto: An Elastic and Adaptive Memory-Disaggregated Caching System",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aegonkv a high bandwidth low tail latency and low storage cost kvseparated lsm store with smartssdbased gc offloading",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "power information system network security method based on big data",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "sdpbased energy internet networking technology",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 784,
    "paper_ids": [
      1608
    ],
    "papers_without_artifact_ids": [
      1101,
      4634,
      4635
    ]
  },
  {
    "name": "Cong Li 0003",
    "display_name": "Cong Li",
    "affiliation": "ETH Zurich",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Validating JIT Compilers via Compilation Space Exploration",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1925,
    "paper_ids": [
      1027
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daiyaan Arfeen",
    "display_name": "Daiyaan Arfeen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sia: Heterogeneity-aware, goodput-optimized ML-cluster scheduling",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1926,
    "paper_ids": [
      1319
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shouxu Lin",
    "display_name": "Shouxu Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sia: Heterogeneity-aware, goodput-optimized ML-cluster scheduling",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1927,
    "paper_ids": [
      1319
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonah Rosenblum",
    "display_name": "Jonah Rosenblum",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1928,
    "paper_ids": [
      1623
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stefan Saroiu",
    "display_name": "Stefan Saroiu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 0,
      "USENIXSEC": 0,
      "NSDI": 7,
      "PETS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {},
      "USENIXSEC": {},
      "NSDI": {
        "2009": 1,
        "2014": 1,
        "2010": 2,
        "2012": 1,
        "2020": 1,
        "2004": 1
      },
      "PETS": {
        "2023": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 11.1,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "my face my rules enabling personalized protection against unacceptable face editing",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "privateeye scalable and privacypreserving compromise detection in the cloud",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "ctpm a cloud tpm for crossdevice trusted applications",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "an operating system for the home",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "glasnost enabling end users to detect traffic differentiation",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "volley automated data placement for geodistributed cloud services",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "bunker a privacyoriented platform for network tracing",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "measurement and analysis of spyware in a university environment",
        "conference": "NSDI",
        "year": 2004
      }
    ],
    "author_id": 1929,
    "paper_ids": [
      1623
    ],
    "papers_without_artifact_ids": [
      4636,
      4637,
      4638,
      4639,
      4640,
      4641,
      3528,
      4642
    ]
  },
  {
    "name": "Alec Wolman",
    "display_name": "Alec Wolman",
    "affiliation": "Microsoft",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "USENIXSEC": 0,
      "NSDI": 8,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "USENIXSEC": {},
      "NSDI": {
        "2009": 1,
        "2014": 1,
        "2023": 1,
        "2010": 2,
        "2020": 1,
        "2008": 1,
        "2007": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 11.1,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "empowering azure storage with rdma",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "privateeye scalable and privacypreserving compromise detection in the cloud",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "ctpm a cloud tpm for crossdevice trusted applications",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "centrifuge integrated lease management and partitioning for cloud services",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "volley automated data placement for geodistributed cloud services",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "bunker a privacyoriented platform for network tracing",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "designing high performance enterprise wifi networks",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "a locationbased management system for enterprise wireless lans",
        "conference": "NSDI",
        "year": 2007
      }
    ],
    "author_id": 1930,
    "paper_ids": [
      1623
    ],
    "papers_without_artifact_ids": [
      4643,
      4637,
      4638,
      4644,
      4641,
      3528,
      4645,
      4646
    ]
  },
  {
    "name": "Dimitrios Skarlatos 0002",
    "display_name": "Dimitrios Skarlatos",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 3,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2,
        "2021": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "servicerouter hyperscale and minimal cost service mesh at meta",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "xfaas hyperscale and low cost serverless functions at meta",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "ras continuously optimized regionwide datacenter resource allocation",
        "conference": "SOSP",
        "year": 2021
      }
    ],
    "author_id": 789,
    "paper_ids": [
      1623
    ],
    "papers_without_artifact_ids": [
      4647,
      4604,
      4648
    ]
  },
  {
    "name": "Sheng Qi",
    "display_name": "Sheng Qi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Halfmoon: Log-Optimal Fault-Tolerant Stateful Serverless Computing",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1931,
    "paper_ids": [
      994
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vaastav Anand",
    "display_name": "Vaastav Anand",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Blueprint: A Toolchain for Highly-Reconfigurable Microservice Applications",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the benefit of hindsight tracing edgecases in distributed systems",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 1932,
    "paper_ids": [
      1964
    ],
    "papers_without_artifact_ids": [
      1971
    ]
  },
  {
    "name": "Shengyun Liu",
    "display_name": "Shengyun Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 2,
      "ATC": 0,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      },
      "ATC": {},
      "NSDI": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flexible Advancement in Asynchronous BFT Consensus",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cheetah metadata aggregation for fast object storage without distributed ordering",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "vegeta enabling parallel smart contract execution in leaderless blockchains",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "bandle asynchronous state machine replication made efficient",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 1933,
    "paper_ids": [
      4649
    ],
    "papers_without_artifact_ids": [
      1050,
      3627,
      4650
    ]
  },
  {
    "name": "Wenbo Xu 0002",
    "display_name": "Wenbo Xu",
    "affiliation": "Univ. of California - Santa Barbara",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flexible Advancement in Asynchronous BFT Consensus",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rondo scalable and reconfigurationfriendly randomness beacon",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "bandle asynchronous state machine replication made efficient",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 1934,
    "paper_ids": [
      4649
    ],
    "papers_without_artifact_ids": [
      3190,
      4650
    ]
  },
  {
    "name": "Chen Shan",
    "display_name": "Chen Shan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flexible Advancement in Asynchronous BFT Consensus",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1935,
    "paper_ids": [
      4649
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaofeng Yan",
    "display_name": "Xiaofeng Yan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flexible Advancement in Asynchronous BFT Consensus",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1936,
    "paper_ids": [
      4649
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tianjing Xu",
    "display_name": "Tianjing Xu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flexible Advancement in Asynchronous BFT Consensus",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vegeta enabling parallel smart contract execution in leaderless blockchains",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 1937,
    "paper_ids": [
      4649
    ],
    "papers_without_artifact_ids": [
      3627
    ]
  },
  {
    "name": "Bo Wang 0116",
    "display_name": "Bo Wang",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flexible Advancement in Asynchronous BFT Consensus",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bandle asynchronous state machine replication made efficient",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 1938,
    "paper_ids": [
      4649
    ],
    "papers_without_artifact_ids": [
      4650
    ]
  },
  {
    "name": "Lei Fan 0002",
    "display_name": "Lei Fan",
    "affiliation": "HKUST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flexible Advancement in Asynchronous BFT Consensus",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1939,
    "paper_ids": [
      4649
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fuxi Deng",
    "display_name": "Fuxi Deng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flexible Advancement in Asynchronous BFT Consensus",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1940,
    "paper_ids": [
      4649
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ying Yan 0002",
    "display_name": "Ying Yan",
    "affiliation": "University of Nebraska",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flexible Advancement in Asynchronous BFT Consensus",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rondo scalable and reconfigurationfriendly randomness beacon",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 1941,
    "paper_ids": [
      4649
    ],
    "papers_without_artifact_ids": [
      3190
    ]
  },
  {
    "name": "Hui Zhang 0002",
    "display_name": "Hui Zhang",
    "affiliation": "SUFE",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flexible Advancement in Asynchronous BFT Consensus",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1942,
    "paper_ids": [
      4649
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Huiqiang Jiang",
    "display_name": "Huiqiang Jiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PIT: Optimization of Dynamic Sparse Deep Learning Models via Permutation Invariant Transformation",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1943,
    "paper_ids": [
      146
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benjamin Reidys",
    "display_name": "Benjamin Reidys",
    "affiliation": "University of Illinois Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RackBlox: A Software-Defined Rack-Scale Storage System with Network-Storage Co-Design",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "blockflex enabling storage harvesting with softwaredefined flash in modern cloud platforms",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 1944,
    "paper_ids": [
      3466
    ],
    "papers_without_artifact_ids": [
      3468
    ]
  },
  {
    "name": "Yuqi Xue",
    "display_name": "Yuqi Xue",
    "affiliation": "University of Illinois Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RackBlox: A Software-Defined Rack-Scale Storage System with Network-Storage Co-Design",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scaling deep learning computation over the intercore connected intelligence processor with t10",
        "conference": "SOSP",
        "year": 2024
      }
    ],
    "author_id": 1945,
    "paper_ids": [
      3466
    ],
    "papers_without_artifact_ids": [
      1035
    ]
  },
  {
    "name": "Daixuan Li",
    "display_name": "Daixuan Li",
    "affiliation": "University of Illinois Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RackBlox: A Software-Defined Rack-Scale Storage System with Network-Storage Co-Design",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1946,
    "paper_ids": [
      3466
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bharat Sukhwani",
    "display_name": "Bharat Sukhwani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RackBlox: A Software-Defined Rack-Scale Storage System with Network-Storage Co-Design",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1947,
    "paper_ids": [
      3466
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wen-Mei Hwu",
    "display_name": "Wen-Mei Hwu",
    "affiliation": "University of Illinois Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RackBlox: A Software-Defined Rack-Scale Storage System with Network-Storage Co-Design",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1948,
    "paper_ids": [
      3466
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Deming Chen",
    "display_name": "Deming Chen",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RackBlox: A Software-Defined Rack-Scale Storage System with Network-Storage Co-Design",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1949,
    "paper_ids": [
      3466
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sameh W. Asaad",
    "display_name": "Sameh W. Asaad",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RackBlox: A Software-Defined Rack-Scale Storage System with Network-Storage Co-Design",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1950,
    "paper_ids": [
      3466
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lillian Tsai",
    "display_name": "Lillian Tsai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Edna: Disguising and Revealing User Data in Web Applications",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1951,
    "paper_ids": [
      1292
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hannah Gross",
    "display_name": "Hannah Gross",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Edna: Disguising and Revealing User Data in Web Applications",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1952,
    "paper_ids": [
      1292
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eddie Kohler",
    "display_name": "Eddie Kohler",
    "affiliation": "Harvard University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 3,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2014": 1,
        "2008": 1,
        "2005": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Edna: Disguising and Revealing User Data in Web Applications",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "easy freshness with pequod cache joins",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "netcomplex a complexity metric for networked system designs",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "designing extensible ip router software",
        "conference": "NSDI",
        "year": 2005
      }
    ],
    "author_id": 1953,
    "paper_ids": [
      1292
    ],
    "papers_without_artifact_ids": [
      4651,
      4652,
      4653
    ]
  },
  {
    "name": "Zhiyuan Guo",
    "display_name": "Zhiyuan Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "ATC": {},
      "NSDI": {
        "2019": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mira: A Program-Behavior-Guided Far Memory System",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enabling portable and highperformance smartnic programs with alkali",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "direct universal access making data center resources available to fpga",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 1954,
    "paper_ids": [
      3475
    ],
    "papers_without_artifact_ids": [
      2893,
      3461
    ]
  },
  {
    "name": "Zijian He",
    "display_name": "Zijian He",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mira: A Program-Behavior-Guided Far Memory System",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1955,
    "paper_ids": [
      3475
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jian Zhang",
    "display_name": "Jian Zhang",
    "affiliation": "Rutgers University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 0,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2024": 1,
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling High-Performance and Secure Userspace NVM File Systems with the Trio Architecture",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "polystore exploiting combined capabilities of heterogeneous storage",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "omnicache collaborative caching for nearstorage accelerators",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "fusionfs fusing io operations using ciscops in firmware file systems",
        "conference": "FAST",
        "year": 2022
      }
    ],
    "author_id": 395,
    "paper_ids": [
      523
    ],
    "papers_without_artifact_ids": [
      531,
      1586,
      2677
    ]
  },
  {
    "name": "João Ferreira Loff",
    "display_name": "João Ferreira Loff",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Antipode: Enforcing Cross-Service Causal Consistency in Distributed Applications",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rendezvous where serverless functions find consistency",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 7969,
    "paper_ids": [
      1968
    ],
    "papers_without_artifact_ids": [
      4654
    ]
  },
  {
    "name": "Daniel Porto 0002",
    "display_name": "Daniel Porto",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {},
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Antipode: Enforcing Cross-Service Causal Consistency in Distributed Applications",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1957,
    "paper_ids": [
      1968
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "João Garcia 0001",
    "display_name": "João Garcia",
    "affiliation": "Universidade de Lisboa",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 2,
      "EUROSYS": 0,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 2
      },
      "EUROSYS": {},
      "PETS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Antipode: Enforcing Cross-Service Causal Consistency in Distributed Applications",
        "conference": "SOSP",
        "year": 2023,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rendezvous where serverless functions find consistency",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 7970,
    "paper_ids": [
      1968
    ],
    "papers_without_artifact_ids": [
      4654
    ]
  },
  {
    "name": "Junwen Yang",
    "display_name": "Junwen Yang",
    "affiliation": "The University of Chicago",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understanding and Detecting Software Upgrade Failures in Distributed Systems",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1959,
    "paper_ids": [
      1630
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Utsav Sethi",
    "display_name": "Utsav Sethi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1,
        "2024": 1
      },
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understanding and Detecting Software Upgrade Failures in Distributed Systems",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "if at first you dont succeed try try again insights and llminformed tooling for detecting retry bugs in software systems",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "cancellation in systems an empirical study of task cancellation patterns and failures",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 1960,
    "paper_ids": [
      1630
    ],
    "papers_without_artifact_ids": [
      1970,
      3485
    ]
  },
  {
    "name": "Silvery Fu",
    "display_name": "Silvery Fu",
    "affiliation": "University of California, Berkeley",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "NSDI": {
        "2021": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "dSpace: Composable Abstractions for Smart Spaces",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "loca a locationoblivious cellular architecture",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "on the use of ml for blackbox system performance prediction",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 1961,
    "paper_ids": [
      4655
    ],
    "papers_without_artifact_ids": [
      1996,
      4656
    ]
  },
  {
    "name": "Sylvia Ratnasamy",
    "display_name": "Sylvia Ratnasamy",
    "affiliation": "Univ. of California - Berkeley",
    "artifact_count": 1,
    "total_papers": 23,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "USENIXSEC": 1,
      "NSDI": 20,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "USENIXSEC": {
        "2020": 1
      },
      "NSDI": {
        "2021": 1,
        "2009": 2,
        "2014": 1,
        "2023": 2,
        "2006": 1,
        "2012": 2,
        "2016": 2,
        "2020": 1,
        "2022": 1,
        "2008": 2,
        "2005": 1,
        "2018": 3,
        "2015": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 4.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "dSpace: Composable Abstractions for Smart Spaces",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "harvesting memorybound cpu stall cycles in software with msh",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "invisinets removing networking from cloud networks",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "loca a locationoblivious cellular architecture",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "efficient scheduling policies for microsecondscale tasks",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "on the use of ml for blackbox system performance prediction",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "timecrypt encrypted data stream processing at scale with cryptographic access control",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "droplet decentralized authorization and access control for encrypted data streams",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "resq enabling slos in network function virtualization",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "safebricks shielding network functions in the cloud",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "elastic scaling of stateful network functions",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "embark securely outsourcing middleboxes to the cloud",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "universal packet scheduling",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "making sense of performance in data analytics frameworks",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "recursively cautious congestion control",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "toward predictable performance in software packetprocessing platforms",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "design and implementation of a consolidated middlebox architecture",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "notabot improving service availability in the face of botnet attacks",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "skilled in the art of being idle reducing energy waste in networked systems",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "reducing network energy consumption via sleeping and rateadaptation",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "netcomplex a complexity metric for networked system designs",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "practical datacentric storage",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "beacon vector routing scalable pointtopoint routing in wireless sensornets",
        "conference": "NSDI",
        "year": 2005
      }
    ],
    "author_id": 1962,
    "paper_ids": [
      4655
    ],
    "papers_without_artifact_ids": [
      4657,
      4658,
      1996,
      3456,
      4656,
      2460,
      2461,
      2864,
      681,
      4607,
      682,
      2763,
      4659,
      4608,
      4660,
      4177,
      3479,
      4661,
      4662,
      4652,
      4663,
      520
    ]
  },
  {
    "name": "Rafael Lourenco de Lima Chehab",
    "display_name": "Rafael Lourenco de Lima Chehab",
    "affiliation": "TU Dresden, Huawei Technologies Duesseldorf",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CLoF: A Compositional Lock Framework for Multi-level NUMA Systems",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1963,
    "paper_ids": [
      32
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Antonio Paolillo",
    "display_name": "Antonio Paolillo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CLoF: A Compositional Lock Framework for Multi-level NUMA Systems",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1964,
    "paper_ids": [
      32
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rohan Kadekodi",
    "display_name": "Rohan Kadekodi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "WineFS: a hugepage-aware file system for persistent memory that ages gracefully",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1965,
    "paper_ids": [
      1320
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Soujanya Ponnapalli",
    "display_name": "Soujanya Ponnapalli",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "ATC": {},
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "WineFS: a hugepage-aware file system for persistent memory that ages gracefully",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1966,
    "paper_ids": [
      1320
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Harshad Shirwadkar",
    "display_name": "Harshad Shirwadkar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "WineFS: a hugepage-aware file system for persistent memory that ages gracefully",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fastcommit resourceefficient performant and costeffective file system journaling",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 1967,
    "paper_ids": [
      1320
    ],
    "papers_without_artifact_ids": [
      3487
    ]
  },
  {
    "name": "Aasheesh Kolli",
    "display_name": "Aasheesh Kolli",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "FAST": {
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "WineFS: a hugepage-aware file system for persistent memory that ages gracefully",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "software wear management for persistent memories",
        "conference": "FAST",
        "year": 2019
      }
    ],
    "author_id": 1968,
    "paper_ids": [
      1320
    ],
    "papers_without_artifact_ids": [
      4664
    ]
  },
  {
    "name": "Zheng Wang 0078",
    "display_name": "Zheng Wang",
    "affiliation": "Stanford University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Basil: Breaking up BFT with ACID (transactions)",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1969,
    "paper_ids": [
      1990
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ishtiyaque Ahmad",
    "display_name": "Ishtiyaque Ahmad",
    "affiliation": "Univ. of California - Santa Cruz",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Coeus: A System for Oblivious Document Ranking and Retrieval",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "addra metadataprivate voice communication over fully untrusted infrastructure",
        "conference": "OSDI",
        "year": 2021
      }
    ],
    "author_id": 1970,
    "paper_ids": [
      3491
    ],
    "papers_without_artifact_ids": [
      3495
    ]
  },
  {
    "name": "Laboni Sarker",
    "display_name": "Laboni Sarker",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Coeus: A System for Oblivious Document Ranking and Retrieval",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1971,
    "paper_ids": [
      3491
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Youhui Bai",
    "display_name": "Youhui Bai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Gradient Compression Supercharged High-Performance Data Parallel DNN Training",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1972,
    "paper_ids": [
      1602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Quan Zhou",
    "display_name": "Quan Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ACSAC": 1,
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "ACSAC": {
        "2018": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Gradient Compression Supercharged High-Performance Data Parallel DNN Training",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "talisman tamper analysis for reference monitors",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "athena analyzing and quantifying side channels of transport layer protocols",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "apache submarine a unified machine learning platform made simple",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "a measurement study on linux container security attacks and countermeasures",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 1973,
    "paper_ids": [
      1602
    ],
    "papers_without_artifact_ids": [
      3205,
      2296,
      4665,
      1461
    ]
  },
  {
    "name": "Jun Yi",
    "display_name": "Jun Yi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Gradient Compression Supercharged High-Performance Data Parallel DNN Training",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1974,
    "paper_ids": [
      1602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haochen Pan",
    "display_name": "Haochen Pan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "SC": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "SC": {},
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rabia: Simplifying State-Machine Replication Through Randomization",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cancellation in systems an empirical study of task cancellation patterns and failures",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 1975,
    "paper_ids": [
      1582
    ],
    "papers_without_artifact_ids": [
      3485
    ]
  },
  {
    "name": "Jesse Tuglu",
    "display_name": "Jesse Tuglu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rabia: Simplifying State-Machine Replication Through Randomization",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1976,
    "paper_ids": [
      1582
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Neo Zhou",
    "display_name": "Neo Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rabia: Simplifying State-Machine Replication Through Randomization",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1977,
    "paper_ids": [
      1582
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tianshu Wang",
    "display_name": "Tianshu Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rabia: Simplifying State-Machine Replication Through Randomization",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1978,
    "paper_ids": [
      1582
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yicheng Shen",
    "display_name": "Yicheng Shen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rabia: Simplifying State-Machine Replication Through Randomization",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1979,
    "paper_ids": [
      1582
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiong Zheng",
    "display_name": "Xiong Zheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rabia: Simplifying State-Machine Replication Through Randomization",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1980,
    "paper_ids": [
      1582
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lewis Tseng",
    "display_name": "Lewis Tseng",
    "affiliation": "Boston College",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rabia: Simplifying State-Machine Replication Through Randomization",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pineapple unifying multipaxos and atomic shared registers",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 1981,
    "paper_ids": [
      1582
    ],
    "papers_without_artifact_ids": [
      4666
    ]
  },
  {
    "name": "Roberto Palmieri",
    "display_name": "Roberto Palmieri",
    "affiliation": "Lehigh University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rabia: Simplifying State-Machine Replication Through Randomization",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pineapple unifying multipaxos and atomic shared registers",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 1982,
    "paper_ids": [
      1582
    ],
    "papers_without_artifact_ids": [
      4666
    ]
  },
  {
    "name": "Ajay Paddayuru Shreepathi",
    "display_name": "Ajay Paddayuru Shreepathi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Witcher: Systematic Crash Consistency Testing for Non-Volatile Memory Key-Value Stores",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1983,
    "paper_ids": [
      1584
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sunny Wadkar",
    "display_name": "Sunny Wadkar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Witcher: Systematic Crash Consistency Testing for Non-Volatile Memory Key-Value Stores",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1984,
    "paper_ids": [
      1584
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Emil Tsalapatis",
    "display_name": "Emil Tsalapatis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Aurora Single Level Store Operating System",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1985,
    "paper_ids": [
      4667
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ryan Hancock",
    "display_name": "Ryan Hancock",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Aurora Single Level Store Operating System",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1986,
    "paper_ids": [
      4667
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tavian Barnes",
    "display_name": "Tavian Barnes",
    "affiliation": "University of Waterloo",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Aurora Single Level Store Operating System",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1987,
    "paper_ids": [
      4667
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ali José Mashtizadeh",
    "display_name": "Ali José Mashtizadeh",
    "affiliation": "University of Waterloo",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {},
      "NSDI": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Aurora Single Level Store Operating System",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hatcp a reliable and scalable framework for tcp network functions",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "draconis networkaccelerated scheduling for microsecondscale workloads",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 7971,
    "paper_ids": [
      4667
    ],
    "papers_without_artifact_ids": [
      4668,
      4669
    ]
  },
  {
    "name": "Madhava Krishnan Ramanathan",
    "display_name": "Madhava Krishnan Ramanathan",
    "affiliation": "Virginia Tech, VA, USA",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "ATC": {},
      "FAST": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PACTree: A High Performance Persistent Range Index Using PAC Guidelines",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tenet memory safe and fault tolerant persistent transactional memory",
        "conference": "FAST",
        "year": 2023
      }
    ],
    "author_id": 1989,
    "paper_ids": [
      524
    ],
    "papers_without_artifact_ids": [
      532
    ]
  },
  {
    "name": "Youngsuk Kim",
    "display_name": "Youngsuk Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rudra: Finding Memory Safety Bugs in Rust at the Ecosystem Scale",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1990,
    "paper_ids": [
      651
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ammar Askar",
    "display_name": "Ammar Askar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rudra: Finding Memory Safety Bugs in Rust at the Ecosystem Scale",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "malintent coverage guided intent fuzzing framework for android",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 1991,
    "paper_ids": [
      651
    ],
    "papers_without_artifact_ids": [
      659
    ]
  },
  {
    "name": "Jungwon Lim",
    "display_name": "Jungwon Lim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rudra: Finding Memory Safety Bugs in Rust at the Ecosystem Scale",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "preventing useafterfree attacks with fast forward allocation",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 1992,
    "paper_ids": [
      651
    ],
    "papers_without_artifact_ids": [
      534
    ]
  },
  {
    "name": "Aditya K. Kamath",
    "display_name": "Aditya K. Kamath",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "iGUARD: In-GPU Advanced Race Detection",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1993,
    "paper_ids": [
      4670
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arkaprava Basu",
    "display_name": "Arkaprava Basu",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "iGUARD: In-GPU Advanced Race Detection",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1994,
    "paper_ids": [
      4670
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tim Stamler",
    "display_name": "Tim Stamler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {},
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HeMem: Scalable Tiered Memory Management for Big Data Applications and Real NVM",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flextoe flexible tcp offload with finegrained parallelism",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 1995,
    "paper_ids": [
      1366
    ],
    "papers_without_artifact_ids": [
      1370
    ]
  },
  {
    "name": "Mattan Erez",
    "display_name": "Mattan Erez",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HeMem: Scalable Tiered Memory Management for Big Data Applications and Real NVM",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "accelerating bandwidthbound deep learning inference with mainmemory accelerators",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 1996,
    "paper_ids": [
      1366
    ],
    "papers_without_artifact_ids": [
      4671
    ]
  },
  {
    "name": "Runzhou Tao 0001",
    "display_name": "Runzhou Tao",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2021": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Formal Verification of a Multiprocessor Hypervisor on Arm Relaxed Memory Hardware",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "duoai fast automated inference of inductive invariants for verifying distributed protocols",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "distai datadriven automated invariant learning for distributed protocols",
        "conference": "OSDI",
        "year": 2021
      }
    ],
    "author_id": 819,
    "paper_ids": [
      1999
    ],
    "papers_without_artifact_ids": [
      2003,
      2006
    ]
  },
  {
    "name": "Jianan Yao",
    "display_name": "Jianan Yao",
    "affiliation": "Columbia University, New York, NY, USA",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2021": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Formal Verification of a Multiprocessor Hypervisor on Arm Relaxed Memory Hardware",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "duoai fast automated inference of inductive invariants for verifying distributed protocols",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "distai datadriven automated invariant learning for distributed protocols",
        "conference": "OSDI",
        "year": 2021
      }
    ],
    "author_id": 820,
    "paper_ids": [
      1999
    ],
    "papers_without_artifact_ids": [
      2003,
      2006
    ]
  },
  {
    "name": "Ke Yang",
    "display_name": "Ke Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Random Walks on Huge Graphs at Cache Efficiency",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1997,
    "paper_ids": [
      638
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaosong Ma",
    "display_name": "Xiaosong Ma",
    "affiliation": "MBZUAI",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "SOSP": 1,
      "SC": 0,
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 6,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "SC": {},
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2021": 2,
        "2018": 1,
        "2014": 1,
        "2013": 1,
        "2019": 1
      },
      "NSDI": {
        "2019": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 11.1,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Random Walks on Huge Graphs at Cache Efficiency",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "frozenhot cache rethinking cache management for modern hardware",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "spandb a fast costeffective lsmtree based kv store on hybrid storage",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "fusionraid achieving consistent low latency for commodity ssd arrays",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "automatic applicationaware io forwarding resource allocation",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "endtoend io monitoring on a leading supercomputer",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "raid deterministic and balanced data distribution for large disk enclosures",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "automatic identification of application io signatures from noisy serverside traces",
        "conference": "FAST",
        "year": 2014
      },
      {
        "title": "active flash towards energyefficient insitu data analytics on extremescale machines",
        "conference": "FAST",
        "year": 2013
      }
    ],
    "author_id": 1998,
    "paper_ids": [
      638
    ],
    "papers_without_artifact_ids": [
      1026,
      1607,
      3674,
      2101,
      2102,
      3675,
      4672,
      3575
    ]
  },
  {
    "name": "Saravanan Thirumuruganathan",
    "display_name": "Saravanan Thirumuruganathan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Random Walks on Huge Graphs at Cache Efficiency",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "detecting and mitigating sampling bias in cybersecurity with unlabeled data",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1999,
    "paper_ids": [
      638
    ],
    "papers_without_artifact_ids": [
      4372
    ]
  },
  {
    "name": "Jaeseong Im",
    "display_name": "Jaeseong Im",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LineFS: Efficient SmartNIC Offload of a Distributed File System with Pipeline Parallelism",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2000,
    "paper_ids": [
      344
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaojian Liao",
    "display_name": "Xiaojian Liao",
    "affiliation": "Beihang University",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 2,
      "ATC": 1,
      "FAST": 2,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2023": 1,
        "2024": 1
      },
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2024": 1,
        "2023": 1
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Crash Consistent Non-Volatile Memory Express",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "volley accelerating writeread orders in disaggregated storage",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "term extending rdmaattached memory with ssd",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "singularfs a billionscale distributed file system using a single metadata server",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "rio orderpreserving and cpuefficient remote storage access",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "λio a unified io stack for computational storage",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "write dependency disentanglement with horae",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 823,
    "paper_ids": [
      1036
    ],
    "papers_without_artifact_ids": [
      1376,
      1056,
      1057,
      1058,
      1061,
      1071
    ]
  },
  {
    "name": "Sara McAllister",
    "display_name": "Sara McAllister",
    "affiliation": "University of Wisconsin - Madison",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2024": 1,
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kangaroo: Caching Billions of Tiny Objects on Flash",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fairywren a sustainable cache for emerging writereaderase flash interfaces",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "the cachelib caching engine design and experiences at scale",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 2001,
    "paper_ids": [
      1321
    ],
    "papers_without_artifact_ids": [
      1326,
      1332
    ]
  },
  {
    "name": "Benjamin Berg",
    "display_name": "Benjamin Berg",
    "affiliation": "University of North Carolina",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2024": 1,
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kangaroo: Caching Billions of Tiny Objects on Flash",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fairywren a sustainable cache for emerging writereaderase flash interfaces",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "the cachelib caching engine design and experiences at scale",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 2002,
    "paper_ids": [
      1321
    ],
    "papers_without_artifact_ids": [
      1326,
      1332
    ]
  },
  {
    "name": "Julian Tutuncu-Macias",
    "display_name": "Julian Tutuncu-Macias",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kangaroo: Caching Billions of Tiny Objects on Flash",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2003,
    "paper_ids": [
      1321
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sathya Gunasekar",
    "display_name": "Sathya Gunasekar",
    "affiliation": "Facebook",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "FAST": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "FAST": {
        "2024": 1
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kangaroo: Caching Billions of Tiny Objects on Flash",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "baleen ml admission prefetching for flash caches",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "the cachelib caching engine design and experiences at scale",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 824,
    "paper_ids": [
      1321
    ],
    "papers_without_artifact_ids": [
      1325,
      1332
    ]
  },
  {
    "name": "Jimmy Lu",
    "display_name": "Jimmy Lu",
    "affiliation": "Facebook",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "FAST": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "FAST": {
        "2024": 1
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kangaroo: Caching Billions of Tiny Objects on Flash",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "baleen ml admission prefetching for flash caches",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "the cachelib caching engine design and experiences at scale",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 825,
    "paper_ids": [
      1321
    ],
    "papers_without_artifact_ids": [
      1325,
      1332
    ]
  },
  {
    "name": "Nathan Beckmann",
    "display_name": "Nathan Beckmann",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "FAST": 1,
      "NSDI": 1,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "FAST": {
        "2024": 1
      },
      "NSDI": {
        "2018": 1
      },
      "OSDI": {
        "2024": 1,
        "2020": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kangaroo: Caching Billions of Tiny Objects on Flash",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "baleen ml admission prefetching for flash caches",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "fairywren a sustainable cache for emerging writereaderase flash interfaces",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "the cachelib caching engine design and experiences at scale",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "lhd improving cache hit rate by maximizing hit density",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 826,
    "paper_ids": [
      1321
    ],
    "papers_without_artifact_ids": [
      1325,
      1326,
      1332,
      1364
    ]
  },
  {
    "name": "Seung-Seob Lee",
    "display_name": "Seung-Seob Lee",
    "affiliation": "Yale University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MIND: In-Network Memory Management for Disaggregated Data Centers",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "blindfold confidential memory management by untrusted operating system",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 2004,
    "paper_ids": [
      2702
    ],
    "papers_without_artifact_ids": [
      3521
    ]
  },
  {
    "name": "Yanpeng Yu",
    "display_name": "Yanpeng Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MIND: In-Network Memory Management for Disaggregated Data Centers",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2005,
    "paper_ids": [
      2702
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abhishek Bhattacharjee",
    "display_name": "Abhishek Bhattacharjee",
    "affiliation": "Yale University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MIND: In-Network Memory Management for Disaggregated Data Centers",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2006,
    "paper_ids": [
      2702
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunpeng Jiang",
    "display_name": "Yunpeng Jiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2007,
    "paper_ids": [
      1658
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Man Ho Au",
    "display_name": "Man Ho Au",
    "affiliation": "The Hong Kong Polytechnic Univ.",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2008,
    "paper_ids": [
      1658
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dai Qin",
    "display_name": "Dai Qin",
    "affiliation": "University of Toronto",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "ATC": {},
      "FAST": {
        "2014": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Caracal: Contention Management with Deterministic Concurrency Control",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "checking the integrity of transactional mechanisms",
        "conference": "FAST",
        "year": 2014
      }
    ],
    "author_id": 2009,
    "paper_ids": [
      2719
    ],
    "papers_without_artifact_ids": [
      2725
    ]
  },
  {
    "name": "Yang Chen",
    "display_name": "Yang Chen",
    "affiliation": "Univ. of California - Merced",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "SC": 1,
      "ACSAC": 1,
      "NDSS": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "SC": {
        "2021": 1
      },
      "ACSAC": {
        "2023": 1
      },
      "NDSS": {},
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Forerunner: Constraint-based Speculative Transaction Execution for Ethereum",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "log2policy an approach to generate finegrained access control rules for microservices from scratch",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "towards synthetic multivariate time series generation for flare forecasting",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "protean vm allocation service at scale",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 2010,
    "paper_ids": [
      287
    ],
    "papers_without_artifact_ids": [
      4673,
      4674,
      4675
    ]
  },
  {
    "name": "Zhongxin Guo",
    "display_name": "Zhongxin Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Forerunner: Constraint-based Speculative Transaction Execution for Ethereum",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2011,
    "paper_ids": [
      287
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuo Chen 0001",
    "display_name": "Shuo Chen",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ACSAC": 0,
      "FAST": 1,
      "USENIXSEC": 0,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "ACSAC": {},
      "FAST": {
        "2016": 1
      },
      "USENIXSEC": {},
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Forerunner: Constraint-based Speculative Transaction Execution for Ethereum",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "uncovering bugs in distributed storage systems during testing not in production",
        "conference": "FAST",
        "year": 2016
      }
    ],
    "author_id": 2012,
    "paper_ids": [
      287
    ],
    "papers_without_artifact_ids": [
      4676
    ]
  },
  {
    "name": "Xian Zhang 0001",
    "display_name": "Xian Zhang",
    "affiliation": "Microsoft Research",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Forerunner: Constraint-based Speculative Transaction Execution for Ethereum",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2013,
    "paper_ids": [
      287
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Karan Newatia",
    "display_name": "Karan Newatia",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mycelium: Large-Scale Distributed Graph Queries with Differential Privacy",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "arboretum a planner for largescale federated analytics with differential privacy",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 2014,
    "paper_ids": [
      1074
    ],
    "papers_without_artifact_ids": [
      2729
    ]
  },
  {
    "name": "Qiao Kang",
    "display_name": "Qiao Kang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "SC": 0,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "SC": {},
      "USENIXSEC": {
        "2020": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated SmartNIC Offloading Insights for Network Functions",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "netwarden mitigating network covert channels while preserving performance",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "programmable innetwork security for contextaware byod policies",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 2015,
    "paper_ids": [
      693
    ],
    "papers_without_artifact_ids": [
      711,
      712
    ]
  },
  {
    "name": "Ming Liu 0027",
    "display_name": "Ming Liu",
    "affiliation": "University of Wisconsin - Madison",
    "artifact_count": 1,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 2,
      "ATC": 0,
      "NSDI": 8,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 2
      },
      "ATC": {},
      "NSDI": {
        "2024": 1,
        "2025": 4,
        "2020": 2,
        "2018": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 9.1,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated SmartNIC Offloading Insights for Network Functions",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "whiteboxing rdma with packetgranular software control",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "building an elastic block storage over ebofs using shadow views",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "building massive mimo baseband processing on a singlenode supercomputer",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "understanding and profiling nvmeovertcp using ntprof",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "understanding routable pcie performance for composable infrastructures",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "ezns an elastic zoned namespace for commodity zns ssds",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "xenic smartnicaccelerated distributed transactions",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "finegrained replicated state machines for a cluster storage system",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "programmable calendar queues for highspeed packet scheduling",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "approximating fair queueing on reconfigurable switches",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 2016,
    "paper_ids": [
      693
    ],
    "papers_without_artifact_ids": [
      4677,
      4678,
      4679,
      4680,
      3834,
      4681,
      4682,
      3433,
      4623,
      4683
    ]
  },
  {
    "name": "Srinivas Narayana",
    "display_name": "Srinivas Narayana",
    "affiliation": "Rutgers University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "NSDI": {
        "2025": 1,
        "2016": 1,
        "2022": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated SmartNIC Offloading Insights for Network Functions",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "statecompute replication parallelizing highspeed stateful packet processing",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "privid practical privacypreserving video analytics queries",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "compiling path queries",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 2017,
    "paper_ids": [
      693
    ],
    "papers_without_artifact_ids": [
      4621,
      2624,
      3179
    ]
  },
  {
    "name": "Ray Neiheiser",
    "display_name": "Ray Neiheiser",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kauri: Scalable BFT Consensus with Pipelined Tree-Based Dissemination and Aggregation",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2018,
    "paper_ids": [
      2735
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Luís E. T. Rodrigues",
    "display_name": "Luís E. T. Rodrigues",
    "affiliation": "Universidade de Lisboa",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "USENIXSEC": 0,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {},
      "USENIXSEC": {},
      "PETS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kauri: Scalable BFT Consensus with Pipelined Tree-Based Dissemination and Aggregation",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "performance tradeoffs in transactional systems",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 7972,
    "paper_ids": [
      2735
    ],
    "papers_without_artifact_ids": [
      4684
    ]
  },
  {
    "name": "Jonggyu Park",
    "display_name": "Jonggyu Park",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FragPicker: A New Defragmentation Tool for Modern Storage Devices",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2020,
    "paper_ids": [
      3451
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tuoyu Gong",
    "display_name": "Tuoyu Gong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Geometric Partitioning: Explore the Boundary of Optimal Erasure Code Repair",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2021,
    "paper_ids": [
      288
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tai Zhou",
    "display_name": "Tai Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Geometric Partitioning: Explore the Boundary of Optimal Erasure Code Repair",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2022,
    "paper_ids": [
      288
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anthony Rebello",
    "display_name": "Anthony Rebello",
    "affiliation": "University of Wisconsin-Madison",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scale and Performance in a Filesystem Semi-Microkernel",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2023,
    "paper_ids": [
      2008
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chenhao Ye",
    "display_name": "Chenhao Ye",
    "affiliation": "University of Wisconsin-Madison",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "FAST": 3,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "FAST": {
        "2026": 1,
        "2023": 1,
        "2025": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scale and Performance in a Filesystem Semi-Microkernel",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cachecentric multiresource allocation for storage services",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "cloudscape a study of storage services in modern cloud architectures",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "madfs perfile virtualization for userspace persistent memory filesystems",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "using trātṛ to tame adversarial synchronization",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 840,
    "paper_ids": [
      2008
    ],
    "papers_without_artifact_ids": [
      2011,
      2012,
      2016,
      2018
    ]
  },
  {
    "name": "Anatole Lefort",
    "display_name": "Anatole Lefort",
    "affiliation": "Telecom SudParis - Institut Polytechnique de Paris",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "J-NVM: Off-heap Persistent Objects in Java",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2024,
    "paper_ids": [
      4685
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yohan Pipereau",
    "display_name": "Yohan Pipereau",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "J-NVM: Off-heap Persistent Objects in Java",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2025,
    "paper_ids": [
      4685
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kwabena Amponsem",
    "display_name": "Kwabena Amponsem",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "J-NVM: Off-heap Persistent Objects in Java",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2026,
    "paper_ids": [
      4685
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pierre Sutra",
    "display_name": "Pierre Sutra",
    "affiliation": "Tlcom SudParis, Palaiseau, France",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "J-NVM: Off-heap Persistent Objects in Java",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "swiftpaxos fast georeplicated state machines",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "efficient replication via timestamp stability",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 2027,
    "paper_ids": [
      4685
    ],
    "papers_without_artifact_ids": [
      4686,
      4687
    ]
  },
  {
    "name": "Gaël Thomas 0001",
    "display_name": "Gaël Thomas",
    "affiliation": "IIIT Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "J-NVM: Off-heap Persistent Objects in Java",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7973,
    "paper_ids": [
      4685
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuheng Shen",
    "display_name": "Yuheng Shen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HEALER: Relation Learning Guided Kernel Fuzzing",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "finding correctness bugs in ebpf verifier with structured and sanitized program",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "ksg augmenting kernel fuzzing with system call specification generation",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 2029,
    "paper_ids": [
      2737
    ],
    "papers_without_artifact_ids": [
      2739,
      2740
    ]
  },
  {
    "name": "Cong Wang 0020",
    "display_name": "Cong Wang",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HEALER: Relation Learning Guided Kernel Fuzzing",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2030,
    "paper_ids": [
      2737
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianzhong Liu",
    "display_name": "Jianzhong Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ATC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HEALER: Relation Learning Guided Kernel Fuzzing",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "finding correctness bugs in ebpf verifier with structured and sanitized program",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "bleem packet sequence oriented fuzzing for protocol implementations",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "ksg augmenting kernel fuzzing with system call specification generation",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 2031,
    "paper_ids": [
      2737
    ],
    "papers_without_artifact_ids": [
      2739,
      3297,
      2740
    ]
  },
  {
    "name": "Aiguo Cui",
    "display_name": "Aiguo Cui",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HEALER: Relation Learning Guided Kernel Fuzzing",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2032,
    "paper_ids": [
      2737
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Firas Abuzaid",
    "display_name": "Firas Abuzaid",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "NSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Solving Large-Scale Granular Resource Allocation Problems Efficiently with POP",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "contracting widearea network topologies to solve flow problems quickly",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 2033,
    "paper_ids": [
      2653
    ],
    "papers_without_artifact_ids": [
      2657
    ]
  },
  {
    "name": "Peter Kraft",
    "display_name": "Peter Kraft",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "NSDI": {
        "2022": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Solving Large-Scale Granular Resource Allocation Problems Efficiently with POP",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dataparallel actors a programming model for scalable query serving systems",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 2034,
    "paper_ids": [
      2653
    ],
    "papers_without_artifact_ids": [
      2656
    ]
  },
  {
    "name": "Akshay Agrawal 0001",
    "display_name": "Akshay Agrawal",
    "affiliation": "University of Kentucky",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Solving Large-Scale Granular Resource Allocation Problems Efficiently with POP",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2035,
    "paper_ids": [
      2653
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Srikanth Kandula",
    "display_name": "Srikanth Kandula",
    "affiliation": "Microsoft Research",
    "artifact_count": 1,
    "total_papers": 17,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 16,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2021": 1,
        "2024": 3,
        "2025": 2,
        "2023": 3,
        "2012": 2,
        "2008": 1,
        "2005": 1,
        "2011": 2,
        "2007": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 5.9,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Solving Large-Scale Granular Resource Allocation Problems Efficiently with POP",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "securing public cloud networks with efficient rolebased microsegmentation",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "enhancing network failure mitigation with performanceaware ranking",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "netvigil robust and lowcost anomaly detection for eastwest data center security",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "solving maxmin fair resource allocations quickly on large graphs",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "finding adversarial inputs for heuristics using multilevel optimization",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "disaggregating stateful network functions",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "dote rethinking predictive wan traffic engineering",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "onewan is better than two unifying a split wan architecture",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "contracting widearea network topologies to solve flow problems quickly",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "reoptimizing data parallel computing",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "pacman coordinated memory caching for parallel jobs",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "sharing the data center network",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "profiling network performance for multitier data center applications",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "fatvap aggregating ap backhaul capacity to maximize throughput",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "rbgp staying connected in a connected world",
        "conference": "NSDI",
        "year": 2007
      },
      {
        "title": "botz4sale surviving organized ddos attacks that mimic flash crowds awarded best student paper",
        "conference": "NSDI",
        "year": 2005
      }
    ],
    "author_id": 2036,
    "paper_ids": [
      2653
    ],
    "papers_without_artifact_ids": [
      4688,
      2697,
      2614,
      4689,
      3542,
      4690,
      4691,
      4692,
      2657,
      512,
      513,
      4693,
      3182,
      4694,
      4695,
      4696
    ]
  },
  {
    "name": "Stephen P. Boyd",
    "display_name": "Stephen P. Boyd",
    "affiliation": "Stanford University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Solving Large-Scale Granular Resource Allocation Problems Efficiently with POP",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2037,
    "paper_ids": [
      2653
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jeffrey Helt",
    "display_name": "Jeffrey Helt",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "NSDI": {
        "2024": 1,
        "2019": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Regular Sequential Serializability and Regular Sequential Consistency",
        "conference": "SOSP",
        "year": 2021,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "accelerating skewed workloads with performance multipliers in the turbodb distributed database",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "morty scaling concurrency control with reexecution",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "alembic automated model inference for stateful network functions",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 2038,
    "paper_ids": [
      2741
    ],
    "papers_without_artifact_ids": [
      2743,
      1995,
      4485
    ]
  },
  {
    "name": "Viktor Urban Gsteiger",
    "display_name": "Viktor Urban Gsteiger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Caribou: Fine-Grained Geospatial Shifting of Serverless Applications for Sustainability",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2039,
    "paper_ids": [
      2748
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pin Hong (Daniel) Long",
    "display_name": "Pin Hong (Daniel) Long",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Caribou: Fine-Grained Geospatial Shifting of Serverless Applications for Sustainability",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2040,
    "paper_ids": [
      2748
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yiran (Jerry) Sun",
    "display_name": "Yiran (Jerry) Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Caribou: Fine-Grained Geospatial Shifting of Serverless Applications for Sustainability",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2041,
    "paper_ids": [
      2748
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Parshan Javanrood",
    "display_name": "Parshan Javanrood",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Caribou: Fine-Grained Geospatial Shifting of Serverless Applications for Sustainability",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2042,
    "paper_ids": [
      2748
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Neil Giridharan",
    "display_name": "Neil Giridharan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Autobahn: Seamless high speed BFT",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2043,
    "paper_ids": [
      1991
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ittai Abraham",
    "display_name": "Ittai Abraham",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "ATC": {},
      "NSDI": {
        "2017": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Autobahn: Seamless high speed BFT",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vcorfu a cloudscale object store on a shared log",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 2044,
    "paper_ids": [
      1991
    ],
    "papers_without_artifact_ids": [
      3444
    ]
  },
  {
    "name": "Marcos Kawazoe Aguilera",
    "display_name": "Marcos Kawazoe Aguilera",
    "affiliation": "VMware, Palo Alto, CA, USA",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "FAST": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "FAST": {
        "2003": 1
      },
      "NSDI": {
        "2009": 1,
        "2006": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SWARM: Replicating Shared Disaggregated-Memory Data in No Time",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rpc chains efficient clientserver communication in geodistributed systems",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "olive distributed pointintime branching storage for real systems",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "blocklevel security for networkattached disks",
        "conference": "FAST",
        "year": 2003
      }
    ],
    "author_id": 2045,
    "paper_ids": [
      1378
    ],
    "papers_without_artifact_ids": [
      4697,
      4698,
      3811
    ]
  },
  {
    "name": "Shengyu Liu",
    "display_name": "Shengyu Liu",
    "affiliation": "School of Computer Science, Peking University, Beijing, China",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NSDI": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "NSDI": {
        "2025": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LoongServe: Efficiently Serving Long-Context Large Language Models with Elastic Sequence Parallelism",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "optimizing rlhf training for large language models with stage fusion",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "distserve disaggregating prefill and decoding for goodputoptimized large language model serving",
        "conference": "OSDI",
        "year": 2024
      }
    ],
    "author_id": 850,
    "paper_ids": [
      995
    ],
    "papers_without_artifact_ids": [
      999,
      1005
    ]
  },
  {
    "name": "Yinmin Zhong",
    "display_name": "Yinmin Zhong",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NSDI": 2,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "NSDI": {
        "2024": 1,
        "2025": 1
      },
      "OSDI": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LoongServe: Efficiently Serving Long-Context Large Language Models with Elastic Sequence Parallelism",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "optimizing rlhf training for large language models with stage fusion",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "megascale scaling large language model training to more than 10 000 gpus",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "distserve disaggregating prefill and decoding for goodputoptimized large language model serving",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "alpaserve statistical multiplexing with model parallelism for deep learning serving",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 2046,
    "paper_ids": [
      995
    ],
    "papers_without_artifact_ids": [
      999,
      1001,
      1005,
      484
    ]
  },
  {
    "name": "Shreesha G. Bhat",
    "display_name": "Shreesha G. Bhat",
    "affiliation": "University of Illinois Urbana-Champaign, Urbana, US",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LazyLog: A New Shared Log Abstraction for Low-Latency Applications",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 851,
    "paper_ids": [
      1638
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiyu Hu",
    "display_name": "Jiyu Hu",
    "affiliation": "University of Illinois Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LazyLog: A New Shared Log Abstraction for Low-Latency Applications",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 852,
    "paper_ids": [
      1638
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiaxing Qiu",
    "display_name": "Jiaxing Qiu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "vSoC: Efficient Virtual System-on-Chip on Heterogeneous Hardware",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dissecting and streamlining the interactive loop of mobile cloud gaming",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 2047,
    "paper_ids": [
      617
    ],
    "papers_without_artifact_ids": [
      625
    ]
  },
  {
    "name": "Zijie Zhou",
    "display_name": "Zijie Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "vSoC: Efficient Virtual System-on-Chip on Heterogeneous Hardware",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2048,
    "paper_ids": [
      617
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yang Li 0092",
    "display_name": "Yang Li",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "FAST": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "FAST": {
        "2018": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "vSoC: Efficient Virtual System-on-Chip on Heterogeneous Hardware",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dissecting and streamlining the interactive loop of mobile cloud gaming",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "towards webbased delta synchronization for cloud storage services",
        "conference": "FAST",
        "year": 2018
      }
    ],
    "author_id": 2049,
    "paper_ids": [
      617
    ],
    "papers_without_artifact_ids": [
      625,
      634
    ]
  },
  {
    "name": "Zhenhua Li 0001",
    "display_name": "Zhenhua Li",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 0,
      "FAST": 2,
      "USENIXSEC": 1,
      "NSDI": 4,
      "NDSS": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "EUROSYS": {},
      "FAST": {
        "2020": 1,
        "2018": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "NSDI": {
        "2021": 1,
        "2025": 2,
        "2016": 1
      },
      "NDSS": {},
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 11.1,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "vSoC: Efficient Virtual System-on-Chip on Heterogeneous Hardware",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mitigating scalability walls of rdmabased container networks",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "dissecting and streamlining the interactive loop of mobile cloud gaming",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "an inputagnostic hierarchical deep learning framework for traffic fingerprinting",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "trinity highperformance mobile emulation through graphics projection",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "fast and light bandwidth testing for internet users",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "lockfree collaboration support for cloud storage services with operation inference and transformation",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "towards webbased delta synchronization for cloud storage services",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "exploring crossapplication cellular traffic optimization with baidu trafficguard",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 853,
    "paper_ids": [
      617
    ],
    "papers_without_artifact_ids": [
      624,
      625,
      788,
      630,
      631,
      632,
      634,
      635
    ]
  },
  {
    "name": "Feng Qian 0001",
    "display_name": "Feng Qian",
    "affiliation": "University of Southern California",
    "artifact_count": 1,
    "total_papers": 11,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "FAST": 1,
      "NSDI": 8,
      "NDSS": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "FAST": {
        "2020": 1
      },
      "NSDI": {
        "2021": 1,
        "2024": 3,
        "2025": 2,
        "2023": 1,
        "2022": 1
      },
      "NDSS": {},
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 9.1,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "vSoC: Efficient Virtual System-on-Chip on Heterogeneous Hardware",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mitigating scalability walls of rdmabased container networks",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "dissecting and streamlining the interactive loop of mobile cloud gaming",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "passengers safety matters experiences of deploying a largescale indoor delivery monitoring system",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "habitus boosting mobile immersive content delivery through fullbody pose tracking and multipath networking",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "smuff towards line rate wifi direct transport with orchestrated ondevice buffer management",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "polycorn datadriven crosslayer multipath networking for highspeed railway through composable schedulerlets",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "yuzu neuralenhanced volumetric video streaming",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "trinity highperformance mobile emulation through graphics projection",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "fast and light bandwidth testing for internet users",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "lockfree collaboration support for cloud storage services with operation inference and transformation",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 2050,
    "paper_ids": [
      617
    ],
    "papers_without_artifact_ids": [
      624,
      625,
      4699,
      4700,
      4701,
      2673,
      4702,
      630,
      631,
      632
    ]
  },
  {
    "name": "Hao Lin 0005",
    "display_name": "Hao Lin",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 0,
      "NSDI": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "EUROSYS": {},
      "NSDI": {
        "2025": 1
      },
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "vSoC: Efficient Virtual System-on-Chip on Heterogeneous Hardware",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dissecting and streamlining the interactive loop of mobile cloud gaming",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "trinity highperformance mobile emulation through graphics projection",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 2051,
    "paper_ids": [
      617
    ],
    "papers_without_artifact_ids": [
      625,
      630
    ]
  },
  {
    "name": "Di Gao",
    "display_name": "Di Gao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "vSoC: Efficient Virtual System-on-Chip on Heterogeneous Hardware",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "trinity highperformance mobile emulation through graphics projection",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 2052,
    "paper_ids": [
      617
    ],
    "papers_without_artifact_ids": [
      630
    ]
  },
  {
    "name": "Haitao Su",
    "display_name": "Haitao Su",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "vSoC: Efficient Virtual System-on-Chip on Heterogeneous Hardware",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2053,
    "paper_ids": [
      617
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xin Miao",
    "display_name": "Xin Miao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "vSoC: Efficient Virtual System-on-Chip on Heterogeneous Hardware",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2054,
    "paper_ids": [
      617
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunhao Liu 0001",
    "display_name": "Yunhao Liu",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 12,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 0,
      "FAST": 2,
      "NSDI": 8,
      "NDSS": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "EUROSYS": {},
      "FAST": {
        "2020": 1,
        "2018": 1
      },
      "NSDI": {
        "2021": 2,
        "2025": 2,
        "2016": 1,
        "2022": 2,
        "2015": 1
      },
      "NDSS": {},
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 8.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "vSoC: Efficient Virtual System-on-Chip on Heterogeneous Hardware",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mitigating scalability walls of rdmabased container networks",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "dissecting and streamlining the interactive loop of mobile cloud gaming",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "saiyan design and implementation of a lowpower demodulator for lora backscatter systems",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "swarmmap scaling up realtime collaborative visual slam at the edge",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "trinity highperformance mobile emulation through graphics projection",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "fast and light bandwidth testing for internet users",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "aircode hidden screencamera communication on an invisible and inaudible dual channel",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "lockfree collaboration support for cloud storage services with operation inference and transformation",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "towards webbased delta synchronization for cloud storage services",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "exploring crossapplication cellular traffic optimization with baidu trafficguard",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "relative localization of rfid tags using spatialtemporal phase profiling",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 2055,
    "paper_ids": [
      617
    ],
    "papers_without_artifact_ids": [
      624,
      625,
      4703,
      4704,
      630,
      631,
      4705,
      632,
      634,
      635,
      4706
    ]
  },
  {
    "name": "Ashwin Prasad",
    "display_name": "Ashwin Prasad",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SilvanForge: A Schedule-Guided Retargetable Compiler for Decision Tree Inference",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2056,
    "paper_ids": [
      3547
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sampath Rajendra",
    "display_name": "Sampath Rajendra",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SilvanForge: A Schedule-Guided Retargetable Compiler for Decision Tree Inference",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2057,
    "paper_ids": [
      3547
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "R. Govindarajan",
    "display_name": "R. Govindarajan",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SilvanForge: A Schedule-Guided Retargetable Compiler for Decision Tree Inference",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2058,
    "paper_ids": [
      3547
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Uday Bondhugula",
    "display_name": "Uday Bondhugula",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SilvanForge: A Schedule-Guided Retargetable Compiler for Decision Tree Inference",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2059,
    "paper_ids": [
      3547
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anish Athalye",
    "display_name": "Anish Athalye",
    "affiliation": "Massachusetts Institute of Technology",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 2,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the k2 architecture for trustworthy hardware security modules",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "verifying hardware security modules with informationpreserving refinement",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 2060,
    "paper_ids": [
      981
    ],
    "papers_without_artifact_ids": [
      987,
      989
    ]
  },
  {
    "name": "Dae R. Jeong",
    "display_name": "Dae R. Jeong",
    "affiliation": "KAIST",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OZZ: Identifying Kernel Out-of-Order Concurrency Bugs with In-Vivo Memory Access Reordering",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diagnosing kernel concurrency failures with aitia",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 2062,
    "paper_ids": [
      345
    ],
    "papers_without_artifact_ids": [
      355
    ]
  },
  {
    "name": "Yewon Choi",
    "display_name": "Yewon Choi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OZZ: Identifying Kernel Out-of-Order Concurrency Bugs with In-Vivo Memory Access Reordering",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2063,
    "paper_ids": [
      345
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jialiang Huang",
    "display_name": "Jialiang Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TrEnv: Transparently Share Serverless Execution Environments Across Different Functions and Nodes",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hydrarpc rpc in the cxl era",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 2064,
    "paper_ids": [
      639
    ],
    "papers_without_artifact_ids": [
      1934
    ]
  },
  {
    "name": "Sixing Lin",
    "display_name": "Sixing Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TrEnv: Transparently Share Serverless Execution Environments Across Different Functions and Nodes",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2065,
    "paper_ids": [
      639
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xia Liao",
    "display_name": "Xia Liao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TrEnv: Transparently Share Serverless Execution Environments Across Different Functions and Nodes",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2066,
    "paper_ids": [
      639
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ning Zhang",
    "display_name": "Ning Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TrEnv: Transparently Share Serverless Execution Environments Across Different Functions and Nodes",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hydrarpc rpc in the cxl era",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 2067,
    "paper_ids": [
      639
    ],
    "papers_without_artifact_ids": [
      1934
    ]
  },
  {
    "name": "Mengting Lu",
    "display_name": "Mengting Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TrEnv: Transparently Share Serverless Execution Environments Across Different Functions and Nodes",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2068,
    "paper_ids": [
      639
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haifeng Gong",
    "display_name": "Haifeng Gong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TrEnv: Transparently Share Serverless Execution Environments Across Different Functions and Nodes",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2069,
    "paper_ids": [
      639
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "YongWei Wu 0001",
    "display_name": "YongWei Wu",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TrEnv: Transparently Share Serverless Execution Environments Across Different Functions and Nodes",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2070,
    "paper_ids": [
      639
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "François Costa",
    "display_name": "François Costa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Dirigent: Lightweight Serverless Orchestration",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7974,
    "paper_ids": [
      1663
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mihajlo Djokic",
    "display_name": "Mihajlo Djokic",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Dirigent: Lightweight Serverless Orchestration",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enabling invitro serverless systems research",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 2072,
    "paper_ids": [
      1663
    ],
    "papers_without_artifact_ids": [
      1672
    ]
  },
  {
    "name": "Michal Friedman 0001",
    "display_name": "Michal Friedman",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Dirigent: Lightweight Serverless Orchestration",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "player expanding coherence protocol stack with a persistence layer",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 2073,
    "paper_ids": [
      1663
    ],
    "papers_without_artifact_ids": [
      3840
    ]
  },
  {
    "name": "Can Cebeci",
    "display_name": "Can Cebeci",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Verification of System-Software Components Written in Standard C",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2074,
    "paper_ids": [
      646
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Clément Pit-Claudel",
    "display_name": "Clément Pit-Claudel",
    "affiliation": "EPFL",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Verification of System-Software Components Written in Standard C",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7975,
    "paper_ids": [
      646
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Youmin Chen",
    "display_name": "Youmin Chen",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 2,
      "ATC": 0,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      },
      "ATC": {},
      "FAST": {
        "2021": 2,
        "2023": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Fast Core Scheduling with Userspace Process Abstraction",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fast state restoration in llm serving with hcache",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "exploring the asynchrony of slow memory filesystem with easyio",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "λio a unified io stack for computational storage",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "concordia distributed shared memory with innetwork cache coherence",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "scalable persistent memory file system with kerneluserspace collaboration",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2076,
    "paper_ids": [
      1373
    ],
    "papers_without_artifact_ids": [
      1051,
      1055,
      1061,
      1069,
      1070
    ]
  },
  {
    "name": "Shiwei Gao",
    "display_name": "Shiwei Gao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Fast Core Scheduling with Userspace Process Abstraction",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fast state restoration in llm serving with hcache",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 2077,
    "paper_ids": [
      1373
    ],
    "papers_without_artifact_ids": [
      1051
    ]
  },
  {
    "name": "Peter McNeely",
    "display_name": "Peter McNeely",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cookie Monster: Efficient On-Device Budgeting for Differentially-Private Ad-Measurement Systems",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2078,
    "paper_ids": [
      1353
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Prabhpreet Singh Sodhi",
    "display_name": "Prabhpreet Singh Sodhi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cookie Monster: Efficient On-Device Budgeting for Differentially-Private Ad-Measurement Systems",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2079,
    "paper_ids": [
      1353
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anirudh Varanasi",
    "display_name": "Anirudh Varanasi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cookie Monster: Efficient On-Device Budgeting for Differentially-Private Ad-Measurement Systems",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2080,
    "paper_ids": [
      1353
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benjamin Case",
    "display_name": "Benjamin Case",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cookie Monster: Efficient On-Device Budgeting for Differentially-Private Ad-Measurement Systems",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2081,
    "paper_ids": [
      1353
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jae-Won Chung",
    "display_name": "Jae-Won Chung",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Reducing Energy Bloat in Large Model Training",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "zeus understanding and optimizing gpu energy consumption of dnn training",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 2082,
    "paper_ids": [
      1946
    ],
    "papers_without_artifact_ids": [
      1950
    ]
  },
  {
    "name": "Yile Gu",
    "display_name": "Yile Gu",
    "affiliation": "University of Washington, Seattle, WA, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Reducing Energy Bloat in Large Model Training",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 860,
    "paper_ids": [
      1946
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nikhil Bansal 0001",
    "display_name": "Nikhil Bansal",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Reducing Energy Bloat in Large Model Training",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "eatcs distinguished dissertation award for 2022",
        "conference": "ATC",
        "year": 2023
      }
    ],
    "author_id": 2083,
    "paper_ids": [
      1946
    ],
    "papers_without_artifact_ids": [
      4707
    ]
  },
  {
    "name": "Shaocong Sun",
    "display_name": "Shaocong Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BIZA: Design of Self-Governing Block-Interface ZNS AFA for Endurance and Performance",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2084,
    "paper_ids": [
      2773
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Li Peng",
    "display_name": "Li Peng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "ATC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BIZA: Design of Self-Governing Block-Interface ZNS AFA for Endurance and Performance",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improved secure twoparty computation from a geometric perspective",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "scalacache scalable userspace page cache management with softwarehardware coordination",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 2085,
    "paper_ids": [
      2773
    ],
    "papers_without_artifact_ids": [
      3261,
      2781
    ]
  },
  {
    "name": "Yingbo Sun",
    "display_name": "Yingbo Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BIZA: Design of Self-Governing Block-Interface ZNS AFA for Endurance and Performance",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2086,
    "paper_ids": [
      2773
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhichao Cao 0002",
    "display_name": "Zhichao Cao",
    "affiliation": "Arizona State University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SOSP": 1,
      "ATC": 0,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "ATC": {},
      "FAST": {
        "2020": 1,
        "2018": 1,
        "2019": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BIZA: Design of Self-Governing Block-Interface ZNS AFA for Endurance and Performance",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "characterizing modeling and benchmarking rocksdb keyvalue workloads at facebook",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "sliding lookback window assisted data chunk rewriting for improving deduplication restore performance",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "alacc accelerating restore performance of data deduplication systems using adaptive lookahead window assisted chunk caching",
        "conference": "FAST",
        "year": 2018
      }
    ],
    "author_id": 2087,
    "paper_ids": [
      2773
    ],
    "papers_without_artifact_ids": [
      4708,
      4709,
      4710
    ]
  },
  {
    "name": "Kaifu Tian",
    "display_name": "Kaifu Tian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Skyloft: A General High-Efficient Scheduling Framework in User Space",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2088,
    "paper_ids": [
      640
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuyang You",
    "display_name": "Yuyang You",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Skyloft: A General High-Efficient Scheduling Framework in User Space",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2089,
    "paper_ids": [
      640
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Siran Liu",
    "display_name": "Siran Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Uncovering Nested Data Parallelism and Data Reuse in DNN Computation with FractalTensor",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2090,
    "paper_ids": [
      147
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chengxiang Qi",
    "display_name": "Chengxiang Qi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Uncovering Nested Data Parallelism and Data Reuse in DNN Computation with FractalTensor",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2091,
    "paper_ids": [
      147
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ying Cao",
    "display_name": "Ying Cao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Uncovering Nested Data Parallelism and Data Reuse in DNN Computation with FractalTensor",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2092,
    "paper_ids": [
      147
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chao Yang 0002",
    "display_name": "Chao Yang",
    "affiliation": "Beihang University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SOSP": 1,
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Uncovering Nested Data Parallelism and Data Reuse in DNN Computation with FractalTensor",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enabling and scaling the hpcg benchmark on the newest generation sunway supercomputer with 42 million heterogeneous cores",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2093,
    "paper_ids": [
      147
    ],
    "papers_without_artifact_ids": [
      4711
    ]
  },
  {
    "name": "Weifang Hu",
    "display_name": "Weifang Hu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Uncovering Nested Data Parallelism and Data Reuse in DNN Computation with FractalTensor",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2094,
    "paper_ids": [
      147
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xuanhua Shi",
    "display_name": "Xuanhua Shi",
    "affiliation": "HUST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Uncovering Nested Data Parallelism and Data Reuse in DNN Computation with FractalTensor",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2095,
    "paper_ids": [
      147
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhisheng Hu",
    "display_name": "Zhisheng Hu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Aceso: Achieving Efficient Fault Tolerance in Memory-Disaggregated Key-Value Stores",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2096,
    "paper_ids": [
      1610
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yizou Chen",
    "display_name": "Yizou Chen",
    "affiliation": "The Chinese University of Hong Kong, Hong Kong, Hong Kong",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SOSP": 1,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "FAST": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Aceso: Achieving Efficient Fault Tolerance in Memory-Disaggregated Key-Value Stores",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oasis an outofcore approximate graph system via alldistances sketches",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "seraph towards scalable and efficient fullyexternal graph computation via ondemand processing",
        "conference": "FAST",
        "year": 2024
      }
    ],
    "author_id": 872,
    "paper_ids": [
      1610
    ],
    "papers_without_artifact_ids": [
      2775,
      2776
    ]
  },
  {
    "name": "Chao Wang 0125",
    "display_name": "Chao Wang",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Aceso: Achieving Efficient Fault Tolerance in Memory-Disaggregated Key-Value Stores",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2097,
    "paper_ids": [
      1610
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matthias Brun 0002",
    "display_name": "Matthias Brun",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Verus: A Practical Foundation for Systems Verification",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2098,
    "paper_ids": [
      715
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chanhee Cho",
    "display_name": "Chanhee Cho",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Verus: A Practical Foundation for Systems Verification",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2099,
    "paper_ids": [
      715
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pranav Srinivasan",
    "display_name": "Pranav Srinivasan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Verus: A Practical Foundation for Systems Verification",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2100,
    "paper_ids": [
      715
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jacob R. Lorch",
    "display_name": "Jacob R. Lorch",
    "affiliation": "Microsoft Research",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SOSP": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "FAST": 2,
      "USENIXSEC": 0,
      "NSDI": 3,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SOSP": {
        "2024": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "FAST": {
        "2013": 1,
        "2007": 1
      },
      "USENIXSEC": {},
      "NSDI": {
        "2009": 1,
        "2012": 1,
        "2015": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SOSP"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Verus: A Practical Foundation for Systems Verification",
        "conference": "SOSP",
        "year": 2024,
        "badges": [
          "Available",
          "Functional",
          "Reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tardigrade leveraging lightweight virtual machines to easily and efficiently construct faulttolerant services",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "shroud ensuring private access to largescale data in the data center",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "dont lose sleep over availability the greenup decentralized wakeup service",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "trinc small trusted hardware for large distributed systems",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "a fiveyear study of filesystem metadata",
        "conference": "FAST",
        "year": 2007
      }
    ],
    "author_id": 874,
    "paper_ids": [
      715
    ],
    "papers_without_artifact_ids": [
      4712,
      728,
      2132,
      2486,
      4713
    ]
  },
  {
    "name": "Qizheng Zhang",
    "display_name": "Qizheng Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "SOSP": {
        "2024": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Caravan: Practical Online Learning of In-Network ML Models with Labeling Agents",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cacheblend fast large language model serving for rag with cached knowledge fusion",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "grace lossresilient realtime video through neural codecs",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 2101,
    "paper_ids": [
      3561
    ],
    "papers_without_artifact_ids": [
      3481,
      3379
    ]
  },
  {
    "name": "Ali Imran 0005",
    "display_name": "Ali Imran",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Caravan: Practical Online Learning of In-Network ML Models with Labeling Agents",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2102,
    "paper_ids": [
      3561
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Enkeleda Bardhi",
    "display_name": "Enkeleda Bardhi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Caravan: Practical Online Learning of In-Network ML Models with Labeling Agents",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2103,
    "paper_ids": [
      3561
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tushar Swamy",
    "display_name": "Tushar Swamy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Caravan: Practical Online Learning of In-Network ML Models with Labeling Agents",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2104,
    "paper_ids": [
      3561
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nathan Zhang",
    "display_name": "Nathan Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Caravan: Practical Online Learning of In-Network ML Models with Labeling Agents",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2105,
    "paper_ids": [
      3561
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kunle Olukotun",
    "display_name": "Kunle Olukotun",
    "affiliation": "Stanford University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "SOSP": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Caravan: Practical Online Learning of In-Network ML Models with Labeling Agents",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2106,
    "paper_ids": [
      3561
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lukas Krenz",
    "display_name": "Lukas Krenz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "3D acoustic-elastic coupling with gravity: the dynamics of the 2018 palu, sulawesi earthquake and tsunami",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2107,
    "paper_ids": [
      3568
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Carsten Uphoff",
    "display_name": "Carsten Uphoff",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "3D acoustic-elastic coupling with gravity: the dynamics of the 2018 palu, sulawesi earthquake and tsunami",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2108,
    "paper_ids": [
      3568
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas Ulrich",
    "display_name": "Thomas Ulrich",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "3D acoustic-elastic coupling with gravity: the dynamics of the 2018 palu, sulawesi earthquake and tsunami",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2109,
    "paper_ids": [
      3568
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alice-Agnes Gabriel",
    "display_name": "Alice-Agnes Gabriel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "3D acoustic-elastic coupling with gravity: the dynamics of the 2018 palu, sulawesi earthquake and tsunami",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2110,
    "paper_ids": [
      3568
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lauren S. Abrahams",
    "display_name": "Lauren S. Abrahams",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "3D acoustic-elastic coupling with gravity: the dynamics of the 2018 palu, sulawesi earthquake and tsunami",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2111,
    "paper_ids": [
      3568
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eric M. Dunham",
    "display_name": "Eric M. Dunham",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "3D acoustic-elastic coupling with gravity: the dynamics of the 2018 palu, sulawesi earthquake and tsunami",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2112,
    "paper_ids": [
      3568
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zheng Qu 0002",
    "display_name": "Zheng Qu",
    "affiliation": "Wayne State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient tensor core-based GPU kernels for structured sparsity under reduced precision",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2113,
    "paper_ids": [
      1673
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Liu Liu 0017",
    "display_name": "Liu Liu",
    "affiliation": "Rensselaer Polytechnic Institute",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient tensor core-based GPU kernels for structured sparsity under reduced precision",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2114,
    "paper_ids": [
      1673
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei Zhang 0097",
    "display_name": "Wei Zhang",
    "affiliation": "Texas Tech University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploiting user activeness for data retention in HPC systems",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2115,
    "paper_ids": [
      4714
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Suren Byna",
    "display_name": "Suren Byna",
    "affiliation": "Ohio State University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "FAST": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploiting user activeness for data retention in HPC systems",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "uncovering access reuse and sharing characteristics of iointensive files on largescale production hpc systems",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 2116,
    "paper_ids": [
      4714
    ],
    "papers_without_artifact_ids": [
      3573
    ]
  },
  {
    "name": "Hyogi Sim",
    "display_name": "Hyogi Sim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploiting user activeness for data retention in HPC systems",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2117,
    "paper_ids": [
      4714
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sangkeun Lee 0001",
    "display_name": "Sangkeun Lee",
    "affiliation": "Korea University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploiting user activeness for data retention in HPC systems",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2118,
    "paper_ids": [
      4714
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sudharshan Vazhkudai",
    "display_name": "Sudharshan Vazhkudai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploiting user activeness for data retention in HPC systems",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2119,
    "paper_ids": [
      4714
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yong Chen 0001",
    "display_name": "Yong Chen",
    "affiliation": "Texas Tech University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploiting user activeness for data retention in HPC systems",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2120,
    "paper_ids": [
      4714
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Baolin Li 0001",
    "display_name": "Baolin Li",
    "affiliation": "University of Texas at Dallas",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RIBBON: cost-effective and qos-aware deep learning model inference using a diverse pool of cloud computing instances",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2121,
    "paper_ids": [
      3570
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rohan Basu Roy",
    "display_name": "Rohan Basu Roy",
    "affiliation": "University of Utah",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RIBBON: cost-effective and qos-aware deep learning model inference using a diverse pool of cloud computing instances",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2122,
    "paper_ids": [
      3570
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vijay Gadepally",
    "display_name": "Vijay Gadepally",
    "affiliation": "Massachusetts Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RIBBON: cost-effective and qos-aware deep learning model inference using a diverse pool of cloud computing instances",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2123,
    "paper_ids": [
      3570
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Karen Gettings",
    "display_name": "Karen Gettings",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RIBBON: cost-effective and qos-aware deep learning model inference using a diverse pool of cloud computing instances",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2124,
    "paper_ids": [
      3570
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hang Cao",
    "display_name": "Hang Cao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Temporal vectorization for stencils",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2125,
    "paper_ids": [
      3564
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pengqi Lu",
    "display_name": "Pengqi Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Temporal vectorization for stencils",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2126,
    "paper_ids": [
      3564
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shengen Yan",
    "display_name": "Shengen Yan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Characterization and prediction of deep learning workloads in large-scale GPU datacenters",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2127,
    "paper_ids": [
      730
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yiduo Wang 0002",
    "display_name": "Yiduo Wang",
    "affiliation": "University of Science and Technology of China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "SOSP": 0,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Lunule: an agile and judicious metadata load balancer for CephFS",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cfs scaling metadata service for distributed file system via pruned scope of critical sections",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 2128,
    "paper_ids": [
      1603
    ],
    "papers_without_artifact_ids": [
      1605
    ]
  },
  {
    "name": "Xinyang Shao",
    "display_name": "Xinyang Shao",
    "affiliation": "University of Science and Technology of China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Lunule: an agile and judicious metadata load balancer for CephFS",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2129,
    "paper_ids": [
      1603
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Youxu Chen",
    "display_name": "Youxu Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Lunule: an agile and judicious metadata load balancer for CephFS",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2130,
    "paper_ids": [
      1603
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tianxi Li",
    "display_name": "Tianxi Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HatRPC: hint-accelerated thrift RPC over RDMA",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2131,
    "paper_ids": [
      4715
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haiyang Shi",
    "display_name": "Haiyang Shi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HatRPC: hint-accelerated thrift RPC over RDMA",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2132,
    "paper_ids": [
      4715
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaoyi Lu 0001",
    "display_name": "Xiaoyi Lu",
    "affiliation": "University of Florida",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HatRPC: hint-accelerated thrift RPC over RDMA",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2133,
    "paper_ids": [
      4715
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lizhi Xiang",
    "display_name": "Lizhi Xiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "cuTS: scaling subgraph isomorphism on distributed multi-GPU systems using trie based data structure",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2134,
    "paper_ids": [
      4716
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arif Khan 0005",
    "display_name": "Arif Khan",
    "affiliation": "Pacific Northwest National Laboratory, Richland, WA, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "cuTS: scaling subgraph isomorphism on distributed multi-GPU systems using trie based data structure",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2135,
    "paper_ids": [
      4716
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Edoardo Serra",
    "display_name": "Edoardo Serra",
    "affiliation": "Boise State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "cuTS: scaling subgraph isomorphism on distributed multi-GPU systems using trie based data structure",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2136,
    "paper_ids": [
      4716
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mahantesh Halappanavar",
    "display_name": "Mahantesh Halappanavar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "cuTS: scaling subgraph isomorphism on distributed multi-GPU systems using trie based data structure",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "singlenode partitionedmemory for huge graph analytics cost and performance tradeoffs",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2137,
    "paper_ids": [
      4716
    ],
    "papers_without_artifact_ids": [
      4717
    ]
  },
  {
    "name": "Aravind Sukumaran-Rajam",
    "display_name": "Aravind Sukumaran-Rajam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "cuTS: scaling subgraph isomorphism on distributed multi-GPU systems using trie based data structure",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2138,
    "paper_ids": [
      4716
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ghadeer Alabandi",
    "display_name": "Ghadeer Alabandi",
    "affiliation": "Texas State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Discovering and balancing fundamental cycles in large signed graphs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2139,
    "paper_ids": [
      4718
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jelena Tesic",
    "display_name": "Jelena Tesic",
    "affiliation": "Texas State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Discovering and balancing fundamental cycles in large signed graphs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2140,
    "paper_ids": [
      4718
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lucas Rusnak",
    "display_name": "Lucas Rusnak",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Discovering and balancing fundamental cycles in large signed graphs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2141,
    "paper_ids": [
      4718
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Burtscher",
    "display_name": "Martin Burtscher",
    "affiliation": "Texas State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Discovering and balancing fundamental cycles in large signed graphs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2142,
    "paper_ids": [
      4718
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Kronbichler 0002",
    "display_name": "Martin Kronbichler",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A next-generation discontinuous galerkin fluid dynamics solver with application to high-resolution lung airflow simulations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2143,
    "paper_ids": [
      3576
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Niklas Fehn",
    "display_name": "Niklas Fehn",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A next-generation discontinuous galerkin fluid dynamics solver with application to high-resolution lung airflow simulations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2144,
    "paper_ids": [
      3576
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peter Munch",
    "display_name": "Peter Munch",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A next-generation discontinuous galerkin fluid dynamics solver with application to high-resolution lung airflow simulations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2145,
    "paper_ids": [
      3576
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maximilian Bergbauer",
    "display_name": "Maximilian Bergbauer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A next-generation discontinuous galerkin fluid dynamics solver with application to high-resolution lung airflow simulations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2146,
    "paper_ids": [
      3576
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Karl-Robert Wichmann",
    "display_name": "Karl-Robert Wichmann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A next-generation discontinuous galerkin fluid dynamics solver with application to high-resolution lung airflow simulations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2147,
    "paper_ids": [
      3576
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Carolin Geitner",
    "display_name": "Carolin Geitner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A next-generation discontinuous galerkin fluid dynamics solver with application to high-resolution lung airflow simulations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2148,
    "paper_ids": [
      3576
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Momme Allalen",
    "display_name": "Momme Allalen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A next-generation discontinuous galerkin fluid dynamics solver with application to high-resolution lung airflow simulations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2149,
    "paper_ids": [
      3576
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wolfgang A. Wall",
    "display_name": "Wolfgang A. Wall",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A next-generation discontinuous galerkin fluid dynamics solver with application to high-resolution lung airflow simulations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2150,
    "paper_ids": [
      3576
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Md. Arifuzzaman",
    "display_name": "Md. Arifuzzaman",
    "affiliation": "Missouri S&T",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Online optimization of file transfers in high-speed networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2151,
    "paper_ids": [
      4719
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Engin Arslan",
    "display_name": "Engin Arslan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 1,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "NSDI": {
        "2018": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Online optimization of file transfers in high-speed networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "byte vswitch a highperformance virtual switch for cloud networking",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "pcc vivace onlinelearning congestion control",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 2152,
    "paper_ids": [
      4719
    ],
    "papers_without_artifact_ids": [
      4720,
      3245
    ]
  },
  {
    "name": "Menachem Adelman",
    "display_name": "Menachem Adelman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2153,
    "paper_ids": [
      3578
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cristina Anderson",
    "display_name": "Cristina Anderson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2154,
    "paper_ids": [
      3578
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexander Breuer",
    "display_name": "Alexander Breuer",
    "affiliation": "University of California, San Diego",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2155,
    "paper_ids": [
      3578
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jeremy Bruestle",
    "display_name": "Jeremy Bruestle",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2156,
    "paper_ids": [
      3578
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Narendra Chaudhary",
    "display_name": "Narendra Chaudhary",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2157,
    "paper_ids": [
      3578
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abhisek Kundu",
    "display_name": "Abhisek Kundu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2158,
    "paper_ids": [
      3578
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Denise Kutnick",
    "display_name": "Denise Kutnick",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2159,
    "paper_ids": [
      3578
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Frank Laub",
    "display_name": "Frank Laub",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2160,
    "paper_ids": [
      3578
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hans Pabst",
    "display_name": "Hans Pabst",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2161,
    "paper_ids": [
      3578
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Barukh Ziv",
    "display_name": "Barukh Ziv",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tensor processing primitives: a programming abstraction for efficiency and portability in deep learning workloads",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2162,
    "paper_ids": [
      3578
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guixiang Ma",
    "display_name": "Guixiang Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DistGNN: scalable distributed training for large-scale graph neural networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2163,
    "paper_ids": [
      3579
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nesreen K. Ahmed",
    "display_name": "Nesreen K. Ahmed",
    "affiliation": "Cisco AI Research, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DistGNN: scalable distributed training for large-scale graph neural networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2164,
    "paper_ids": [
      3579
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Saleh Ashkboos",
    "display_name": "Saleh Ashkboos",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flare: flexible in-network allreduce",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2165,
    "paper_ids": [
      747
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kiran Ranganath",
    "display_name": "Kiran Ranganath",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MAPA: multi-accelerator pattern allocation policy for multi-tenant GPU servers",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2166,
    "paper_ids": [
      2786
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joshua D. Suetterlein",
    "display_name": "Joshua D. Suetterlein",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MAPA: multi-accelerator pattern allocation policy for multi-tenant GPU servers",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2167,
    "paper_ids": [
      2786
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joseph B. Manzano",
    "display_name": "Joseph B. Manzano",
    "affiliation": "Pacific Northwest National Laboratory (PNNL), Richland, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MAPA: multi-accelerator pattern allocation policy for multi-tenant GPU servers",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2168,
    "paper_ids": [
      2786
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Wong 0001",
    "display_name": "Daniel Wong",
    "affiliation": "Univ. of California - Riverside",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MAPA: multi-accelerator pattern allocation policy for multi-tenant GPU servers",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2169,
    "paper_ids": [
      2786
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Samyam Rajbhandari",
    "display_name": "Samyam Rajbhandari",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZeRO-infinity: breaking the GPU memory wall for extreme scale deep learning",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2170,
    "paper_ids": [
      3580
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jeff Rasley",
    "display_name": "Jeff Rasley",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZeRO-infinity: breaking the GPU memory wall for extreme scale deep learning",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2171,
    "paper_ids": [
      3580
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shaden Smith",
    "display_name": "Shaden Smith",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZeRO-infinity: breaking the GPU memory wall for extreme scale deep learning",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2172,
    "paper_ids": [
      3580
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Emily Costa",
    "display_name": "Emily Costa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Systematically inferring I/O performance variability by examining repetitive job behavior",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2173,
    "paper_ids": [
      3571
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benjamin Schwaller",
    "display_name": "Benjamin Schwaller",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Systematically inferring I/O performance variability by examining repetitive job behavior",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2174,
    "paper_ids": [
      3571
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jim M. Brandt",
    "display_name": "Jim M. Brandt",
    "affiliation": "Sandia National Laboratories",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Systematically inferring I/O performance variability by examining repetitive job behavior",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "measuring congestion in highperformance datacenter interconnects",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 2175,
    "paper_ids": [
      3571
    ],
    "papers_without_artifact_ids": [
      3851
    ]
  },
  {
    "name": "Tong Geng",
    "display_name": "Tong Geng",
    "affiliation": "Rice University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "APNN-TC: accelerating arbitrary precision neural networks on ampere GPU tensor cores",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mgg accelerating graph neural networks with finegrained intrakernel communicationcomputation pipelining on multigpu platforms",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 2176,
    "paper_ids": [
      1674
    ],
    "papers_without_artifact_ids": [
      1679
    ]
  },
  {
    "name": "Tiziano De Matteis",
    "display_name": "Tiziano De Matteis",
    "affiliation": "VU Amsterdam",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Productivity, portability, performance: data-centric Python",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an io characterizing study of offloading llm models and kv caches to nvme ssd",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 2177,
    "paper_ids": [
      748
    ],
    "papers_without_artifact_ids": [
      4721
    ]
  },
  {
    "name": "Johannes de Fine Licht",
    "display_name": "Johannes de Fine Licht",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Productivity, portability, performance: data-centric Python",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2178,
    "paper_ids": [
      748
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Luca Lavarini",
    "display_name": "Luca Lavarini",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Productivity, portability, performance: data-centric Python",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2179,
    "paper_ids": [
      748
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuya Uezato",
    "display_name": "Yuya Uezato",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Accelerating XOR-based erasure coding using program optimization techniques",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2180,
    "paper_ids": [
      4722
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bo Fang 0002",
    "display_name": "Bo Fang",
    "affiliation": "University of Texas at Arlington",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SV-sim: scalable PGAS-based state vector simulation of quantum circuits",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2181,
    "paper_ids": [
      3581
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christopher E. Granade",
    "display_name": "Christopher E. Granade",
    "affiliation": "Microsoft Research",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SV-sim: scalable PGAS-based state vector simulation of quantum circuits",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2182,
    "paper_ids": [
      3581
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guen Prawiroatmodjo",
    "display_name": "Guen Prawiroatmodjo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SV-sim: scalable PGAS-based state vector simulation of quantum circuits",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2183,
    "paper_ids": [
      3581
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bettina Heim",
    "display_name": "Bettina Heim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SV-sim: scalable PGAS-based state vector simulation of quantum circuits",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2184,
    "paper_ids": [
      3581
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Roetteler",
    "display_name": "Martin Roetteler",
    "affiliation": "Microsoft Research",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SV-sim: scalable PGAS-based state vector simulation of quantum circuits",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2185,
    "paper_ids": [
      3581
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sriram Krishnamoorthy",
    "display_name": "Sriram Krishnamoorthy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SV-sim: scalable PGAS-based state vector simulation of quantum circuits",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2186,
    "paper_ids": [
      3581
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "H. T. Kung 0001",
    "display_name": "H. T. Kung",
    "affiliation": "Harvard University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CAKE: matrix multiplication using constant-bandwidth blocks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2187,
    "paper_ids": [
      4723
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vikas Natesh",
    "display_name": "Vikas Natesh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CAKE: matrix multiplication using constant-bandwidth blocks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2188,
    "paper_ids": [
      4723
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrew Sabot",
    "display_name": "Andrew Sabot",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CAKE: matrix multiplication using constant-bandwidth blocks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2189,
    "paper_ids": [
      4723
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Md Hasanur Rahman 0001",
    "display_name": "Md Hasanur Rahman",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PEPPA-X: finding program test inputs to bound silent data corruption vulnerability in HPC applications",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2190,
    "paper_ids": [
      4724
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aabid Shamji",
    "display_name": "Aabid Shamji",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PEPPA-X: finding program test inputs to bound silent data corruption vulnerability in HPC applications",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2191,
    "paper_ids": [
      4724
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shengjian Guo",
    "display_name": "Shengjian Guo",
    "affiliation": "Baidu Security",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PEPPA-X: finding program test inputs to bound silent data corruption vulnerability in HPC applications",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "muzz threadaware greybox fuzzing for effective bug hunting in multithreaded programs",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 2192,
    "paper_ids": [
      4724
    ],
    "papers_without_artifact_ids": [
      3133
    ]
  },
  {
    "name": "Guanpeng Li",
    "display_name": "Guanpeng Li",
    "affiliation": "University of Iowa",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PEPPA-X: finding program test inputs to bound silent data corruption vulnerability in HPC applications",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2193,
    "paper_ids": [
      4724
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sunil Kumar 0001",
    "display_name": "Sunil Kumar",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cuttlefish: library for achieving energy efficiency in multicore parallel programs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2194,
    "paper_ids": [
      4725
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Akshat Gupta",
    "display_name": "Akshat Gupta",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cuttlefish: library for achieving energy efficiency in multicore parallel programs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2195,
    "paper_ids": [
      4725
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vivek Kumar 0001",
    "display_name": "Vivek Kumar",
    "affiliation": "IIIT Delhi",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cuttlefish: library for achieving energy efficiency in multicore parallel programs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2196,
    "paper_ids": [
      4725
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sridutt Bhalachandra",
    "display_name": "Sridutt Bhalachandra",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cuttlefish: library for achieving energy efficiency in multicore parallel programs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2197,
    "paper_ids": [
      4725
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kumar Saurabh",
    "display_name": "Kumar Saurabh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scalable adaptive PDE solvers in arbitrary domains",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "case study of sarscov2 transmission risk assessment in indoor environments using cloud computing resources",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2198,
    "paper_ids": [
      4726
    ],
    "papers_without_artifact_ids": [
      4727
    ]
  },
  {
    "name": "Masado Ishii",
    "display_name": "Masado Ishii",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scalable adaptive PDE solvers in arbitrary domains",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "case study of sarscov2 transmission risk assessment in indoor environments using cloud computing resources",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2199,
    "paper_ids": [
      4726
    ],
    "papers_without_artifact_ids": [
      4727
    ]
  },
  {
    "name": "Milinda Fernando",
    "display_name": "Milinda Fernando",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scalable adaptive PDE solvers in arbitrary domains",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2200,
    "paper_ids": [
      4726
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Boshun Gao",
    "display_name": "Boshun Gao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scalable adaptive PDE solvers in arbitrary domains",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "case study of sarscov2 transmission risk assessment in indoor environments using cloud computing resources",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2201,
    "paper_ids": [
      4726
    ],
    "papers_without_artifact_ids": [
      4727
    ]
  },
  {
    "name": "Kendrick Tan",
    "display_name": "Kendrick Tan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scalable adaptive PDE solvers in arbitrary domains",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "case study of sarscov2 transmission risk assessment in indoor environments using cloud computing resources",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2202,
    "paper_ids": [
      4726
    ],
    "papers_without_artifact_ids": [
      4727
    ]
  },
  {
    "name": "Ming-Chen Hsu",
    "display_name": "Ming-Chen Hsu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scalable adaptive PDE solvers in arbitrary domains",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2203,
    "paper_ids": [
      4726
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Adarsh Krishnamurthy",
    "display_name": "Adarsh Krishnamurthy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 3
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 3
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scalable adaptive PDE solvers in arbitrary domains",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "case study of sarscov2 transmission risk assessment in indoor environments using cloud computing resources",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "distributed multigrid neural solvers on megavoxel domains",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2204,
    "paper_ids": [
      4726
    ],
    "papers_without_artifact_ids": [
      4727,
      4728
    ]
  },
  {
    "name": "Hari Sundar",
    "display_name": "Hari Sundar",
    "affiliation": "Tufts University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scalable adaptive PDE solvers in arbitrary domains",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "case study of sarscov2 transmission risk assessment in indoor environments using cloud computing resources",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2205,
    "paper_ids": [
      4726
    ],
    "papers_without_artifact_ids": [
      4727
    ]
  },
  {
    "name": "Baskar Ganapathysubramanian",
    "display_name": "Baskar Ganapathysubramanian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 3
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 3
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scalable adaptive PDE solvers in arbitrary domains",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "case study of sarscov2 transmission risk assessment in indoor environments using cloud computing resources",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "distributed multigrid neural solvers on megavoxel domains",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2206,
    "paper_ids": [
      4726
    ],
    "papers_without_artifact_ids": [
      4727,
      4728
    ]
  },
  {
    "name": "Jingwen Leng",
    "display_name": "Jingwen Leng",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enable simultaneous DNN services based on deterministic operator overlap and precise latency prediction",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2207,
    "paper_ids": [
      1084
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jieru Zhao",
    "display_name": "Jieru Zhao",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enable simultaneous DNN services based on deterministic operator overlap and precise latency prediction",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2208,
    "paper_ids": [
      1084
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "J. Gregory Pauloski",
    "display_name": "J. Gregory Pauloski",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "KAISA: an adaptive second-order optimizer framework for deep neural networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2209,
    "paper_ids": [
      1305
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qi Huang",
    "display_name": "Qi Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 1,
      "SOSP": 0,
      "ATC": 0,
      "FAST": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "SOSP": {},
      "ATC": {},
      "FAST": {
        "2015": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "KAISA: an adaptive second-order optimizer framework for deep neural networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "megascale scaling large language model training to more than 10 000 gpus",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "ripq advanced photo caching on flash for facebook",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 2210,
    "paper_ids": [
      1305
    ],
    "papers_without_artifact_ids": [
      1001,
      2746
    ]
  },
  {
    "name": "Lei Huang 0019",
    "display_name": "Lei Huang",
    "affiliation": "University of Texas at Austin",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "KAISA: an adaptive second-order optimizer framework for deep neural networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2211,
    "paper_ids": [
      1305
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kyle Chard",
    "display_name": "Kyle Chard",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "KAISA: an adaptive second-order optimizer framework for deep neural networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2212,
    "paper_ids": [
      1305
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ian T. Foster",
    "display_name": "Ian T. Foster",
    "affiliation": "University of Chicago",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "KAISA: an adaptive second-order optimizer framework for deep neural networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bootstrapping insitu workflow autotuning via combining performance models of component applications",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2213,
    "paper_ids": [
      1305
    ],
    "papers_without_artifact_ids": [
      4729
    ]
  },
  {
    "name": "Zhao Zhang 0007",
    "display_name": "Zhao Zhang",
    "affiliation": "Rutgers University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "KAISA: an adaptive second-order optimizer framework for deep neural networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2214,
    "paper_ids": [
      1305
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Reid Priedhorsky",
    "display_name": "Reid Priedhorsky",
    "affiliation": "Los Alamos National Laboratory, Defense Systems and Analysis Division, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Minimizing privilege for building HPC containers",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2215,
    "paper_ids": [
      4730
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shane Richard Canon",
    "display_name": "Shane Richard Canon",
    "affiliation": "Lawrence Berkeley National Laboratory",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Minimizing privilege for building HPC containers",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2216,
    "paper_ids": [
      4730
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Timothy Randles",
    "display_name": "Timothy Randles",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Minimizing privilege for building HPC containers",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2217,
    "paper_ids": [
      4730
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrew J. Younge",
    "display_name": "Andrew J. Younge",
    "affiliation": "Sandia National Laboratories",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Minimizing privilege for building HPC containers",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2218,
    "paper_ids": [
      4730
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Liangfeng Cheng",
    "display_name": "Liangfeng Cheng",
    "affiliation": "University of Alberta",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LogECMem: coupling erasure-coded in-memory key-value stores with parity logging",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploiting combined locality for widestripe erasure coding in distributed storage",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2219,
    "paper_ids": [
      3582
    ],
    "papers_without_artifact_ids": [
      3825
    ]
  },
  {
    "name": "Yuchong Hu",
    "display_name": "Yuchong Hu",
    "affiliation": "HUST",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 0,
      "FAST": 6
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {},
      "FAST": {
        "2024": 1,
        "2021": 1,
        "2012": 1,
        "2023": 1,
        "2019": 1,
        "2025": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LogECMem: coupling erasure-coded in-memory key-value stores with parity logging",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "revisiting network coding for warm blob storage",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "elect enabling erasure coding tiering for lsmtreebased storage",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "pararc embracing subpacketization for repair parallelization in msrcoded storage",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "exploiting combined locality for widestripe erasure coding in distributed storage",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "openec toward unified and configurable erasure coding management in distributed storage systems",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "nccloud applying network coding for the storage repair in a cloudofclouds",
        "conference": "FAST",
        "year": 2012
      }
    ],
    "author_id": 438,
    "paper_ids": [
      3582
    ],
    "papers_without_artifact_ids": [
      3584,
      3820,
      3585,
      3825,
      3827,
      3830
    ]
  },
  {
    "name": "Zhaokang Ke",
    "display_name": "Zhaokang Ke",
    "affiliation": "University of Minnesota",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LogECMem: coupling erasure-coded in-memory key-value stores with parity logging",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2220,
    "paper_ids": [
      3582
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jia Xu",
    "display_name": "Jia Xu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LogECMem: coupling erasure-coded in-memory key-value stores with parity logging",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2221,
    "paper_ids": [
      3582
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qiaori Yao",
    "display_name": "Qiaori Yao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LogECMem: coupling erasure-coded in-memory key-value stores with parity logging",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploiting combined locality for widestripe erasure coding in distributed storage",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2222,
    "paper_ids": [
      3582
    ],
    "papers_without_artifact_ids": [
      3825
    ]
  },
  {
    "name": "Weichun Wang",
    "display_name": "Weichun Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LogECMem: coupling erasure-coded in-memory key-value stores with parity logging",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploiting combined locality for widestripe erasure coding in distributed storage",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2223,
    "paper_ids": [
      3582
    ],
    "papers_without_artifact_ids": [
      3825
    ]
  },
  {
    "name": "Wei Chen",
    "display_name": "Wei Chen",
    "affiliation": "Hong Kong University of Science and Technology",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 1,
      "SOSP": 0,
      "ATC": 0,
      "FAST": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "SOSP": {},
      "ATC": {},
      "FAST": {
        "2021": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LogECMem: coupling erasure-coded in-memory key-value stores with parity logging",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pyrrha congestionrootbased flow control to eliminate headofline blocking in datacenter",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "exploiting combined locality for widestripe erasure coding in distributed storage",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2224,
    "paper_ids": [
      3582
    ],
    "papers_without_artifact_ids": [
      2881,
      3825
    ]
  },
  {
    "name": "Xian Zhou",
    "display_name": "Xian Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding, predicting and scheduling serverless workloads under partial interference",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2225,
    "paper_ids": [
      2790
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinghan Sun",
    "display_name": "Jinghan Sun",
    "affiliation": "University of Illinois",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pinpointing crash-consistency bugs in the HPC I/O stack: a cross-layer approach",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "blockflex enabling storage harvesting with softwaredefined flash in modern cloud platforms",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 2226,
    "paper_ids": [
      3467
    ],
    "papers_without_artifact_ids": [
      3468
    ]
  },
  {
    "name": "Marc Snir",
    "display_name": "Marc Snir",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pinpointing crash-consistency bugs in the HPC I/O stack: a cross-layer approach",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pilgrim scalable and near lossless mpi tracing",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2227,
    "paper_ids": [
      3467
    ],
    "papers_without_artifact_ids": [
      4731
    ]
  },
  {
    "name": "Zhuohui Duan",
    "display_name": "Zhuohui Duan",
    "affiliation": "Huazhong University of Science and Technology, Wuhan, China",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 1,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2025": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hardware-supported remote persistence for distributed persistent memory",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aegonkv a high bandwidth low tail latency and low storage cost kvseparated lsm store with smartssdbased gc offloading",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "towards highthroughput and lowlatency billionscale vector search via cpugpu collaborative filtering and reranking",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "scalable billionpoint approximate nearest neighbor search using smartssds",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 905,
    "paper_ids": [
      1091
    ],
    "papers_without_artifact_ids": [
      1101,
      1102,
      1103
    ]
  },
  {
    "name": "Haodi Lu",
    "display_name": "Haodi Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hardware-supported remote persistence for distributed persistent memory",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2228,
    "paper_ids": [
      1091
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Song Wu 0001",
    "display_name": "Song Wu",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 1,
      "SOSP": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "SOSP": {
        "2023": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hardware-supported remote persistence for distributed persistent memory",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "streambox a lightweight gpu sandbox for serverless inference workflow",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "pvm efficient shadow paging for deploying secure containers in cloudnative environment",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 2229,
    "paper_ids": [
      1091
    ],
    "papers_without_artifact_ids": [
      1104,
      1936
    ]
  },
  {
    "name": "Hongzheng Chen",
    "display_name": "Hongzheng Chen",
    "affiliation": "Cornell University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Krill: a compiler and runtime system for concurrent graph processing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bgl gpuefficient gnn training by optimizing graph data io and preprocessing",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 2230,
    "paper_ids": [
      4732
    ],
    "papers_without_artifact_ids": [
      2831
    ]
  },
  {
    "name": "Minghua Shen",
    "display_name": "Minghua Shen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Krill: a compiler and runtime system for concurrent graph processing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2231,
    "paper_ids": [
      4732
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nong Xiao 0001",
    "display_name": "Nong Xiao",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "FAST": {
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Krill: a compiler and runtime system for concurrent graph processing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "xerxes extensive exploration of scalable hardware systems with cxlbased simulation framework",
        "conference": "FAST",
        "year": 2026
      }
    ],
    "author_id": 2232,
    "paper_ids": [
      4732
    ],
    "papers_without_artifact_ids": [
      649
    ]
  },
  {
    "name": "Yutong Lu",
    "display_name": "Yutong Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Krill: a compiler and runtime system for concurrent graph processing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2233,
    "paper_ids": [
      4732
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Paul Mullowney",
    "display_name": "Paul Mullowney",
    "affiliation": "Tech-X Corporation, Boulder, CO, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Preparing an incompressible-flow fluid dynamics code for exascale-class wind energy simulations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2234,
    "paper_ids": [
      4733
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ruipeng Li",
    "display_name": "Ruipeng Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Preparing an incompressible-flow fluid dynamics code for exascale-class wind energy simulations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2235,
    "paper_ids": [
      4733
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stephen J. Thomas",
    "display_name": "Stephen J. Thomas",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Preparing an incompressible-flow fluid dynamics code for exascale-class wind energy simulations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2236,
    "paper_ids": [
      4733
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shreyas Ananthan",
    "display_name": "Shreyas Ananthan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Preparing an incompressible-flow fluid dynamics code for exascale-class wind energy simulations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2237,
    "paper_ids": [
      4733
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ashesh Sharma",
    "display_name": "Ashesh Sharma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Preparing an incompressible-flow fluid dynamics code for exascale-class wind energy simulations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2238,
    "paper_ids": [
      4733
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jon S. Rood",
    "display_name": "Jon S. Rood",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Preparing an incompressible-flow fluid dynamics code for exascale-class wind energy simulations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2239,
    "paper_ids": [
      4733
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alan B. Williams",
    "display_name": "Alan B. Williams",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Preparing an incompressible-flow fluid dynamics code for exascale-class wind energy simulations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2240,
    "paper_ids": [
      4733
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael A. Sprague",
    "display_name": "Michael A. Sprague",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Preparing an incompressible-flow fluid dynamics code for exascale-class wind energy simulations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2241,
    "paper_ids": [
      4733
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qing Zheng",
    "display_name": "Qing Zheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeltaFS: a scalable no-ground-truth filesystem for massively-parallel computing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2242,
    "paper_ids": [
      1322
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Charles D. Cranor",
    "display_name": "Charles D. Cranor",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {},
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeltaFS: a scalable no-ground-truth filesystem for massively-parallel computing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2243,
    "paper_ids": [
      1322
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Garth A. Gibson",
    "display_name": "Garth A. Gibson",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "SC": 1,
      "SOSP": 0,
      "EUROSYS": 0,
      "ATC": 0,
      "FAST": 5,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "ATC": {},
      "FAST": {
        "2008": 2,
        "2011": 1,
        "2004": 1,
        "2007": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeltaFS: a scalable no-ground-truth filesystem for massively-parallel computing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scale and concurrency of giga file system directories with millions of files",
        "conference": "FAST",
        "year": 2011
      },
      {
        "title": "measurement and analysis of tcp throughput collapse in clusterbased storage systems",
        "conference": "FAST",
        "year": 2008
      },
      {
        "title": "scalable performance of the panasas parallel file system",
        "conference": "FAST",
        "year": 2008
      },
      {
        "title": "disk failures in the real world what does an mttf of 1 000 000 hours mean to you",
        "conference": "FAST",
        "year": 2007
      },
      {
        "title": "scaling file service up and out",
        "conference": "FAST",
        "year": 2004
      }
    ],
    "author_id": 2244,
    "paper_ids": [
      1322
    ],
    "papers_without_artifact_ids": [
      4734,
      1338,
      4735,
      4736,
      4737
    ]
  },
  {
    "name": "George Amvrosiadis",
    "display_name": "George Amvrosiadis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 1,
      "SOSP": 1,
      "ATC": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "SOSP": {
        "2024": 1
      },
      "ATC": {},
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeltaFS: a scalable no-ground-truth filesystem for massively-parallel computing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fairywren a sustainable cache for emerging writereaderase flash interfaces",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "reducing crosscloudregion costs with the autoconfiguring macaron cache",
        "conference": "SOSP",
        "year": 2024
      }
    ],
    "author_id": 2245,
    "paper_ids": [
      1322
    ],
    "papers_without_artifact_ids": [
      1326,
      1328
    ]
  },
  {
    "name": "Bradley W. Settlemyer",
    "display_name": "Bradley W. Settlemyer",
    "affiliation": "Los Alamos National Laboratory",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeltaFS: a scalable no-ground-truth filesystem for massively-parallel computing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2246,
    "paper_ids": [
      1322
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gary A. Grider",
    "display_name": "Gary A. Grider",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeltaFS: a scalable no-ground-truth filesystem for massively-parallel computing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2247,
    "paper_ids": [
      1322
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anil Gaihre",
    "display_name": "Anil Gaihre",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dr. Top-k: delegate-centric Top-k on GPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2248,
    "paper_ids": [
      2787
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Da Zheng 0004",
    "display_name": "Da Zheng",
    "affiliation": "Ant Group, Hangzhou, China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "FAST": {
        "2015": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dr. Top-k: delegate-centric Top-k on GPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flashgraph processing billionnode graphs on an array of commodity ssds",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 2249,
    "paper_ids": [
      2787
    ],
    "papers_without_artifact_ids": [
      4738
    ]
  },
  {
    "name": "Scott Weitze",
    "display_name": "Scott Weitze",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dr. Top-k: delegate-centric Top-k on GPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2250,
    "paper_ids": [
      2787
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lingda Li",
    "display_name": "Lingda Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dr. Top-k: delegate-centric Top-k on GPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2251,
    "paper_ids": [
      2787
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Caiwen Ding",
    "display_name": "Caiwen Ding",
    "affiliation": "University of Minnesota",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dr. Top-k: delegate-centric Top-k on GPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "et rethinking selfattention for transformer models on gpus",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2252,
    "paper_ids": [
      2787
    ],
    "papers_without_artifact_ids": [
      3588
    ]
  },
  {
    "name": "Xiaoye S. Li",
    "display_name": "Xiaoye S. Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dr. Top-k: delegate-centric Top-k on GPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2253,
    "paper_ids": [
      2787
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Konstantinos Parasyris",
    "display_name": "Konstantinos Parasyris",
    "affiliation": "Lawrence Livermore National Laboratory",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HPAC: evaluating approximate computing techniques on HPC OpenMP applications",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2254,
    "paper_ids": [
      4739
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Giorgis Georgakoudis",
    "display_name": "Giorgis Georgakoudis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HPAC: evaluating approximate computing techniques on HPC OpenMP applications",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2255,
    "paper_ids": [
      4739
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Harshitha Menon",
    "display_name": "Harshitha Menon",
    "affiliation": "Lawrence Livermore National Laboratory, CA, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HPAC: evaluating approximate computing techniques on HPC OpenMP applications",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2256,
    "paper_ids": [
      4739
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "James Diffenderfer",
    "display_name": "James Diffenderfer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HPAC: evaluating approximate computing techniques on HPC OpenMP applications",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2257,
    "paper_ids": [
      4739
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ignacio Laguna",
    "display_name": "Ignacio Laguna",
    "affiliation": "Lawrence Livermore National Laboratory, CA, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HPAC: evaluating approximate computing techniques on HPC OpenMP applications",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2258,
    "paper_ids": [
      4739
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Osei-Kuffuor",
    "display_name": "Daniel Osei-Kuffuor",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HPAC: evaluating approximate computing techniques on HPC OpenMP applications",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2259,
    "paper_ids": [
      4739
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Markus Schordan",
    "display_name": "Markus Schordan",
    "affiliation": "Lawrence Livermore National Laboratory, CA, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HPAC: evaluating approximate computing techniques on HPC OpenMP applications",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2260,
    "paper_ids": [
      4739
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nafiseh Moti",
    "display_name": "Nafiseh Moti",
    "affiliation": "Johannes Gutenberg-Universitt Mainz, Germany",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Simurgh: a fully decentralized and secure NVMM user space file system",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2261,
    "paper_ids": [
      4740
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Frederic Schimmelpfennig",
    "display_name": "Frederic Schimmelpfennig",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Simurgh: a fully decentralized and secure NVMM user space file system",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2262,
    "paper_ids": [
      4740
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Reza Salkhordeh",
    "display_name": "Reza Salkhordeh",
    "affiliation": "Johannes Gutenberg-Universitt Mainz, Germany",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Simurgh: a fully decentralized and secure NVMM user space file system",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2263,
    "paper_ids": [
      4740
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Klopp",
    "display_name": "David Klopp",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Simurgh: a fully decentralized and secure NVMM user space file system",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2264,
    "paper_ids": [
      4740
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Toni Cortes",
    "display_name": "Toni Cortes",
    "affiliation": "Polytechnic Univ. of Catalonia",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {},
      "FAST": {
        "2014": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Simurgh: a fully decentralized and secure NVMM user space file system",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "craid online raid upgrades using dynamic hot data reorganization",
        "conference": "FAST",
        "year": 2014
      }
    ],
    "author_id": 2265,
    "paper_ids": [
      4740
    ],
    "papers_without_artifact_ids": [
      4741
    ]
  },
  {
    "name": "Ulrich Rückert 0001",
    "display_name": "Ulrich Rückert",
    "affiliation": "ISI Kolkata",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Simurgh: a fully decentralized and secure NVMM user space file system",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7976,
    "paper_ids": [
      4740
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "André Brinkmann",
    "display_name": "André Brinkmann",
    "affiliation": "University of Mainz",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SC": 1,
      "EUROSYS": 0,
      "FAST": 4
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "EUROSYS": {},
      "FAST": {
        "2024": 1,
        "2015": 1,
        "2016": 1,
        "2013": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Simurgh: a fully decentralized and secure NVMM user space file system",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "combining buffered io and direct io in distributed file systems",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "the devil is in the details implementing flash page reuse with wom codes",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "analysis of the ecmwf storage landscape",
        "conference": "FAST",
        "year": 2015
      },
      {
        "title": "file recipe compression in data deduplication systems",
        "conference": "FAST",
        "year": 2013
      }
    ],
    "author_id": 7977,
    "paper_ids": [
      4740
    ],
    "papers_without_artifact_ids": [
      4742,
      4743,
      4744,
      4745
    ]
  },
  {
    "name": "Linus Seelinger",
    "display_name": "Linus Seelinger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "High performance uncertainty quantification with parallelized multilevel Markov chain Monte Carlo",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2267,
    "paper_ids": [
      3569
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anne Reinarz",
    "display_name": "Anne Reinarz",
    "affiliation": "Durham University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "High performance uncertainty quantification with parallelized multilevel Markov chain Monte Carlo",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2268,
    "paper_ids": [
      3569
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leonhard Rannabauer",
    "display_name": "Leonhard Rannabauer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "High performance uncertainty quantification with parallelized multilevel Markov chain Monte Carlo",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2269,
    "paper_ids": [
      3569
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peter Bastian",
    "display_name": "Peter Bastian",
    "affiliation": "Heidelberg University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "High performance uncertainty quantification with parallelized multilevel Markov chain Monte Carlo",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2270,
    "paper_ids": [
      3569
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Robert Scheichl",
    "display_name": "Robert Scheichl",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "High performance uncertainty quantification with parallelized multilevel Markov chain Monte Carlo",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2271,
    "paper_ids": [
      3569
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ping Gao 0005",
    "display_name": "Ping Gao",
    "affiliation": "Shandong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LMFF: efficient and scalable layered materials force field on heterogeneous many-core processors",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2272,
    "paper_ids": [
      3591
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaohui Duan",
    "display_name": "Xiaohui Duan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LMFF: efficient and scalable layered materials force field on heterogeneous many-core processors",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "extremescale",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2273,
    "paper_ids": [
      3591
    ],
    "papers_without_artifact_ids": [
      3567
    ]
  },
  {
    "name": "Jiaxu Guo",
    "display_name": "Jiaxu Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LMFF: efficient and scalable layered materials force field on heterogeneous many-core processors",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2274,
    "paper_ids": [
      3591
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jin Wang",
    "display_name": "Jin Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LMFF: efficient and scalable layered materials force field on heterogeneous many-core processors",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2275,
    "paper_ids": [
      3591
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhenya Song",
    "display_name": "Zhenya Song",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LMFF: efficient and scalable layered materials force field on heterogeneous many-core processors",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2276,
    "paper_ids": [
      3591
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lizhen Cui",
    "display_name": "Lizhen Cui",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LMFF: efficient and scalable layered materials force field on heterogeneous many-core processors",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2277,
    "paper_ids": [
      3591
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiangxu Meng",
    "display_name": "Xiangxu Meng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LMFF: efficient and scalable layered materials force field on heterogeneous many-core processors",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2278,
    "paper_ids": [
      3591
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xin Liu 0081",
    "display_name": "Xin Liu",
    "affiliation": "National Research Centre of Parallel Computer Engineering and Technology, Wuxi, China",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "SC": 5
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 5
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LMFF: efficient and scalable layered materials force field on heterogeneous many-core processors",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "accelerating allelectron",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "symplectic structurepreserving particleincell wholevolume simulation of tokamak plasmas to 1113 trillion particles and 257 billion grids",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "extremescale",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "sw_qsim a minimizememory quantum simulator with highperformance on a new sunway supercomputer",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2279,
    "paper_ids": [
      3591
    ],
    "papers_without_artifact_ids": [
      3565,
      4746,
      3567,
      4747
    ]
  },
  {
    "name": "Wusheng Zhang",
    "display_name": "Wusheng Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LMFF: efficient and scalable layered materials force field on heterogeneous many-core processors",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2280,
    "paper_ids": [
      3591
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ming Ma 0012",
    "display_name": "Ming Ma",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LMFF: efficient and scalable layered materials force field on heterogeneous many-core processors",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2281,
    "paper_ids": [
      3591
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guohui Li",
    "display_name": "Guohui Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LMFF: efficient and scalable layered materials force field on heterogeneous many-core processors",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2282,
    "paper_ids": [
      3591
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dexun Chen",
    "display_name": "Dexun Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "SC": 6,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 6
      },
      "FAST": {
        "2023": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LMFF: efficient and scalable layered materials force field on heterogeneous many-core processors",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hadafs a file system bridging the local and shared burst buffer for exascale supercomputers",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "accelerating allelectron",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "symplectic structurepreserving particleincell wholevolume simulation of tokamak plasmas to 1113 trillion particles and 257 billion grids",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "closing the quantum supremacy gap achieving realtime simulation of a random quantum circuit using a new sunway supercomputer",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "extremescale",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "sw_qsim a minimizememory quantum simulator with highperformance on a new sunway supercomputer",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2283,
    "paper_ids": [
      3591
    ],
    "papers_without_artifact_ids": [
      3593,
      3565,
      4746,
      4748,
      3567,
      4747
    ]
  },
  {
    "name": "Haohuan Fu",
    "display_name": "Haohuan Fu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LMFF: efficient and scalable layered materials force field on heterogeneous many-core processors",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "closing the quantum supremacy gap achieving realtime simulation of a random quantum circuit using a new sunway supercomputer",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2284,
    "paper_ids": [
      3591
    ],
    "papers_without_artifact_ids": [
      4748
    ]
  },
  {
    "name": "Guangwen Yang 0002",
    "display_name": "Guangwen Yang",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LMFF: efficient and scalable layered materials force field on heterogeneous many-core processors",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2285,
    "paper_ids": [
      3591
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jie Tan",
    "display_name": "Jie Tan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Whale: efficient one-to-many data partitioning in RDMA-assisted distributed stream processing systems",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2286,
    "paper_ids": [
      1092
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hanhua Chen",
    "display_name": "Hanhua Chen",
    "affiliation": "HUST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Whale: efficient one-to-many data partitioning in RDMA-assisted distributed stream processing systems",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2287,
    "paper_ids": [
      1092
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yonghui Wang",
    "display_name": "Yonghui Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Whale: efficient one-to-many data partitioning in RDMA-assisted distributed stream processing systems",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2288,
    "paper_ids": [
      1092
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ankit Srivastava",
    "display_name": "Ankit Srivastava",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Parallel construction of module networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2289,
    "paper_ids": [
      4749
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sriram P. Chockalingam",
    "display_name": "Sriram P. Chockalingam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Parallel construction of module networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2290,
    "paper_ids": [
      4749
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maneesha Aluru",
    "display_name": "Maneesha Aluru",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Parallel construction of module networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2291,
    "paper_ids": [
      4749
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Srinivas Aluru",
    "display_name": "Srinivas Aluru",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Parallel construction of module networks",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2292,
    "paper_ids": [
      4749
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christopher S. Daley",
    "display_name": "Christopher S. Daley",
    "affiliation": "Lawrence Berkeley National Laboratory",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Non-recurring engineering (NRE) best practices: a case study with the NERSC/NVIDIA OpenMP contract",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2293,
    "paper_ids": [
      4750
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Annemarie Southwell",
    "display_name": "Annemarie Southwell",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Non-recurring engineering (NRE) best practices: a case study with the NERSC/NVIDIA OpenMP contract",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2294,
    "paper_ids": [
      4750
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rahulkumar Gayatri",
    "display_name": "Rahulkumar Gayatri",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Non-recurring engineering (NRE) best practices: a case study with the NERSC/NVIDIA OpenMP contract",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "billion atom molecular dynamics simulations of carbon at extreme conditions and experimental time and length scales",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2295,
    "paper_ids": [
      4750
    ],
    "papers_without_artifact_ids": [
      4751
    ]
  },
  {
    "name": "Scott Biersdorfff",
    "display_name": "Scott Biersdorfff",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Non-recurring engineering (NRE) best practices: a case study with the NERSC/NVIDIA OpenMP contract",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2296,
    "paper_ids": [
      4750
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Craig Toepfer",
    "display_name": "Craig Toepfer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Non-recurring engineering (NRE) best practices: a case study with the NERSC/NVIDIA OpenMP contract",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2297,
    "paper_ids": [
      4750
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Güray Özen",
    "display_name": "Güray Özen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Non-recurring engineering (NRE) best practices: a case study with the NERSC/NVIDIA OpenMP contract",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7978,
    "paper_ids": [
      4750
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nicholas J. Wright",
    "display_name": "Nicholas J. Wright",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "FAST": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Non-recurring engineering (NRE) best practices: a case study with the NERSC/NVIDIA OpenMP contract",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "uncovering access reuse and sharing characteristics of iointensive files on largescale production hpc systems",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 2299,
    "paper_ids": [
      4750
    ],
    "papers_without_artifact_ids": [
      3573
    ]
  },
  {
    "name": "Kuan-Chieh Hsu",
    "display_name": "Kuan-Chieh Hsu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Accelerating applications using edge tensor processing units",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2300,
    "paper_ids": [
      4752
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hung-Wei Tseng 0001",
    "display_name": "Hung-Wei Tseng",
    "affiliation": "Univ. of California - Riverside",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Accelerating applications using edge tensor processing units",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2301,
    "paper_ids": [
      4752
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tyler N. Allen",
    "display_name": "Tyler N. Allen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "In-depth analyses of unified virtual memory system for GPU accelerated computing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2302,
    "paper_ids": [
      4753
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rong Ge 0002",
    "display_name": "Rong Ge",
    "affiliation": "Clemson University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "In-depth analyses of unified virtual memory system for GPU accelerated computing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2303,
    "paper_ids": [
      4753
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenyi Wang",
    "display_name": "Wenyi Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Paths to OpenMP in the kernel",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2304,
    "paper_ids": [
      3594
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aaron Nelson",
    "display_name": "Aaron Nelson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Paths to OpenMP in the kernel",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2305,
    "paper_ids": [
      3594
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Cuevas",
    "display_name": "Michael Cuevas",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Paths to OpenMP in the kernel",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2306,
    "paper_ids": [
      3594
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Brian Homerding",
    "display_name": "Brian Homerding",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Paths to OpenMP in the kernel",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2307,
    "paper_ids": [
      3594
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Conghao Liu",
    "display_name": "Conghao Liu",
    "affiliation": "Stanford University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Paths to OpenMP in the kernel",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2308,
    "paper_ids": [
      3594
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhen Huang",
    "display_name": "Zhen Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Paths to OpenMP in the kernel",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a formal approach to multilayered privileges for enclaves",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 2309,
    "paper_ids": [
      3594
    ],
    "papers_without_artifact_ids": [
      3301
    ]
  },
  {
    "name": "Kyle C. Hale",
    "display_name": "Kyle C. Hale",
    "affiliation": "Oregon State University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 2,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 2
      },
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Paths to OpenMP in the kernel",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "isolating functions at the hardware limit with virtines",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "the case for an interwoven parallel hardwaresoftware stack",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2310,
    "paper_ids": [
      3594
    ],
    "papers_without_artifact_ids": [
      4754,
      3595
    ]
  },
  {
    "name": "Weiling Yang",
    "display_name": "Weiling Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LIBSHALOM: optimizing small and irregular-shaped matrix multiplications on ARMv8 multi-cores",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2311,
    "paper_ids": [
      4755
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianbin Fang",
    "display_name": "Jianbin Fang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LIBSHALOM: optimizing small and irregular-shaped matrix multiplications on ARMv8 multi-cores",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2312,
    "paper_ids": [
      4755
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dezun Dong",
    "display_name": "Dezun Dong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LIBSHALOM: optimizing small and irregular-shaped matrix multiplications on ARMv8 multi-cores",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2313,
    "paper_ids": [
      4755
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xing Su 0004",
    "display_name": "Xing Su",
    "affiliation": "National University of Defense Technology, Changsha, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LIBSHALOM: optimizing small and irregular-shaped matrix multiplications on ARMv8 multi-cores",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2314,
    "paper_ids": [
      4755
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zheng Wang 0001",
    "display_name": "Zheng Wang",
    "affiliation": "University of Leeds",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LIBSHALOM: optimizing small and irregular-shaped matrix multiplications on ARMv8 multi-cores",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2315,
    "paper_ids": [
      4755
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yehia Arafa",
    "display_name": "Yehia Arafa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hybrid, scalable, trace-driven performance modeling of GPGPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2316,
    "paper_ids": [
      4756
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abdel-Hameed A. Badawy",
    "display_name": "Abdel-Hameed A. Badawy",
    "affiliation": "New Mexico State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hybrid, scalable, trace-driven performance modeling of GPGPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2317,
    "paper_ids": [
      4756
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ammar ElWazir",
    "display_name": "Ammar ElWazir",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hybrid, scalable, trace-driven performance modeling of GPGPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2318,
    "paper_ids": [
      4756
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Atanu Barai",
    "display_name": "Atanu Barai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hybrid, scalable, trace-driven performance modeling of GPGPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2319,
    "paper_ids": [
      4756
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ali Eker",
    "display_name": "Ali Eker",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hybrid, scalable, trace-driven performance modeling of GPGPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2320,
    "paper_ids": [
      4756
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gopinath Chennupati",
    "display_name": "Gopinath Chennupati",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hybrid, scalable, trace-driven performance modeling of GPGPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2321,
    "paper_ids": [
      4756
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nandakishore Santhi",
    "display_name": "Nandakishore Santhi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hybrid, scalable, trace-driven performance modeling of GPGPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2322,
    "paper_ids": [
      4756
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stephan J. Eidenbenz",
    "display_name": "Stephan J. Eidenbenz",
    "affiliation": "Los Alamos National Laboratory, Los Alamos, NM, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hybrid, scalable, trace-driven performance modeling of GPGPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2323,
    "paper_ids": [
      4756
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shengle Lin",
    "display_name": "Shengle Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STM-multifrontal QR: streaming task mapping multifrontal QR factorization empowered by GCN",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2324,
    "paper_ids": [
      4757
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wangdong Yang",
    "display_name": "Wangdong Yang",
    "affiliation": "Hunan University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STM-multifrontal QR: streaming task mapping multifrontal QR factorization empowered by GCN",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2325,
    "paper_ids": [
      4757
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haotian Wang 0006",
    "display_name": "Haotian Wang",
    "affiliation": "NJIT",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STM-multifrontal QR: streaming task mapping multifrontal QR factorization empowered by GCN",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2326,
    "paper_ids": [
      4757
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qinyun Tsai",
    "display_name": "Qinyun Tsai",
    "affiliation": "Hunan University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STM-multifrontal QR: streaming task mapping multifrontal QR factorization empowered by GCN",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2327,
    "paper_ids": [
      4757
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kenli Li 0001",
    "display_name": "Kenli Li",
    "affiliation": "Hunan University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "ATC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "ATC": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STM-multifrontal QR: streaming task mapping multifrontal QR factorization empowered by GCN",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "eavesdropping on blackbox mobile devices via audio amplifiers emr",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 2328,
    "paper_ids": [
      4757
    ],
    "papers_without_artifact_ids": [
      3932
    ]
  },
  {
    "name": "Nikoli Dryden",
    "display_name": "Nikoli Dryden",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Clairvoyant prefetching for distributed machine learning I/O",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2329,
    "paper_ids": [
      750
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Roman Böhringer",
    "display_name": "Roman Böhringer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Clairvoyant prefetching for distributed machine learning I/O",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7979,
    "paper_ids": [
      750
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fabian Knorr",
    "display_name": "Fabian Knorr",
    "affiliation": "University of Innsbruck",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ndzip-gpu: efficient lossless compression of scientific floating-point data on GPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2331,
    "paper_ids": [
      4758
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peter Thoman",
    "display_name": "Peter Thoman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ndzip-gpu: efficient lossless compression of scientific floating-point data on GPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2332,
    "paper_ids": [
      4758
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas Fahringer",
    "display_name": "Thomas Fahringer",
    "affiliation": "University of Innsbruck",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ndzip-gpu: efficient lossless compression of scientific floating-point data on GPUs",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2333,
    "paper_ids": [
      4758
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mayank Parasar",
    "display_name": "Mayank Parasar",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SEEC: stochastic escape express channel",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2334,
    "paper_ids": [
      4759
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Natalie D. Enright Jerger",
    "display_name": "Natalie D. Enright Jerger",
    "affiliation": "University of Toronto",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SEEC: stochastic escape express channel",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2335,
    "paper_ids": [
      4759
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Paul V. Gratz",
    "display_name": "Paul V. Gratz",
    "affiliation": "Texas A&M University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SEEC: stochastic escape express channel",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2336,
    "paper_ids": [
      4759
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joshua San Miguel",
    "display_name": "Joshua San Miguel",
    "affiliation": "University of Wisconsin - Madison",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SEEC: stochastic escape express channel",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2337,
    "paper_ids": [
      4759
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tushar Krishna",
    "display_name": "Tushar Krishna",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SEEC: stochastic escape express channel",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2338,
    "paper_ids": [
      4759
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jin Zhao 0003",
    "display_name": "Jin Zhao",
    "affiliation": "HUST",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 1,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LCCG: a locality-centric hardware accelerator for high throughput of concurrent graph processing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ohminer an overlapcentric system for efficient hypergraph pattern mining",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "lsgraph a localitycentric highperformance streaming graph engine",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 2339,
    "paper_ids": [
      1093
    ],
    "papers_without_artifact_ids": [
      1100,
      1105
    ]
  },
  {
    "name": "Ligang He",
    "display_name": "Ligang He",
    "affiliation": "University of Warwick",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "SC": 1,
      "EUROSYS": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LCCG: a locality-centric hardware accelerator for high throughput of concurrent graph processing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ohminer an overlapcentric system for efficient hypergraph pattern mining",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "lsgraph a localitycentric highperformance streaming graph engine",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 2340,
    "paper_ids": [
      1093
    ],
    "papers_without_artifact_ids": [
      1100,
      1105
    ]
  },
  {
    "name": "Bingsheng He",
    "display_name": "Bingsheng He",
    "affiliation": "National University of Singapore",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "SC": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {},
      "FAST": {
        "2015": 1
      },
      "NSDI": {
        "2018": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LCCG: a locality-centric hardware accelerator for high throughput of concurrent graph processing",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ohminer an overlapcentric system for efficient hypergraph pattern mining",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "gnet effective gpu sharing in nfv systems",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "nvtree reducing consistency cost for nvmbased single level systems",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 2341,
    "paper_ids": [
      1093
    ],
    "papers_without_artifact_ids": [
      1100,
      3835,
      4760
    ]
  },
  {
    "name": "Rupanshu Soi",
    "display_name": "Rupanshu Soi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Index launches: scalable, flexible representation of parallel task groups",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2342,
    "paper_ids": [
      3596
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Bauer 0001",
    "display_name": "Michael Bauer",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Index launches: scalable, flexible representation of parallel task groups",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2343,
    "paper_ids": [
      3596
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sean Treichler",
    "display_name": "Sean Treichler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Index launches: scalable, flexible representation of parallel task groups",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "accelerating collective communication in data parallel training across deep learning frameworks",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 2344,
    "paper_ids": [
      3596
    ],
    "papers_without_artifact_ids": [
      4761
    ]
  },
  {
    "name": "Manolis Papadakis",
    "display_name": "Manolis Papadakis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Index launches: scalable, flexible representation of parallel task groups",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2345,
    "paper_ids": [
      3596
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wonchan Lee",
    "display_name": "Wonchan Lee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Index launches: scalable, flexible representation of parallel task groups",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2346,
    "paper_ids": [
      3596
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Elliott Slaughter",
    "display_name": "Elliott Slaughter",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Index launches: scalable, flexible representation of parallel task groups",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2347,
    "paper_ids": [
      3596
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhengda Bian",
    "display_name": "Zhengda Bian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Online evolutionary batch size orchestration for scheduling deep learning workloads in GPU clusters",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2348,
    "paper_ids": [
      3597
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shenggui Li",
    "display_name": "Shenggui Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Online evolutionary batch size orchestration for scheduling deep learning workloads in GPU clusters",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2349,
    "paper_ids": [
      3597
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yang You 0001",
    "display_name": "Yang You",
    "affiliation": "National University of Singapore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Online evolutionary batch size orchestration for scheduling deep learning workloads in GPU clusters",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2350,
    "paper_ids": [
      3597
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Grzegorz Kwasniewski",
    "display_name": "Grzegorz Kwasniewski",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the parallel I/O optimality of linear algebra kernels: near-optimal matrix factorizations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2351,
    "paper_ids": [
      751
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marko Kabic",
    "display_name": "Marko Kabic",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the parallel I/O optimality of linear algebra kernels: near-optimal matrix factorizations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2352,
    "paper_ids": [
      751
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jens Eirik Saethre",
    "display_name": "Jens Eirik Saethre",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the parallel I/O optimality of linear algebra kernels: near-optimal matrix factorizations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2353,
    "paper_ids": [
      751
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "André Gaillard",
    "display_name": "André Gaillard",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the parallel I/O optimality of linear algebra kernels: near-optimal matrix factorizations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7980,
    "paper_ids": [
      751
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maciej Besta",
    "display_name": "Maciej Besta",
    "affiliation": "ETH Zurich",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "SC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the parallel I/O optimality of linear algebra kernels: near-optimal matrix factorizations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a highperformance design implementation deployment and evaluation of the slim fly network",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 2355,
    "paper_ids": [
      751
    ],
    "papers_without_artifact_ids": [
      756
    ]
  },
  {
    "name": "Anton Kozhevnikov",
    "display_name": "Anton Kozhevnikov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the parallel I/O optimality of linear algebra kernels: near-optimal matrix factorizations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2356,
    "paper_ids": [
      751
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joost VandeVondele",
    "display_name": "Joost VandeVondele",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "SC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the parallel I/O optimality of linear algebra kernels: near-optimal matrix factorizations",
        "conference": "SC",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2357,
    "paper_ids": [
      751
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Schwyn",
    "display_name": "Daniel Schwyn",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efeu: generating efficient, verified, hybrid hardware/software drivers for I2C devices",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "specifying the defacto os of a production soc",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 2358,
    "paper_ids": [
      3605
    ],
    "papers_without_artifact_ids": [
      3607
    ]
  },
  {
    "name": "Zikai Liu",
    "display_name": "Zikai Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efeu: generating efficient, verified, hybrid hardware/software drivers for I2C devices",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2359,
    "paper_ids": [
      3605
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Congyu Liu",
    "display_name": "Congyu Liu",
    "affiliation": "Stanford University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pegasus: Transparent and Unified Kernel-Bypass Networking for Fast Local and Remote Communication",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2360,
    "paper_ids": [
      1975
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junesoo Kang",
    "display_name": "Junesoo Kang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "JABAS: Joint Adaptive Batching and Automatic Scaling for DNN Training on Heterogeneous GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pspray timing sidechannel based linux kernel heap exploitation technique",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 2361,
    "paper_ids": [
      3610
    ],
    "papers_without_artifact_ids": [
      2768
    ]
  },
  {
    "name": "Hyunjoon Jeong",
    "display_name": "Hyunjoon Jeong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "JABAS: Joint Adaptive Batching and Automatic Scaling for DNN Training on Heterogeneous GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2362,
    "paper_ids": [
      3610
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sanghyeon Eom",
    "display_name": "Sanghyeon Eom",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "JABAS: Joint Adaptive Batching and Automatic Scaling for DNN Training on Heterogeneous GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2363,
    "paper_ids": [
      3610
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minsung Jang",
    "display_name": "Minsung Jang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "JABAS: Joint Adaptive Batching and Automatic Scaling for DNN Training on Heterogeneous GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2364,
    "paper_ids": [
      3610
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tanmoy Sen",
    "display_name": "Tanmoy Sen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Flex: Fast, Accurate DNN Inference on Low-Cost Edges Using Heterogeneous Accelerator Execution",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2365,
    "paper_ids": [
      3616
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anand Padmanabha Iyer",
    "display_name": "Anand Padmanabha Iyer",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 1,
      "NSDI": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SOSP": {
        "2024": 1
      },
      "NSDI": {
        "2021": 1
      },
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Flex: Fast, Accurate DNN Inference on Low-Cost Edges Using Heterogeneous Accelerator Execution",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improving dnn inference throughput using practical perinput compute adaptation",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "tegra efficient adhoc analytics on evolving graphs",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "p3 distributed deep graph learning at scale",
        "conference": "OSDI",
        "year": 2021
      }
    ],
    "author_id": 2366,
    "paper_ids": [
      3616
    ],
    "papers_without_artifact_ids": [
      2618,
      493,
      4762
    ]
  },
  {
    "name": "Zhiheng Lin",
    "display_name": "Zhiheng Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Jupiter: Pushing Speed and Scalability Limitations for Subgraph Matching on Multi-GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2367,
    "paper_ids": [
      4763
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ke Meng",
    "display_name": "Ke Meng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 2
      },
      "SC": {},
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Jupiter: Pushing Speed and Scalability Limitations for Subgraph Matching on Multi-GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "moko marrying python with big data systems",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "pyrrha congestionrootbased flow control to eliminate headofline blocking in datacenter",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 2368,
    "paper_ids": [
      4763
    ],
    "papers_without_artifact_ids": [
      2147,
      2881
    ]
  },
  {
    "name": "Changjie Xu",
    "display_name": "Changjie Xu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Jupiter: Pushing Speed and Scalability Limitations for Subgraph Matching on Multi-GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2369,
    "paper_ids": [
      4763
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weichen Cao 0002",
    "display_name": "Weichen Cao",
    "affiliation": "Institute of Computing Technology, Chinese Academy of Sciences, Beijing",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Jupiter: Pushing Speed and Scalability Limitations for Subgraph Matching on Multi-GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2370,
    "paper_ids": [
      4763
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guangming Tan",
    "display_name": "Guangming Tan",
    "affiliation": "Chinese Academy of Sciences",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Jupiter: Pushing Speed and Scalability Limitations for Subgraph Matching on Multi-GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2371,
    "paper_ids": [
      4763
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rahul Priolkar",
    "display_name": "Rahul Priolkar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Erebor: A Drop-In Sandbox Solution for Private Data Processing in Untrusted Confidential Virtual Machines",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2372,
    "paper_ids": [
      2794
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuan Xiao 0001",
    "display_name": "Yuan Xiao",
    "affiliation": "ShanghaiTech University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Erebor: A Drop-In Sandbox Solution for Private Data Processing in Untrusted Confidential Virtual Machines",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sense enhancing microarchitectural awareness for tees via subscriptionbased notification",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "aexnotify thwarting precise singlestepping attacks through interrupt awareness for intel sgx enclaves",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 2373,
    "paper_ids": [
      2794
    ],
    "papers_without_artifact_ids": [
      660,
      663
    ]
  },
  {
    "name": "Adil Ahmad",
    "display_name": "Adil Ahmad",
    "affiliation": "Arizona State University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "USENIXSEC": 2,
      "PETS": 1,
      "NDSS": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      },
      "PETS": {
        "2020": 1
      },
      "NDSS": {
        "2025": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Erebor: A Drop-In Sandbox Solution for Private Data Processing in Untrusted Confidential Virtual Machines",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secure data analytics in apache spark with finegrained policy enforcement and isolated execution",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "an extensible orchestration and protection framework for confidential cloud computing",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "rethinking system audit architectures for high event coverage and synchronous log availability",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "shard finegrained kernel specialization with contextaware hardening",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "a tale of two trees one writes and other reads",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 2374,
    "paper_ids": [
      2794
    ],
    "papers_without_artifact_ids": [
      2766,
      1978,
      3950,
      1980,
      2579
    ]
  },
  {
    "name": "Ruibo Fan",
    "display_name": "Ruibo Fan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SpInfer: Leveraging Low-Level Sparsity for Efficient Large Language Model Inference on GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2375,
    "paper_ids": [
      2799
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiangrui Yu",
    "display_name": "Xiangrui Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SpInfer: Leveraging Low-Level Sparsity for Efficient Large Language Model Inference on GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2376,
    "paper_ids": [
      2799
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peijie Dong",
    "display_name": "Peijie Dong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SpInfer: Leveraging Low-Level Sparsity for Efficient Large Language Model Inference on GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2377,
    "paper_ids": [
      2799
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zeyu Li",
    "display_name": "Zeyu Li",
    "affiliation": "Hong Kong University of Science and Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SpInfer: Leveraging Low-Level Sparsity for Efficient Large Language Model Inference on GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2378,
    "paper_ids": [
      2799
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gu Gong",
    "display_name": "Gu Gong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SpInfer: Leveraging Low-Level Sparsity for Efficient Large Language Model Inference on GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2379,
    "paper_ids": [
      2799
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qiang Wang 0022",
    "display_name": "Qiang Wang",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SpInfer: Leveraging Low-Level Sparsity for Efficient Large Language Model Inference on GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "schemoe an extensible mixtureofexperts distributed training system with tasks scheduling",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 2380,
    "paper_ids": [
      2799
    ],
    "papers_without_artifact_ids": [
      4764
    ]
  },
  {
    "name": "Xiaowen Chu 0001",
    "display_name": "Xiaowen Chu",
    "affiliation": "Hong Kong Baptist University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SOSP": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      },
      "SOSP": {},
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SpInfer: Leveraging Low-Level Sparsity for Efficient Large Language Model Inference on GPUs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "schemoe an extensible mixtureofexperts distributed training system with tasks scheduling",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 2381,
    "paper_ids": [
      2799
    ],
    "papers_without_artifact_ids": [
      4764
    ]
  },
  {
    "name": "Dingbang Liu",
    "display_name": "Dingbang Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Garbage Collection Does Not Only Collect Garbage: Piggybacking-Style Defragmentation for Deduplicated Backup Storage",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2382,
    "paper_ids": [
      2059
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tao Lu 0014",
    "display_name": "Tao Lu",
    "affiliation": "DapuStor Corporation, Shenzhen, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Garbage Collection Does Not Only Collect Garbage: Piggybacking-Style Defragmentation for Deduplicated Backup Storage",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2383,
    "paper_ids": [
      2059
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenxuan Huang",
    "display_name": "Wenxuan Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Garbage Collection Does Not Only Collect Garbage: Piggybacking-Style Defragmentation for Deduplicated Backup Storage",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2384,
    "paper_ids": [
      2059
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhiting Zhu",
    "display_name": "Zhiting Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 1,
      "ATC": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SOSP": {
        "2024": 1
      },
      "ATC": {},
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Impeller: Stream Processing on Shared Logs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lupin tolerating partial failures in a cxl pod",
        "conference": "SOSP",
        "year": 2024
      }
    ],
    "author_id": 2385,
    "paper_ids": [
      2052
    ],
    "papers_without_artifact_ids": [
      2053
    ]
  },
  {
    "name": "Newton Ni",
    "display_name": "Newton Ni",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SOSP": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Impeller: Stream Processing on Shared Logs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lupin tolerating partial failures in a cxl pod",
        "conference": "SOSP",
        "year": 2024
      }
    ],
    "author_id": 927,
    "paper_ids": [
      2052
    ],
    "papers_without_artifact_ids": [
      2053
    ]
  },
  {
    "name": "Dixin Tang",
    "display_name": "Dixin Tang",
    "affiliation": "University of Texas at Austin",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {},
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Impeller: Stream Processing on Shared Logs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 928,
    "paper_ids": [
      2052
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kenny Albes",
    "display_name": "Kenny Albes",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HyperAlloc: Efficient VM Memory De/Inflation via Hypervisor-Shared Page-Frame Allocators",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2386,
    "paper_ids": [
      2806
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marco Wurps",
    "display_name": "Marco Wurps",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HyperAlloc: Efficient VM Memory De/Inflation via Hypervisor-Shared Page-Frame Allocators",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2387,
    "paper_ids": [
      2806
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianing You",
    "display_name": "Jianing You",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AlloyStack: A Library Operating System for Serverless Workflow Applications",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2388,
    "paper_ids": [
      641
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yichi Chen 0001",
    "display_name": "Yichi Chen",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AlloyStack: A Library Operating System for Serverless Workflow Applications",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2389,
    "paper_ids": [
      641
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuxuan Du",
    "display_name": "Yuxuan Du",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AlloyStack: A Library Operating System for Serverless Workflow Applications",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2390,
    "paper_ids": [
      641
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yanjie Wang",
    "display_name": "Yanjie Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AlloyStack: A Library Operating System for Serverless Workflow Applications",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2391,
    "paper_ids": [
      641
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Luhang Wen",
    "display_name": "Luhang Wen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AlloyStack: A Library Operating System for Serverless Workflow Applications",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2392,
    "paper_ids": [
      641
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Keyang Hu",
    "display_name": "Keyang Hu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AlloyStack: A Library Operating System for Serverless Workflow Applications",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2393,
    "paper_ids": [
      641
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dipayan Mukherjee",
    "display_name": "Dipayan Mukherjee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CRAVE: Analyzing Cross-Resource Interaction to Improve Energy Efficiency in Systems-on-Chip",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2394,
    "paper_ids": [
      4765
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sam Hachem",
    "display_name": "Sam Hachem",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CRAVE: Analyzing Cross-Resource Interaction to Improve Energy Efficiency in Systems-on-Chip",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2395,
    "paper_ids": [
      4765
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jeremy Bao",
    "display_name": "Jeremy Bao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CRAVE: Analyzing Cross-Resource Interaction to Improve Energy Efficiency in Systems-on-Chip",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2396,
    "paper_ids": [
      4765
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Curtis Madsen",
    "display_name": "Curtis Madsen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CRAVE: Analyzing Cross-Resource Interaction to Improve Energy Efficiency in Systems-on-Chip",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2397,
    "paper_ids": [
      4765
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tian Ma",
    "display_name": "Tian Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CRAVE: Analyzing Cross-Resource Interaction to Improve Energy Efficiency in Systems-on-Chip",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2398,
    "paper_ids": [
      4765
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Saugata Ghose",
    "display_name": "Saugata Ghose",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "FAST": {
        "2018": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CRAVE: Analyzing Cross-Resource Interaction to Improve Energy Efficiency in Systems-on-Chip",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mqsim a framework for enabling realistic studies of modern multiqueue ssd devices",
        "conference": "FAST",
        "year": 2018
      }
    ],
    "author_id": 2399,
    "paper_ids": [
      4765
    ],
    "papers_without_artifact_ids": [
      4766
    ]
  },
  {
    "name": "Gul Agha",
    "display_name": "Gul Agha",
    "affiliation": "University of Illinois Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CRAVE: Analyzing Cross-Resource Interaction to Improve Energy Efficiency in Systems-on-Chip",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2400,
    "paper_ids": [
      4765
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "João Oliveira",
    "display_name": "João Oliveira",
    "affiliation": "INESC-ID and Instituto Superior Técnico",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HawkSet: Automatic, Application-Agnostic, and Efficient Concurrent PM Bug Detection",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7981,
    "paper_ids": [
      2736
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Johannes Freischuetz",
    "display_name": "Johannes Freischuetz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TUNA: Tuning Unstable and Noisy Cloud Applications",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2402,
    "paper_ids": [
      1306
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Konstantinos Kanellis",
    "display_name": "Konstantinos Kanellis",
    "affiliation": "University of Wisconsin-Madison",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TUNA: Tuning Unstable and Noisy Cloud Applications",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2403,
    "paper_ids": [
      1306
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lingzhi Ouyang",
    "display_name": "Lingzhi Ouyang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Multi-Grained Specifications for Distributed System Model Checking and Verification",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sandtable scalable distributed system model checking with specificationlevel state exploration",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 2404,
    "paper_ids": [
      618
    ],
    "papers_without_artifact_ids": [
      1920
    ]
  },
  {
    "name": "Ruize Tang",
    "display_name": "Ruize Tang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Multi-Grained Specifications for Distributed System Model Checking and Verification",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sandtable scalable distributed system model checking with specificationlevel state exploration",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 2405,
    "paper_ids": [
      618
    ],
    "papers_without_artifact_ids": [
      1920
    ]
  },
  {
    "name": "Yu Huang 0002",
    "display_name": "Yu Huang",
    "affiliation": "Nanjing University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Multi-Grained Specifications for Distributed System Model Checking and Verification",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sandtable scalable distributed system model checking with specificationlevel state exploration",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 2406,
    "paper_ids": [
      618
    ],
    "papers_without_artifact_ids": [
      1920
    ]
  },
  {
    "name": "Madhav Jivrajani",
    "display_name": "Madhav Jivrajani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Multi-Grained Specifications for Distributed System Model Checking and Verification",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2407,
    "paper_ids": [
      618
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaoxing Ma",
    "display_name": "Xiaoxing Ma",
    "affiliation": "Nanjing University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Multi-Grained Specifications for Distributed System Model Checking and Verification",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sandtable scalable distributed system model checking with specificationlevel state exploration",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 2408,
    "paper_ids": [
      618
    ],
    "papers_without_artifact_ids": [
      1920
    ]
  },
  {
    "name": "Ligang Wang",
    "display_name": "Ligang Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hey Hey, My My, Skewness Is Here to Stay: Challenges and Opportunities in Cloud Block Store Traffic",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2409,
    "paper_ids": [
      2813
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuandong Hong",
    "display_name": "Yuandong Hong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hey Hey, My My, Skewness Is Here to Stay: Challenges and Opportunities in Cloud Block Store Traffic",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2410,
    "paper_ids": [
      2813
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Changsheng Niu",
    "display_name": "Changsheng Niu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hey Hey, My My, Skewness Is Here to Stay: Challenges and Opportunities in Cloud Block Store Traffic",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2411,
    "paper_ids": [
      2813
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bo Shi",
    "display_name": "Bo Shi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hey Hey, My My, Skewness Is Here to Stay: Challenges and Opportunities in Cloud Block Store Traffic",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deploying userspace tcp at cloud scale with luna",
        "conference": "ATC",
        "year": 2023
      }
    ],
    "author_id": 2412,
    "paper_ids": [
      2813
    ],
    "papers_without_artifact_ids": [
      2093
    ]
  },
  {
    "name": "Lingjun Zhu",
    "display_name": "Lingjun Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1,
      "FAST": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2024": 1
      },
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hey Hey, My My, Skewness Is Here to Stay: Challenges and Opportunities in Cloud Block Store Traffic",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "whats the story in ebs glory evolutions and lessons in building cloud block store",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "deploying userspace tcp at cloud scale with luna",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "bufferbased endtoend request event monitoring in the cloud",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 2413,
    "paper_ids": [
      2813
    ],
    "papers_without_artifact_ids": [
      2091,
      2093,
      4767
    ]
  },
  {
    "name": "Jinnian He",
    "display_name": "Jinnian He",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hey Hey, My My, Skewness Is Here to Stay: Challenges and Opportunities in Cloud Block Store Traffic",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2414,
    "paper_ids": [
      2813
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dong Wu",
    "display_name": "Dong Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "FAST": {
        "2024": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hey Hey, My My, Skewness Is Here to Stay: Challenges and Opportunities in Cloud Block Store Traffic",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "whats the story in ebs glory evolutions and lessons in building cloud block store",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "greyone data flow sensitive fuzzing",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 2415,
    "paper_ids": [
      2813
    ],
    "papers_without_artifact_ids": [
      2091,
      1900
    ]
  },
  {
    "name": "Weidong Zhang 0011",
    "display_name": "Weidong Zhang",
    "affiliation": "Alibaba Group, Alibaba Cloud, Beijing, China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "FAST": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hey Hey, My My, Skewness Is Here to Stay: Challenges and Opportunities in Cloud Block Store Traffic",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "whats the story in ebs glory evolutions and lessons in building cloud block store",
        "conference": "FAST",
        "year": 2024
      }
    ],
    "author_id": 2416,
    "paper_ids": [
      2813
    ],
    "papers_without_artifact_ids": [
      2091
    ]
  },
  {
    "name": "Qiuping Wang",
    "display_name": "Qiuping Wang",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {},
      "FAST": {
        "2024": 1,
        "2026": 1,
        "2022": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hey Hey, My My, Skewness Is Here to Stay: Challenges and Opportunities in Cloud Block Store Traffic",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how soon is now preloading images for virtual disks with thinkahead",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "whats the story in ebs glory evolutions and lessons in building cloud block store",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "separating data via block invalidation time inference for write amplification reduction in logstructured storage",
        "conference": "FAST",
        "year": 2022
      }
    ],
    "author_id": 2417,
    "paper_ids": [
      2813
    ],
    "papers_without_artifact_ids": [
      2090,
      2091,
      3824
    ]
  },
  {
    "name": "Changhong Wang",
    "display_name": "Changhong Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "FAST": {
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hey Hey, My My, Skewness Is Here to Stay: Challenges and Opportunities in Cloud Block Store Traffic",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how soon is now preloading images for virtual disks with thinkahead",
        "conference": "FAST",
        "year": 2026
      }
    ],
    "author_id": 2418,
    "paper_ids": [
      2813
    ],
    "papers_without_artifact_ids": [
      2090
    ]
  },
  {
    "name": "Xinqi Chen",
    "display_name": "Xinqi Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "FAST": {
        "2026": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hey Hey, My My, Skewness Is Here to Stay: Challenges and Opportunities in Cloud Block Store Traffic",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how soon is now preloading images for virtual disks with thinkahead",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "remote attacks on speech recognition systems using sound from power supply",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 2419,
    "paper_ids": [
      2813
    ],
    "papers_without_artifact_ids": [
      2090,
      3628
    ]
  },
  {
    "name": "Yi-Chao Chen 0001",
    "display_name": "Yi-Chao Chen",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "USENIXSEC": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hey Hey, My My, Skewness Is Here to Stay: Challenges and Opportunities in Cloud Block Store Traffic",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "acoustic sensing and communication using metasurface",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "remote attacks on speech recognition systems using sound from power supply",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "mid tracing screen photos via moiré patterns",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 2420,
    "paper_ids": [
      2813
    ],
    "papers_without_artifact_ids": [
      2674,
      3628,
      3299
    ]
  },
  {
    "name": "Dian Ding",
    "display_name": "Dian Ding",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hey Hey, My My, Skewness Is Here to Stay: Challenges and Opportunities in Cloud Block Store Traffic",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2421,
    "paper_ids": [
      2813
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhenbo Sun",
    "display_name": "Zhenbo Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MEPipe: Democratizing LLM Training with Memory-Efficient Slice-Level Pipeline Scheduling on Cost-Effective Accelerators",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2422,
    "paper_ids": [
      2815
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jian Sha",
    "display_name": "Jian Sha",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MEPipe: Democratizing LLM Training with Memory-Efficient Slice-Level Pipeline Scheduling on Cost-Effective Accelerators",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2423,
    "paper_ids": [
      2815
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Larissa Schmid",
    "display_name": "Larissa Schmid",
    "affiliation": "KTH Royal Institute of Technology, Stockholm, Sweden",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SeBS-Flow: Benchmarking Serverless Cloud Function Workflows",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2424,
    "paper_ids": [
      752
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marcin Copik",
    "display_name": "Marcin Copik",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 2
      },
      "SC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SeBS-Flow: Benchmarking Serverless Cloud Function Workflows",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sebs 20 keeping up with the clouds",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 2425,
    "paper_ids": [
      752
    ],
    "papers_without_artifact_ids": [
      755
    ]
  },
  {
    "name": "Laurin Brandner",
    "display_name": "Laurin Brandner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SeBS-Flow: Benchmarking Serverless Cloud Function Workflows",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2426,
    "paper_ids": [
      752
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anne Koziolek",
    "display_name": "Anne Koziolek",
    "affiliation": "Karlsruhe Inst. of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SeBS-Flow: Benchmarking Serverless Cloud Function Workflows",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2427,
    "paper_ids": [
      752
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shawn Wanxiang Zhong",
    "display_name": "Shawn Wanxiang Zhong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Revealing the Unstable Foundations of eBPF-Based Kernel Extensions",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2428,
    "paper_ids": [
      2009
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mansour Alharthi",
    "display_name": "Mansour Alharthi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rakis: Secure Fast I/O Primitives Across Trust Boundaries on Intel SGX",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2429,
    "paper_ids": [
      652
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fan Sang",
    "display_name": "Fan Sang",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rakis: Secure Fast I/O Primitives Across Trust Boundaries on Intel SGX",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sense enhancing microarchitectural awareness for tees via subscriptionbased notification",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "pridwen universally hardening sgx programs via loadtime synthesis",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 2430,
    "paper_ids": [
      652
    ],
    "papers_without_artifact_ids": [
      660,
      664
    ]
  },
  {
    "name": "Dmitrii Kuvaiskii",
    "display_name": "Dmitrii Kuvaiskii",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rakis: Secure Fast I/O Primitives Across Trust Boundaries on Intel SGX",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2431,
    "paper_ids": [
      652
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lichen Pan",
    "display_name": "Lichen Pan",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Comprehensive Deadlock Prevention for GPU Collective Communication",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2432,
    "paper_ids": [
      4768
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Juncheng Liu",
    "display_name": "Juncheng Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Comprehensive Deadlock Prevention for GPU Collective Communication",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2433,
    "paper_ids": [
      4768
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yongquan Fu",
    "display_name": "Yongquan Fu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Comprehensive Deadlock Prevention for GPU Collective Communication",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2434,
    "paper_ids": [
      4768
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinhui Yuan",
    "display_name": "Jinhui Yuan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Comprehensive Deadlock Prevention for GPU Collective Communication",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2435,
    "paper_ids": [
      4768
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rongkai Zhang 0005",
    "display_name": "Rongkai Zhang",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Comprehensive Deadlock Prevention for GPU Collective Communication",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2436,
    "paper_ids": [
      4768
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pengze Li",
    "display_name": "Pengze Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Comprehensive Deadlock Prevention for GPU Collective Communication",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2437,
    "paper_ids": [
      4768
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhen Xiao",
    "display_name": "Zhen Xiao",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Comprehensive Deadlock Prevention for GPU Collective Communication",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2438,
    "paper_ids": [
      4768
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniar Heri Kurniawan",
    "display_name": "Daniar Heri Kurniawan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Heimdall: Optimizing Storage I/O Admission with Extensive Machine Learning Pipeline",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2439,
    "paper_ids": [
      3630
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rani Ayu Putri",
    "display_name": "Rani Ayu Putri",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Heimdall: Optimizing Storage I/O Admission with Extensive Machine Learning Pipeline",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2440,
    "paper_ids": [
      3630
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peiran Qin",
    "display_name": "Peiran Qin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Heimdall: Optimizing Storage I/O Admission with Extensive Machine Learning Pipeline",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2441,
    "paper_ids": [
      3630
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kahfi S. Zulkifli",
    "display_name": "Kahfi S. Zulkifli",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Heimdall: Optimizing Storage I/O Admission with Extensive Machine Learning Pipeline",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2442,
    "paper_ids": [
      3630
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ray A. O. Sinurat",
    "display_name": "Ray A. O. Sinurat",
    "affiliation": "University of Chicago",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Heimdall: Optimizing Storage I/O Admission with Extensive Machine Learning Pipeline",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2443,
    "paper_ids": [
      3630
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Janki Bhimani",
    "display_name": "Janki Bhimani",
    "affiliation": "Florida International University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "FAST": {
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Heimdall: Optimizing Storage I/O Admission with Extensive Machine Learning Pipeline",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "preparation meets opportunity enhancing data preprocessing for ml training with seneca",
        "conference": "FAST",
        "year": 2026
      }
    ],
    "author_id": 2444,
    "paper_ids": [
      3630
    ],
    "papers_without_artifact_ids": [
      2845
    ]
  },
  {
    "name": "Sandeep Madireddy",
    "display_name": "Sandeep Madireddy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Heimdall: Optimizing Storage I/O Admission with Extensive Machine Learning Pipeline",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2445,
    "paper_ids": [
      3630
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Achmad Imam Kistijantoro",
    "display_name": "Achmad Imam Kistijantoro",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Heimdall: Optimizing Storage I/O Admission with Extensive Machine Learning Pipeline",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 936,
    "paper_ids": [
      3630
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhanda Zhu",
    "display_name": "Zhanda Zhu",
    "affiliation": "University of Toronto",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mist: Efficient Distributed Training of Large Language Models via Memory-Parallelism Co-Optimization",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2446,
    "paper_ids": [
      2068
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muralidhar Andoorveedu",
    "display_name": "Muralidhar Andoorveedu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mist: Efficient Distributed Training of Large Language Models via Memory-Parallelism Co-Optimization",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2447,
    "paper_ids": [
      2068
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qidong Su",
    "display_name": "Qidong Su",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mist: Efficient Distributed Training of Large Language Models via Memory-Parallelism Co-Optimization",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2448,
    "paper_ids": [
      2068
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Karttikeya Mangalam",
    "display_name": "Karttikeya Mangalam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mist: Efficient Distributed Training of Large Language Models via Memory-Parallelism Co-Optimization",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2449,
    "paper_ids": [
      2068
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bojian Zheng",
    "display_name": "Bojian Zheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mist: Efficient Distributed Training of Large Language Models via Memory-Parallelism Co-Optimization",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2450,
    "paper_ids": [
      2068
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lei Huang",
    "display_name": "Lei Huang",
    "affiliation": "Boston University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CAPSys: Contention-aware task placement for data stream processing",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2451,
    "paper_ids": [
      2818
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zikun Wang",
    "display_name": "Zikun Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CAPSys: Contention-aware task placement for data stream processing",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2452,
    "paper_ids": [
      2818
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ibrahim Matta",
    "display_name": "Ibrahim Matta",
    "affiliation": "Boston University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CAPSys: Contention-aware task placement for data stream processing",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2453,
    "paper_ids": [
      2818
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hanzheng Lyu",
    "display_name": "Hanzheng Lyu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Ladon: High-Performance Multi-BFT Consensus via Dynamic Global Ordering",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2454,
    "paper_ids": [
      359
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shaokang Xie",
    "display_name": "Shaokang Xie",
    "affiliation": "University of California, Davis",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Ladon: High-Performance Multi-BFT Consensus via Dynamic Global Ordering",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2455,
    "paper_ids": [
      359
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chen Feng 0001",
    "display_name": "Chen Feng",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Ladon: High-Performance Multi-BFT Consensus via Dynamic Global Ordering",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2456,
    "paper_ids": [
      359
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ivan Beschastnikh",
    "display_name": "Ivan Beschastnikh",
    "affiliation": "University of British Columbia",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0,
      "SC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SOSP": {},
      "SC": {},
      "NSDI": {
        "2014": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Ladon: High-Performance Multi-BFT Consensus via Dynamic Global Ordering",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "netcheck network diagnoses from blackbox traces",
        "conference": "NSDI",
        "year": 2014
      }
    ],
    "author_id": 2457,
    "paper_ids": [
      359
    ],
    "papers_without_artifact_ids": [
      3979
    ]
  },
  {
    "name": "Haoyang Li 0006",
    "display_name": "Haoyang Li",
    "affiliation": "Central South University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Introspective Congestion Control for Consistent High Performance",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2458,
    "paper_ids": [
      3638
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jia Wu 0001",
    "display_name": "Jia Wu",
    "affiliation": "Macquarie University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Introspective Congestion Control for Consistent High Performance",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2459,
    "paper_ids": [
      3638
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kai Wang",
    "display_name": "Kai Wang",
    "affiliation": "Washington State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Introspective Congestion Control for Consistent High Performance",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2460,
    "paper_ids": [
      3638
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianxin Wang 0001",
    "display_name": "Jianxin Wang",
    "affiliation": "Central South University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Introspective Congestion Control for Consistent High Performance",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a2tp aggregatoraware innetwork aggregation for multitenant learning",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 2461,
    "paper_ids": [
      3638
    ],
    "papers_without_artifact_ids": [
      4769
    ]
  },
  {
    "name": "Arjun Ramesh",
    "display_name": "Arjun Ramesh",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Empowering WebAssembly with Thin Kernel Interfaces",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2462,
    "paper_ids": [
      4770
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tianshu Huang",
    "display_name": "Tianshu Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Empowering WebAssembly with Thin Kernel Interfaces",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2463,
    "paper_ids": [
      4770
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ben L. Titzer",
    "display_name": "Ben L. Titzer",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Empowering WebAssembly with Thin Kernel Interfaces",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2464,
    "paper_ids": [
      4770
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anthony Rowe 0001",
    "display_name": "Anthony Rowe",
    "affiliation": "University of Kentucky",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {},
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Empowering WebAssembly with Thin Kernel Interfaces",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lumos identifying and localizing diverse hidden iot devices in an unfamiliar environment",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 2465,
    "paper_ids": [
      4770
    ],
    "papers_without_artifact_ids": [
      4484
    ]
  },
  {
    "name": "Yifeng Zhang",
    "display_name": "Yifeng Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "FAST": {
        "2026": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Overcoming the Last Mile between Log-Structured File Systems and Persistent Memory via Scatter Logging",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards condensed and efficient readonly file system via sortenhanced compression",
        "conference": "FAST",
        "year": 2026
      }
    ],
    "author_id": 943,
    "paper_ids": [
      2060
    ],
    "papers_without_artifact_ids": [
      2063
    ]
  },
  {
    "name": "Yuchen Shan",
    "display_name": "Yuchen Shan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Overcoming the Last Mile between Log-Structured File Systems and Persistent Memory via Scatter Logging",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2466,
    "paper_ids": [
      2060
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaoqing Wen",
    "display_name": "Xiaoqing Wen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Achilles: Efficient TEE-Assisted BFT Consensus via Rollback Resilient Recovery",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2467,
    "paper_ids": [
      360
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guanlong Wu",
    "display_name": "Guanlong Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Achilles: Efficient TEE-Assisted BFT Consensus via Rollback Resilient Recovery",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i know what you asked prompt leakage via kvcache sharing in multitenant llm serving",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 2468,
    "paper_ids": [
      360
    ],
    "papers_without_artifact_ids": [
      369
    ]
  },
  {
    "name": "Shengqi Liu",
    "display_name": "Shengqi Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Achilles: Efficient TEE-Assisted BFT Consensus via Rollback Resilient Recovery",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2469,
    "paper_ids": [
      360
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chenpeng Wu",
    "display_name": "Chenpeng Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Samoyeds: Accelerating MoE Models with Structured Sparsity Leveraging Sparse Tensor Cores",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2470,
    "paper_ids": [
      1680
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qiqi Gu 0002",
    "display_name": "Qiqi Gu",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Samoyeds: Accelerating MoE Models with Structured Sparsity Leveraging Sparse Tensor Cores",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2471,
    "paper_ids": [
      1680
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Heng Shi 0005",
    "display_name": "Heng Shi",
    "affiliation": "University of Bath",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Samoyeds: Accelerating MoE Models with Structured Sparsity Leveraging Sparse Tensor Cores",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2472,
    "paper_ids": [
      1680
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jeonggyun Kim",
    "display_name": "Jeonggyun Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "FAST": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Solid State Drive Targeted Memory-Efficient Indexing for Universal I/O Patterns and Fragmentation Degrees",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deepsketch a new machine learningbased reference search technique for postdeduplication delta compression",
        "conference": "FAST",
        "year": 2022
      }
    ],
    "author_id": 2473,
    "paper_ids": [
      2071
    ],
    "papers_without_artifact_ids": [
      2079
    ]
  },
  {
    "name": "Hoon Sung Chwa",
    "display_name": "Hoon Sung Chwa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Solid State Drive Targeted Memory-Efficient Indexing for Universal I/O Patterns and Fragmentation Degrees",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2474,
    "paper_ids": [
      2071
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yang Yu",
    "display_name": "Yang Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ACSAC": 0,
      "USENIXSEC": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ACSAC": {},
      "USENIXSEC": {
        "2023": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Hardware-Software Co-Design for Efficient Secure Containers",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "infinitygauntlet expose smartphone fingerprint authentication to bruteforce attack",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 2475,
    "paper_ids": [
      1685
    ],
    "papers_without_artifact_ids": [
      4771
    ]
  },
  {
    "name": "Xiaozhe Yao",
    "display_name": "Xiaozhe Yao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DeltaZip: Efficient Serving of Multiple Full-Model-Tuned LLMs",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2476,
    "paper_ids": [
      1664
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junzhe Li",
    "display_name": "Junzhe Li",
    "affiliation": "The University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SOSP": {},
      "ATC": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Daredevil: Rescue Your Flash Storage from Inflexible Kernel Storage Stack",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automatic library fuzzing through api relation evolvement",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 2477,
    "paper_ids": [
      2778
    ],
    "papers_without_artifact_ids": [
      2821
    ]
  },
  {
    "name": "Jiayi Lin 0007",
    "display_name": "Jiayi Lin",
    "affiliation": "University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Daredevil: Rescue Your Flash Storage from Inflexible Kernel Storage Stack",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automatic library fuzzing through api relation evolvement",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 2478,
    "paper_ids": [
      2778
    ],
    "papers_without_artifact_ids": [
      2821
    ]
  },
  {
    "name": "Qingyu Zhang 0005",
    "display_name": "Qingyu Zhang",
    "affiliation": "University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Daredevil: Rescue Your Flash Storage from Inflexible Kernel Storage Stack",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automatic library fuzzing through api relation evolvement",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 2479,
    "paper_ids": [
      2778
    ],
    "papers_without_artifact_ids": [
      2821
    ]
  },
  {
    "name": "Yongqiang Xiong",
    "display_name": "Yongqiang Xiong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 1,
      "FAST": 1,
      "NSDI": 5
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SOSP": {},
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2025": 1
      },
      "NSDI": {
        "2019": 1,
        "2023": 1,
        "2018": 1,
        "2011": 1,
        "2015": 1
      }
    },
    "artifact_rate": 12.5,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Daredevil: Rescue Your Flash Storage from Inflexible Kernel Storage Stack",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "3lcache low overhead and precise learningbased eviction policy for caches",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "superbench improving cloud ai infrastructure reliability with proactive validation",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "ark gpudriven code execution for distributed deep learning",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "direct universal access making data center resources available to fpga",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "multipath transport for rdma in datacenters",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "cubicring enabling onehop failure detection and recovery for distributed inmemory storage systems",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "serverswitch a programmable and high performance platform for data center networks",
        "conference": "NSDI",
        "year": 2011
      }
    ],
    "author_id": 949,
    "paper_ids": [
      2778
    ],
    "papers_without_artifact_ids": [
      4772,
      290,
      3460,
      3461,
      3462,
      4597,
      4598
    ]
  },
  {
    "name": "Zhenlin Qi",
    "display_name": "Zhenlin Qi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chrono: Meticulous Hotness Measurement and Flexible Page Migration for Memory Tiering",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2480,
    "paper_ids": [
      4773
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shengan Zheng",
    "display_name": "Shengan Zheng",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "FAST": {
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chrono: Meticulous Hotness Measurement and Flexible Page Migration for Memory Tiering",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ziggurat a tiered file system for nonvolatile main memories and disks",
        "conference": "FAST",
        "year": 2019
      }
    ],
    "author_id": 2481,
    "paper_ids": [
      4773
    ],
    "papers_without_artifact_ids": [
      3740
    ]
  },
  {
    "name": "Ying Huang",
    "display_name": "Ying Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chrono: Meticulous Hotness Measurement and Flexible Page Migration for Memory Tiering",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "telescope telemetry for gargantuan memory footprint applications",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 2482,
    "paper_ids": [
      4773
    ],
    "papers_without_artifact_ids": [
      4774
    ]
  },
  {
    "name": "Yifeng Hui",
    "display_name": "Yifeng Hui",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chrono: Meticulous Hotness Measurement and Flexible Page Migration for Memory Tiering",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2483,
    "paper_ids": [
      4773
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bowen Zhang 0012",
    "display_name": "Bowen Zhang",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chrono: Meticulous Hotness Measurement and Flexible Page Migration for Memory Tiering",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2484,
    "paper_ids": [
      4773
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Linpeng Huang",
    "display_name": "Linpeng Huang",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chrono: Meticulous Hotness Measurement and Flexible Page Migration for Memory Tiering",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2485,
    "paper_ids": [
      4773
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hong Mei 0001",
    "display_name": "Hong Mei",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 0,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SOSP": {},
      "ATC": {},
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chrono: Meticulous Hotness Measurement and Flexible Page Migration for Memory Tiering",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2486,
    "paper_ids": [
      4773
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuxuan Mo",
    "display_name": "Yuxuan Mo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LOFT: A Lock-free and Adaptive Learned Index with High Scalability for Dynamic Workloads",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2487,
    "paper_ids": [
      3655
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Danfeng Shan",
    "display_name": "Danfeng Shan",
    "affiliation": "Xi'an Jiaotong University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "NSDI": {
        "2021": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Occamy: A Preemptive Buffer Management for On-chip Shared-memory Switches",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lemonnfv consolidating heterogeneous network functions at line speed",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "programming network stack for middleboxes with rubik",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 2488,
    "paper_ids": [
      3639
    ],
    "papers_without_artifact_ids": [
      4775,
      4776
    ]
  },
  {
    "name": "Yunguang Li",
    "display_name": "Yunguang Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Occamy: A Preemptive Buffer Management for On-chip Shared-memory Switches",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2489,
    "paper_ids": [
      3639
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinchao Ma",
    "display_name": "Jinchao Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Occamy: A Preemptive Buffer Management for On-chip Shared-memory Switches",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2490,
    "paper_ids": [
      3639
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhenxing Zhang",
    "display_name": "Zhenxing Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Occamy: A Preemptive Buffer Management for On-chip Shared-memory Switches",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2491,
    "paper_ids": [
      3639
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zeyu Liang",
    "display_name": "Zeyu Liang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Occamy: A Preemptive Buffer Management for On-chip Shared-memory Switches",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2492,
    "paper_ids": [
      3639
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xinyu Wen",
    "display_name": "Xinyu Wen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Occamy: A Preemptive Buffer Management for On-chip Shared-memory Switches",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2493,
    "paper_ids": [
      3639
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hao Li 0011",
    "display_name": "Hao Li",
    "affiliation": "Xi'an Jiaotong University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 4
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "NSDI": {
        "2021": 1,
        "2023": 1,
        "2020": 1,
        "2022": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Occamy: A Preemptive Buffer Management for On-chip Shared-memory Switches",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lemonnfv consolidating heterogeneous network functions at line speed",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "differential network analysis",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "programming network stack for middleboxes with rubik",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "apkeep realtime verification for real networks",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 2494,
    "paper_ids": [
      3639
    ],
    "papers_without_artifact_ids": [
      4775,
      4777,
      4776,
      4778
    ]
  },
  {
    "name": "Nan Li 0047",
    "display_name": "Nan Li",
    "affiliation": "Huawei Technologies, Shenzhen, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Occamy: A Preemptive Buffer Management for On-chip Shared-memory Switches",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2495,
    "paper_ids": [
      3639
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joseph Gentle",
    "display_name": "Joseph Gentle",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Collaborative Text Editing with Eg-walker: Better, Faster, Smaller",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2496,
    "paper_ids": [
      3658
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haochen Yuan",
    "display_name": "Haochen Yuan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NeuStream: Bridging Deep Learning Serving and Stream Processing",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2497,
    "paper_ids": [
      1034
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuanqing Wang",
    "display_name": "Yuanqing Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NeuStream: Bridging Deep Learning Serving and Stream Processing",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2498,
    "paper_ids": [
      1034
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenhao Xie",
    "display_name": "Wenhao Xie",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NeuStream: Bridging Deep Learning Serving and Stream Processing",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2499,
    "paper_ids": [
      1034
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu Cheng",
    "display_name": "Yu Cheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      },
      "SOSP": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NeuStream: Bridging Deep Learning Serving and Stream Processing",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scaling deep learning computation over the intercore connected intelligence processor with t10",
        "conference": "SOSP",
        "year": 2024
      }
    ],
    "author_id": 2500,
    "paper_ids": [
      1034
    ],
    "papers_without_artifact_ids": [
      1035
    ]
  },
  {
    "name": "Hanzhi Liu",
    "display_name": "Hanzhi Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understanding the Linux Kernel, Visually",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2501,
    "paper_ids": [
      3464
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tzu-Tao Chang",
    "display_name": "Tzu-Tao Chang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Eva: Cost-Efficient Cloud-Based Cluster Scheduling",
        "conference": "EUROSYS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2502,
    "paper_ids": [
      1307
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ali Raza 0003",
    "display_name": "Ali Raza",
    "affiliation": "Boston University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unikernel Linux (UKL)",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2503,
    "paper_ids": [
      3662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas Unger",
    "display_name": "Thomas Unger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unikernel Linux (UKL)",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2504,
    "paper_ids": [
      3662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matthew Boyd",
    "display_name": "Matthew Boyd",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unikernel Linux (UKL)",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2505,
    "paper_ids": [
      3662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eric B. Munson",
    "display_name": "Eric B. Munson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unikernel Linux (UKL)",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2506,
    "paper_ids": [
      3662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Parul Sohal",
    "display_name": "Parul Sohal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unikernel Linux (UKL)",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2507,
    "paper_ids": [
      3662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ulrich Drepper",
    "display_name": "Ulrich Drepper",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unikernel Linux (UKL)",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2508,
    "paper_ids": [
      3662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Richard Jones",
    "display_name": "Richard Jones",
    "affiliation": "University of Kent",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unikernel Linux (UKL)",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2509,
    "paper_ids": [
      3662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Bristot de Oliveira",
    "display_name": "Daniel Bristot de Oliveira",
    "affiliation": "UFPR",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unikernel Linux (UKL)",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2510,
    "paper_ids": [
      3662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Larry Woodman",
    "display_name": "Larry Woodman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unikernel Linux (UKL)",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2511,
    "paper_ids": [
      3662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Renato Mancuso 0001",
    "display_name": "Renato Mancuso",
    "affiliation": "Boston University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unikernel Linux (UKL)",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2512,
    "paper_ids": [
      3662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonathan Appavoo",
    "display_name": "Jonathan Appavoo",
    "affiliation": "Boston University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0,
      "SC": 0,
      "ATC": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "SOSP": {},
      "SC": {},
      "ATC": {},
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unikernel Linux (UKL)",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2513,
    "paper_ids": [
      3662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vincent Gramoli",
    "display_name": "Vincent Gramoli",
    "affiliation": "University of Sydney",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Diablo: A Benchmark Suite for Blockchains",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2514,
    "paper_ids": [
      1379
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrei Lebedev",
    "display_name": "Andrei Lebedev",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Diablo: A Benchmark Suite for Blockchains",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2515,
    "paper_ids": [
      1379
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chris Natoli",
    "display_name": "Chris Natoli",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Diablo: A Benchmark Suite for Blockchains",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2516,
    "paper_ids": [
      1379
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Saad Ahmed",
    "display_name": "Saad Ahmed",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficient and Safe I/O Operations for Intermittent Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2517,
    "paper_ids": [
      2822
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bashima Islam",
    "display_name": "Bashima Islam",
    "affiliation": "Worcester Polytechnic Institute",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficient and Safe I/O Operations for Intermittent Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2518,
    "paper_ids": [
      2822
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Josiah D. Hester",
    "display_name": "Josiah D. Hester",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficient and Safe I/O Operations for Intermittent Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2519,
    "paper_ids": [
      2822
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lilia Tang",
    "display_name": "Lilia Tang",
    "affiliation": "University of Illinois Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Fail through the Cracks: Cross-System Interaction Failures in Modern Cloud Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2520,
    "paper_ids": [
      619
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chaitanya Bhandari",
    "display_name": "Chaitanya Bhandari",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Fail through the Cracks: Cross-System Interaction Failures in Modern Cloud Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2521,
    "paper_ids": [
      619
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anna Karanika",
    "display_name": "Anna Karanika",
    "affiliation": "University of Illinois Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Fail through the Cracks: Cross-System Interaction Failures in Modern Cloud Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2522,
    "paper_ids": [
      619
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuyang Ji",
    "display_name": "Shuyang Ji",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Fail through the Cracks: Cross-System Interaction Failures in Modern Cloud Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2523,
    "paper_ids": [
      619
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seungsu Baek",
    "display_name": "Seungsu Baek",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Fast and Efficient Model Serving Using Multi-GPUs with Direct-Host-Access",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2524,
    "paper_ids": [
      2825
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hwijoon Lim",
    "display_name": "Hwijoon Lim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1,
        "2021": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FlexPass: A Case for Flexible Credit-based Transport for Datacenter Networks",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards timeoutless transport in commodity datacenter networks",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 2525,
    "paper_ids": [
      3666
    ],
    "papers_without_artifact_ids": [
      4779
    ]
  },
  {
    "name": "Jaehong Kim 0002",
    "display_name": "Jaehong Kim",
    "affiliation": "KAIST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FlexPass: A Case for Flexible Credit-based Transport for Datacenter Networks",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2526,
    "paper_ids": [
      3666
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Keon Jang",
    "display_name": "Keon Jang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 0,
      "NSDI": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "SOSP": {},
      "ATC": {},
      "NSDI": {
        "2013": 1,
        "2011": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FlexPass: A Case for Flexible Credit-based Transport for Datacenter Networks",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "chatty tenants and the cloud network sharing problem",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "sslshader cheap ssl acceleration with commodity processors",
        "conference": "NSDI",
        "year": 2011
      }
    ],
    "author_id": 2528,
    "paper_ids": [
      3666
    ],
    "papers_without_artifact_ids": [
      4780,
      4781
    ]
  },
  {
    "name": "Wei Bai 0001",
    "display_name": "Wei Bai",
    "affiliation": "City University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 10,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 0,
      "NSDI": 8
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1,
        "2021": 1
      },
      "ATC": {},
      "NSDI": {
        "2024": 3,
        "2023": 2,
        "2016": 1,
        "2015": 2
      }
    },
    "artifact_rate": 10.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FlexPass: A Case for Flexible Credit-based Transport for Datacenter Networks",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reverie low pass filterbased switch buffer sharing for datacenters with rdma and tcp traffic",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "harmonic hardwareassisted rdma performance isolation for public clouds",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "towards domainspecific network transport for distributed dnn training",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "understanding rdma microarchitecture resources for performance isolation",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "empowering azure storage with rdma",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "towards timeoutless transport in commodity datacenter networks",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "enabling ecn in multiservice multiqueue data centers",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "informationagnostic flow scheduling for commodity data centers",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "explicit path control in commodity data centers design and applications",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 2529,
    "paper_ids": [
      3666
    ],
    "papers_without_artifact_ids": [
      4782,
      2117,
      3859,
      2118,
      4643,
      4779,
      2717,
      2718,
      3864
    ]
  },
  {
    "name": "Dongsu Han",
    "display_name": "Dongsu Han",
    "affiliation": "KAIST",
    "artifact_count": 1,
    "total_papers": 10,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SOSP": 0,
      "ATC": 0,
      "NSDI": 8,
      "NDSS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1,
        "2021": 1
      },
      "SOSP": {},
      "ATC": {},
      "NSDI": {
        "2014": 2,
        "2017": 2,
        "2012": 2,
        "2016": 1,
        "2015": 1
      },
      "NDSS": {},
      "OSDI": {}
    },
    "artifact_rate": 10.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FlexPass: A Case for Flexible Credit-based Transport for Datacenter Networks",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards timeoutless transport in commodity datacenter networks",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "mos a reusable networking stack for flow monitoring middleboxes",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "enhancing security and privacy of tors ecosystem by using trusted execution environments",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "dfc accelerating string pattern matching for network applications",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "informationagnostic flow scheduling for commodity data centers",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "mica a holistic approach to fast inmemory keyvalue storage",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "mtcp a highly scalable userlevel tcp stack for multicore systems",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "xia efficient support for evolvable internetworking",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "rpt rearchitecting loss protection for contentaware networks",
        "conference": "NSDI",
        "year": 2012
      }
    ],
    "author_id": 2530,
    "paper_ids": [
      3666
    ],
    "papers_without_artifact_ids": [
      4779,
      4783,
      667,
      4784,
      2718,
      4785,
      4786,
      2907,
      2908
    ]
  },
  {
    "name": "Lingmei Weng",
    "display_name": "Lingmei Weng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective Performance Issue Diagnosis with Value-Assisted Cost Profiling",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2531,
    "paper_ids": [
      1922
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jin Yang",
    "display_name": "Jin Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DyTIS: A Dynamic Dataset Targeted Index Structure Simultaneously Efficient for Search, Insert, and Scan",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2532,
    "paper_ids": [
      3611
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Heejin Yoon",
    "display_name": "Heejin Yoon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DyTIS: A Dynamic Dataset Targeted Index Structure Simultaneously Efficient for Search, Insert, and Scan",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2533,
    "paper_ids": [
      3611
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu Chen Wang",
    "display_name": "Yu Chen Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Integrating Non-Volatile Main Memory in a Deterministic Database",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2534,
    "paper_ids": [
      2720
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ruobing Chen 0002",
    "display_name": "Ruobing Chen",
    "affiliation": "Nankai University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OLPart: Online Learning based Resource Partitioning for Colocating Multiple Latency-Critical Jobs on Commodity Computers",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2535,
    "paper_ids": [
      4787
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haosen Shi 0001",
    "display_name": "Haosen Shi",
    "affiliation": "Boğaziçi University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OLPart: Online Learning based Resource Partitioning for Colocating Multiple Latency-Critical Jobs on Commodity Computers",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2536,
    "paper_ids": [
      4787
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yusen Li",
    "display_name": "Yusen Li",
    "affiliation": "Nankai University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "SC": {},
      "FAST": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OLPart: Online Learning based Resource Partitioning for Colocating Multiple Latency-Critical Jobs on Commodity Computers",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pimlex a highperformance learned index with processinginmemory",
        "conference": "FAST",
        "year": 2025
      }
    ],
    "author_id": 2537,
    "paper_ids": [
      4787
    ],
    "papers_without_artifact_ids": [
      4788
    ]
  },
  {
    "name": "Xiaoguang Liu 0001",
    "display_name": "Xiaoguang Liu",
    "affiliation": "Nankai University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "FAST": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OLPart: Online Learning based Resource Partitioning for Colocating Multiple Latency-Critical Jobs on Commodity Computers",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pimlex a highperformance learned index with processinginmemory",
        "conference": "FAST",
        "year": 2025
      }
    ],
    "author_id": 2538,
    "paper_ids": [
      4787
    ],
    "papers_without_artifact_ids": [
      4788
    ]
  },
  {
    "name": "Gang Wang 0001",
    "display_name": "Gang Wang",
    "affiliation": "Nankai University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "FAST": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OLPart: Online Learning based Resource Partitioning for Colocating Multiple Latency-Critical Jobs on Commodity Computers",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pimlex a highperformance learned index with processinginmemory",
        "conference": "FAST",
        "year": 2025
      }
    ],
    "author_id": 2539,
    "paper_ids": [
      4787
    ],
    "papers_without_artifact_ids": [
      4788
    ]
  },
  {
    "name": "Wonsup Yoon",
    "display_name": "Wonsup Yoon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2023": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DiLOS: Do Not Trade Compatibility for Performance in Memory Disaggregation",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "adios to busywaiting for microsecondscale memory disaggregation",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 2540,
    "paper_ids": [
      346
    ],
    "papers_without_artifact_ids": [
      354
    ]
  },
  {
    "name": "Jisu Ok",
    "display_name": "Jisu Ok",
    "affiliation": "KAIST",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DiLOS: Do Not Trade Compatibility for Performance in Memory Disaggregation",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "adios to busywaiting for microsecondscale memory disaggregation",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 2541,
    "paper_ids": [
      346
    ],
    "papers_without_artifact_ids": [
      354
    ]
  },
  {
    "name": "Jinyoung Oh",
    "display_name": "Jinyoung Oh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DiLOS: Do Not Trade Compatibility for Performance in Memory Disaggregation",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2542,
    "paper_ids": [
      346
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sue Moon",
    "display_name": "Sue Moon",
    "affiliation": "KAIST",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2023": 1
      },
      "ATC": {},
      "NSDI": {
        "2018": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DiLOS: Do Not Trade Compatibility for Performance in Memory Disaggregation",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "adios to busywaiting for microsecondscale memory disaggregation",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "elastic scaling of stateful network functions",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 2543,
    "paper_ids": [
      346
    ],
    "papers_without_artifact_ids": [
      354,
      4607
    ]
  },
  {
    "name": "Junyu Wei",
    "display_name": "Junyu Wei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 1,
      "ATC": 0,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "SOSP": {
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2021": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LogGrep: Fast and Cheap Cloud Log Storage by Exploiting both Static and Runtime Patterns",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding silent data corruptions in a large production cpu population",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "on the feasibility of parserbased log compression in largescale cloud systems",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "fusionraid achieving consistent low latency for commodity ssd arrays",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2544,
    "paper_ids": [
      2085
    ],
    "papers_without_artifact_ids": [
      2095,
      3673,
      3674
    ]
  },
  {
    "name": "Junchao Chen 0005",
    "display_name": "Junchao Chen",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LogGrep: Fast and Cheap Cloud Log Storage by Exploiting both Static and Runtime Patterns",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the feasibility of parserbased log compression in largescale cloud systems",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2545,
    "paper_ids": [
      2085
    ],
    "papers_without_artifact_ids": [
      3673
    ]
  },
  {
    "name": "Weimin Zheng",
    "display_name": "Weimin Zheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0,
      "ACSAC": 0,
      "FAST": 6,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "SC": {},
      "ATC": {},
      "ACSAC": {},
      "FAST": {
        "2021": 1,
        "2011": 1,
        "2018": 1,
        "2013": 1,
        "2022": 1,
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LogGrep: Fast and Cheap Cloud Log Storage by Exploiting both Static and Runtime Patterns",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mooncake trading more storage for less computation a kvcachecentric architecture for serving llm chatbot",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "aurogon taming aborts in all phases for distributed inmemory transactions",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "fusionraid achieving consistent low latency for commodity ssd arrays",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "raid deterministic and balanced data distribution for large disk enclosures",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "extending the lifetime of flashbased storage through reducing write amplification from file systems",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "fastscale accelerate raid scaling by minimizing data migration",
        "conference": "FAST",
        "year": 2011
      }
    ],
    "author_id": 2546,
    "paper_ids": [
      2085
    ],
    "papers_without_artifact_ids": [
      1600,
      3672,
      3674,
      3675,
      1073,
      3676
    ]
  },
  {
    "name": "Tingtao Sun",
    "display_name": "Tingtao Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LogGrep: Fast and Cheap Cloud Log Storage by Exploiting both Static and Runtime Patterns",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the feasibility of parserbased log compression in largescale cloud systems",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2547,
    "paper_ids": [
      2085
    ],
    "papers_without_artifact_ids": [
      3673
    ]
  },
  {
    "name": "Jiangwei Jiang",
    "display_name": "Jiangwei Jiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LogGrep: Fast and Cheap Cloud Log Storage by Exploiting both Static and Runtime Patterns",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2548,
    "paper_ids": [
      2085
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tianjiao Huang",
    "display_name": "Tianjiao Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 2,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "SOSP": {
        "2021": 2
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DRAMHiT: A Hash Table Architected for the Speed of DRAM",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding the overheads of hardware and languagebased ipc mechanisms",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "isolation in rust what is missing",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "redleaf isolation and communication in a safe operating system",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 2549,
    "paper_ids": [
      2834
    ],
    "papers_without_artifact_ids": [
      2840,
      2841,
      2842
    ]
  },
  {
    "name": "Ho-Ren Chuang",
    "display_name": "Ho-Ren Chuang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aggregate VM: Why Reduce or Evict VM's Resources When You Can Borrow Them From Other Nodes?",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2550,
    "paper_ids": [
      4789
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Karim Manaouil",
    "display_name": "Karim Manaouil",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aggregate VM: Why Reduce or Evict VM's Resources When You Can Borrow Them From Other Nodes?",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2551,
    "paper_ids": [
      4789
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tong Xing 0002",
    "display_name": "Tong Xing",
    "affiliation": "Nanjing University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aggregate VM: Why Reduce or Evict VM's Resources When You Can Borrow Them From Other Nodes?",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2552,
    "paper_ids": [
      4789
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Antonio Barbalace",
    "display_name": "Antonio Barbalace",
    "affiliation": "University of Edinburgh",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aggregate VM: Why Reduce or Evict VM's Resources When You Can Borrow Them From Other Nodes?",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2553,
    "paper_ids": [
      4789
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pierre Olivier",
    "display_name": "Pierre Olivier",
    "affiliation": "University of Manchester",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 3,
      "SOSP": 2,
      "SC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1,
        "2024": 1,
        "2021": 1
      },
      "SOSP": {
        "2023": 2
      },
      "SC": {},
      "NDSS": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aggregate VM: Why Reduce or Evict VM's Resources When You Can Borrow Them From Other Nodes?",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "trackiops realtime nfs performance metrics extractor",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "software compartmentalization tradeoffs with hardware capabilities",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "civscope analyzing potential memory corruption bugs in compartment interfaces",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "eziotracer unifying kernel and user space io tracing for dataintensive applications",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 2554,
    "paper_ids": [
      4789
    ],
    "papers_without_artifact_ids": [
      4790,
      4791,
      4792,
      4793
    ]
  },
  {
    "name": "Balvansh Heerekar",
    "display_name": "Balvansh Heerekar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aggregate VM: Why Reduce or Evict VM's Resources When You Can Borrow Them From Other Nodes?",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2555,
    "paper_ids": [
      4789
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Binoy Ravindran",
    "display_name": "Binoy Ravindran",
    "affiliation": "Virginia Tech, Blacksburg, VA, USA",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1,
        "2022": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aggregate VM: Why Reduce or Evict VM's Resources When You Can Borrow Them From Other Nodes?",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "kite lightweight critical service domains",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 2556,
    "paper_ids": [
      4789
    ],
    "papers_without_artifact_ids": [
      4794
    ]
  },
  {
    "name": "Atal Narayan Sahu",
    "display_name": "Atal Narayan Sahu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "REFL: Resource-Efficient Federated Learning",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2557,
    "paper_ids": [
      1647
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Suhaib A. Fahmy",
    "display_name": "Suhaib A. Fahmy",
    "affiliation": "KAUST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "REFL: Resource-Efficient Federated Learning",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2558,
    "paper_ids": [
      1647
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Misun Park",
    "display_name": "Misun Park",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pocket: ML Serving from the Edge",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2559,
    "paper_ids": [
      3684
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ketan Bhardwaj",
    "display_name": "Ketan Bhardwaj",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pocket: ML Serving from the Edge",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2560,
    "paper_ids": [
      3684
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrei Albisoru",
    "display_name": "Andrei Albisoru",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Nephele: Extending Virtualization Environments for Cloning Unikernel-based VMs",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2561,
    "paper_ids": [
      3686
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Radu Nichita",
    "display_name": "Radu Nichita",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Nephele: Extending Virtualization Environments for Cloning Unikernel-based VMs",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2562,
    "paper_ids": [
      3686
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Doru-Florin Blânzeanu",
    "display_name": "Doru-Florin Blânzeanu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Nephele: Extending Virtualization Environments for Cloning Unikernel-based VMs",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7982,
    "paper_ids": [
      3686
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mihai Pogonaru",
    "display_name": "Mihai Pogonaru",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Nephele: Extending Virtualization Environments for Cloning Unikernel-based VMs",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2564,
    "paper_ids": [
      3686
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinwook Bae",
    "display_name": "Jinwook Bae",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "All-Flash Array Key-Value Cache for Large Objects",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2565,
    "paper_ids": [
      2072
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minjeong Yuk",
    "display_name": "Minjeong Yuk",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "All-Flash Array Key-Value Cache for Large Objects",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2566,
    "paper_ids": [
      2072
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jungwoo Kim",
    "display_name": "Jungwoo Kim",
    "affiliation": "Stanford University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "FAST": {
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "All-Flash Array Key-Value Cache for Large Objects",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dogi data placement with oracleguided insights for logstructured systems",
        "conference": "FAST",
        "year": 2026
      }
    ],
    "author_id": 2567,
    "paper_ids": [
      2072
    ],
    "papers_without_artifact_ids": [
      2075
    ]
  },
  {
    "name": "Jung-Soo Park",
    "display_name": "Jung-Soo Park",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "All-Flash Array Key-Value Cache for Large Objects",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2568,
    "paper_ids": [
      2072
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jian Zhang 0102",
    "display_name": "Jian Zhang",
    "affiliation": "Northeastern University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Viper: A Fast Snapshot Isolation Checker",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "simplifying snapshot isolation a new definition equivalence and efficient checking",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 2569,
    "paper_ids": [
      2848
    ],
    "papers_without_artifact_ids": [
      2852
    ]
  },
  {
    "name": "Ye Ji 0003",
    "display_name": "Ye Ji",
    "affiliation": "Kent State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Viper: A Fast Snapshot Isolation Checker",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2570,
    "paper_ids": [
      2848
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Harald Ng",
    "display_name": "Harald Ng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Omni-Paxos: Breaking the Barriers of Partial Connectivity",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2571,
    "paper_ids": [
      4795
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seif Haridi",
    "display_name": "Seif Haridi",
    "affiliation": "KTH Royal Inst. of Technology",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "FAST": {
        "2017": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Omni-Paxos: Breaking the Barriers of Partial Connectivity",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hopsfs scaling hierarchical file system metadata using newsql databases",
        "conference": "FAST",
        "year": 2017
      }
    ],
    "author_id": 2572,
    "paper_ids": [
      4795
    ],
    "papers_without_artifact_ids": [
      4796
    ]
  },
  {
    "name": "Paris Carbone",
    "display_name": "Paris Carbone",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Omni-Paxos: Breaking the Barriers of Partial Connectivity",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2573,
    "paper_ids": [
      4795
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muhammad Bilal 0007",
    "display_name": "Muhammad Bilal",
    "affiliation": "Université Catholique de Louvain",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "With Great Freedom Comes Great Opportunity: Rethinking Resource Allocation for Serverless Functions",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2574,
    "paper_ids": [
      1648
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rodrigo Fonseca",
    "display_name": "Rodrigo Fonseca",
    "affiliation": "Microsoft Research",
    "artifact_count": 1,
    "total_papers": 10,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SOSP": 2,
      "SC": 0,
      "ATC": 0,
      "NSDI": 6,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 2
      },
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "SC": {},
      "ATC": {},
      "NSDI": {
        "2024": 1,
        "2019": 1,
        "2023": 1,
        "2005": 1,
        "2007": 1,
        "2015": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 10.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "With Great Freedom Comes Great Opportunity: Rethinking Resource Allocation for Serverless Functions",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "making kernel bypass practical for the cloud with junction",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "palette load balancing locality hints for serverless functions",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "selftune tuning cluster managers",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "understanding the neglected cost of serverless cluster management",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "faster and cheaper serverless computing on harvested resources",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "dshark a general easy to program and scalable framework for analyzing innetwork packet traces",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "retro targeted resource management in multitenant distributed systems",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "xtrace a pervasive network tracing framework",
        "conference": "NSDI",
        "year": 2007
      },
      {
        "title": "beacon vector routing scalable pointtopoint routing in wireless sensornets",
        "conference": "NSDI",
        "year": 2005
      }
    ],
    "author_id": 2575,
    "paper_ids": [
      1648
    ],
    "papers_without_artifact_ids": [
      2636,
      2698,
      4797,
      1671,
      3869,
      4798,
      1972,
      516,
      520
    ]
  },
  {
    "name": "Suyash Gupta 0001",
    "display_name": "Suyash Gupta",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Dissecting BFT Consensus: In Trusted Components we Trust!",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 967,
    "paper_ids": [
      1992
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sajjad Rahnama",
    "display_name": "Sajjad Rahnama",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Dissecting BFT Consensus: In Trusted Components we Trust!",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2576,
    "paper_ids": [
      1992
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shubham Pandey",
    "display_name": "Shubham Pandey",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Dissecting BFT Consensus: In Trusted Components we Trust!",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2577,
    "paper_ids": [
      1992
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohammad Sadoghi",
    "display_name": "Mohammad Sadoghi",
    "affiliation": "Univ. of California - Davis",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {},
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Dissecting BFT Consensus: In Trusted Components we Trust!",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the bedrock of byzantine fault tolerance a unified platform for bft protocols analysis implementation and experimentation",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 2578,
    "paper_ids": [
      1992
    ],
    "papers_without_artifact_ids": [
      3493
    ]
  },
  {
    "name": "Felix Berlakovich",
    "display_name": "Felix Berlakovich",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "R2C: AOCR-Resilient Diversity with Reactive and Reflective Camouflage",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2579,
    "paper_ids": [
      4799
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stefan Brunthaler 0001",
    "display_name": "Stefan Brunthaler",
    "affiliation": "Bundeswehr University Munich",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "R2C: AOCR-Resilient Diversity with Reactive and Reflective Camouflage",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2580,
    "paper_ids": [
      4799
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dong Wang 0048",
    "display_name": "Dong Wang",
    "affiliation": "Chinese Academy of Sciences, Institute of Software, Beijing, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Model Checking Guided Testing for Distributed Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2581,
    "paper_ids": [
      4800
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wensheng Dou",
    "display_name": "Wensheng Dou",
    "affiliation": "Chinese Academy of Sciences",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Model Checking Guided Testing for Distributed Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2582,
    "paper_ids": [
      4800
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu Gao 0002",
    "display_name": "Yu Gao",
    "affiliation": "University of Massachusetts Lowell",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Model Checking Guided Testing for Distributed Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2583,
    "paper_ids": [
      4800
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chenao Wu",
    "display_name": "Chenao Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Model Checking Guided Testing for Distributed Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2584,
    "paper_ids": [
      4800
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jun Wei 0001",
    "display_name": "Jun Wei",
    "affiliation": "Chinese Academy of Sciences",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Model Checking Guided Testing for Distributed Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2585,
    "paper_ids": [
      4800
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tao Huang 0001",
    "display_name": "Tao Huang",
    "affiliation": "Virginia Tech",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Model Checking Guided Testing for Distributed Systems",
        "conference": "EUROSYS",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2586,
    "paper_ids": [
      4800
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ziming Zhao 0003",
    "display_name": "Ziming Zhao",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Characterization and Reclamation of Frozen Garbage in Managed FaaS Workloads",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2587,
    "paper_ids": [
      33
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sari Sultan",
    "display_name": "Sari Sultan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "FAST": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TTLs Matter: Efficient Cache Sizing with TTL-Aware Miss Ratio Curves and Working Set Sizes",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "kosmo efficient online miss ratio curve generation for eviction policy evaluation",
        "conference": "FAST",
        "year": 2024
      }
    ],
    "author_id": 969,
    "paper_ids": [
      3696
    ],
    "papers_without_artifact_ids": [
      3697
    ]
  },
  {
    "name": "Kia Shakiba",
    "display_name": "Kia Shakiba",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "FAST": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TTLs Matter: Efficient Cache Sizing with TTL-Aware Miss Ratio Curves and Working Set Sizes",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "kosmo efficient online miss ratio curve generation for eviction policy evaluation",
        "conference": "FAST",
        "year": 2024
      }
    ],
    "author_id": 970,
    "paper_ids": [
      3696
    ],
    "papers_without_artifact_ids": [
      3697
    ]
  },
  {
    "name": "Albert Lee",
    "display_name": "Albert Lee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TTLs Matter: Efficient Cache Sizing with TTL-Aware Miss Ratio Curves and Working Set Sizes",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2588,
    "paper_ids": [
      3696
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Paul Chen",
    "display_name": "Paul Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TTLs Matter: Efficient Cache Sizing with TTL-Aware Miss Ratio Curves and Working Set Sizes",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2589,
    "paper_ids": [
      3696
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qizheng Yang",
    "display_name": "Qizheng Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GMorph: Accelerating Multi-DNN Inference via Model Fusion",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2590,
    "paper_ids": [
      3701
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tianyi Yang",
    "display_name": "Tianyi Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "FAST": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GMorph: Accelerating Multi-DNN Inference via Model Fusion",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fusee a fully memorydisaggregated keyvalue store",
        "conference": "FAST",
        "year": 2023
      }
    ],
    "author_id": 2591,
    "paper_ids": [
      3701
    ],
    "papers_without_artifact_ids": [
      1613
    ]
  },
  {
    "name": "Mingcan Xiang",
    "display_name": "Mingcan Xiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GMorph: Accelerating Multi-DNN Inference via Model Fusion",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2592,
    "paper_ids": [
      3701
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lijun Zhang 0005",
    "display_name": "Lijun Zhang",
    "affiliation": "Nanjing University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GMorph: Accelerating Multi-DNN Inference via Model Fusion",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2593,
    "paper_ids": [
      3701
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hui Guan 0001",
    "display_name": "Hui Guan",
    "affiliation": "Univ. of Massachusetts Amherst",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GMorph: Accelerating Multi-DNN Inference via Model Fusion",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2594,
    "paper_ids": [
      3701
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yanbo Zhou",
    "display_name": "Yanbo Zhou",
    "affiliation": "University of California, San Diego",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SOSP": {},
      "ATC": {},
      "FAST": {
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CSAL: the Next-Gen Local Disks for the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "here there and everywhere the past the present and the future of local storage in cloud",
        "conference": "FAST",
        "year": 2026
      }
    ],
    "author_id": 2595,
    "paper_ids": [
      2086
    ],
    "papers_without_artifact_ids": [
      2089
    ]
  },
  {
    "name": "Li Zhang",
    "display_name": "Li Zhang",
    "affiliation": "Drexel University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {},
      "FAST": {
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CSAL: the Next-Gen Local Disks for the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "here there and everywhere the past the present and the future of local storage in cloud",
        "conference": "FAST",
        "year": 2026
      }
    ],
    "author_id": 2596,
    "paper_ids": [
      2086
    ],
    "papers_without_artifact_ids": [
      2089
    ]
  },
  {
    "name": "Kapil Karkra",
    "display_name": "Kapil Karkra",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CSAL: the Next-Gen Local Disks for the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2597,
    "paper_ids": [
      2086
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mariusz Barczak",
    "display_name": "Mariusz Barczak",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "FAST": {
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CSAL: the Next-Gen Local Disks for the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "here there and everywhere the past the present and the future of local storage in cloud",
        "conference": "FAST",
        "year": 2026
      }
    ],
    "author_id": 2598,
    "paper_ids": [
      2086
    ],
    "papers_without_artifact_ids": [
      2089
    ]
  },
  {
    "name": "Wayne Gao",
    "display_name": "Wayne Gao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "FAST": {
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CSAL: the Next-Gen Local Disks for the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "here there and everywhere the past the present and the future of local storage in cloud",
        "conference": "FAST",
        "year": 2026
      }
    ],
    "author_id": 2599,
    "paper_ids": [
      2086
    ],
    "papers_without_artifact_ids": [
      2089
    ]
  },
  {
    "name": "Wojciech Malikowski",
    "display_name": "Wojciech Malikowski",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CSAL: the Next-Gen Local Disks for the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2600,
    "paper_ids": [
      2086
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mateusz Kozlowski",
    "display_name": "Mateusz Kozlowski",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CSAL: the Next-Gen Local Disks for the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2601,
    "paper_ids": [
      2086
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lukasz Lasek",
    "display_name": "Lukasz Lasek",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CSAL: the Next-Gen Local Disks for the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2602,
    "paper_ids": [
      2086
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Feng Yang",
    "display_name": "Feng Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CSAL: the Next-Gen Local Disks for the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2603,
    "paper_ids": [
      2086
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lilong Huang",
    "display_name": "Lilong Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "FAST": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CSAL: the Next-Gen Local Disks for the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "separating data via block invalidation time inference for write amplification reduction in logstructured storage",
        "conference": "FAST",
        "year": 2022
      }
    ],
    "author_id": 2604,
    "paper_ids": [
      2086
    ],
    "papers_without_artifact_ids": [
      3824
    ]
  },
  {
    "name": "Xiaolu Zhang",
    "display_name": "Xiaolu Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {},
      "FAST": {
        "2024": 1,
        "2026": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CSAL: the Next-Gen Local Disks for the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "here there and everywhere the past the present and the future of local storage in cloud",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "whats the story in ebs glory evolutions and lessons in building cloud block store",
        "conference": "FAST",
        "year": 2024
      }
    ],
    "author_id": 2605,
    "paper_ids": [
      2086
    ],
    "papers_without_artifact_ids": [
      2089,
      2091
    ]
  },
  {
    "name": "Keqiang Niu",
    "display_name": "Keqiang Niu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {},
      "FAST": {
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CSAL: the Next-Gen Local Disks for the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "here there and everywhere the past the present and the future of local storage in cloud",
        "conference": "FAST",
        "year": 2026
      }
    ],
    "author_id": 2606,
    "paper_ids": [
      2086
    ],
    "papers_without_artifact_ids": [
      2089
    ]
  },
  {
    "name": "Jiaji Zhu",
    "display_name": "Jiaji Zhu",
    "affiliation": "Ohio University",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1,
      "FAST": 4,
      "NSDI": 1,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2024": 1,
        "2026": 2,
        "2023": 1
      },
      "NSDI": {
        "2021": 1
      },
      "OSDI": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 11.1,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CSAL: the Next-Gen Local Disks for the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "here there and everywhere the past the present and the future of local storage in cloud",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "how soon is now preloading images for virtual disks with thinkahead",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "whats the story in ebs glory evolutions and lessons in building cloud block store",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "ransom access memories achieving practical ransomware protection in cloud with deftpunk",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "deploying userspace tcp at cloud scale with luna",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "more than capacity performanceoriented evolution of pangu in alibaba",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "flor an open high performance rdma framework over heterogeneous rnics",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "when cloud storage meets rdma",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 2607,
    "paper_ids": [
      2086
    ],
    "papers_without_artifact_ids": [
      2089,
      2090,
      2091,
      2092,
      2093,
      1063,
      1065,
      2096
    ]
  },
  {
    "name": "Khakim Akhunov",
    "display_name": "Khakim Akhunov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Adaptable Runtime Monitoring for Intermittent Systems",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2608,
    "paper_ids": [
      2823
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lorenzo Antonio Riva",
    "display_name": "Lorenzo Antonio Riva",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Adaptable Runtime Monitoring for Intermittent Systems",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2609,
    "paper_ids": [
      2823
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arda Goknil",
    "display_name": "Arda Goknil",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Adaptable Runtime Monitoring for Intermittent Systems",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2610,
    "paper_ids": [
      2823
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ivan Kurtev",
    "display_name": "Ivan Kurtev",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Adaptable Runtime Monitoring for Intermittent Systems",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2611,
    "paper_ids": [
      2823
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hanpeng Hu",
    "display_name": "Hanpeng Hu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CDMPP: A Device-Model Agnostic Framework for Latency Prediction of Tensor Programs",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "optimizing rlhf training for large language models with stage fusion",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 2612,
    "paper_ids": [
      2829
    ],
    "papers_without_artifact_ids": [
      999
    ]
  },
  {
    "name": "Junwei Su",
    "display_name": "Junwei Su",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CDMPP: A Device-Model Agnostic Framework for Latency Prediction of Tensor Programs",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2613,
    "paper_ids": [
      2829
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Juntao Zhao",
    "display_name": "Juntao Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CDMPP: A Device-Model Agnostic Framework for Latency Prediction of Tensor Programs",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2614,
    "paper_ids": [
      2829
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yanghua Peng",
    "display_name": "Yanghua Peng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SOSP": 0,
      "ATC": 0,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      },
      "SOSP": {},
      "ATC": {},
      "NSDI": {
        "2024": 1,
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CDMPP: A Device-Model Agnostic Framework for Latency Prediction of Tensor Programs",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hybridflow a flexible and efficient rlhf framework",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "bytecheckpoint a unified checkpointing system for large foundation model development",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "megascale scaling large language model training to more than 10 000 gpus",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "bgl gpuefficient gnn training by optimizing graph data io and preprocessing",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 2615,
    "paper_ids": [
      2829
    ],
    "papers_without_artifact_ids": [
      2856,
      2857,
      1001,
      2831
    ]
  },
  {
    "name": "Qihao Zhang",
    "display_name": "Qihao Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "WiseGraph: Optimizing GNN with Joint Workload Partition of Graph and Operations",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2616,
    "paper_ids": [
      2097
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Runqing Zhang",
    "display_name": "Runqing Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "WiseGraph: Optimizing GNN with Joint Workload Partition of Graph and Operations",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "smartmoe efficiently training sparselyactivated models through combining offline and online parallelization",
        "conference": "ATC",
        "year": 2023
      }
    ],
    "author_id": 2617,
    "paper_ids": [
      2097
    ],
    "papers_without_artifact_ids": [
      2100
    ]
  },
  {
    "name": "Youngmin Yi",
    "display_name": "Youngmin Yi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "WiseGraph: Optimizing GNN with Joint Workload Partition of Graph and Operations",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2618,
    "paper_ids": [
      2097
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xipeng Shen",
    "display_name": "Xipeng Shen",
    "affiliation": "North Carolina State University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SC": {},
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "WiseGraph: Optimizing GNN with Joint Workload Partition of Graph and Operations",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "decentralized applicationlevel adaptive scheduling for multiinstance dnns on open mobile devices",
        "conference": "ATC",
        "year": 2023
      }
    ],
    "author_id": 2619,
    "paper_ids": [
      2097
    ],
    "papers_without_artifact_ids": [
      4801
    ]
  },
  {
    "name": "Li Zhong",
    "display_name": "Li Zhong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective Bug Detection with Unused Definitions",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2620,
    "paper_ids": [
      3704
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chengcheng Xiang",
    "display_name": "Chengcheng Xiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {},
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective Bug Detection with Unused Definitions",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "can systems explain permissions better understanding users misperceptions under smartphone runtime permission model",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 2621,
    "paper_ids": [
      3704
    ],
    "papers_without_artifact_ids": [
      3707
    ]
  },
  {
    "name": "Haochen Huang",
    "display_name": "Haochen Huang",
    "affiliation": "George Washington University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective Bug Detection with Unused Definitions",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2622,
    "paper_ids": [
      3704
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eric Mugnier",
    "display_name": "Eric Mugnier",
    "affiliation": "University of California, San Diego",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective Bug Detection with Unused Definitions",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2623,
    "paper_ids": [
      3704
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ioanna Tzialla",
    "display_name": "Ioanna Tzialla",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Auditing of Event-driven Web Applications",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2624,
    "paper_ids": [
      2860
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jeffery Wang",
    "display_name": "Jeffery Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Auditing of Event-driven Web Applications",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2625,
    "paper_ids": [
      2860
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jingyi Zhu",
    "display_name": "Jingyi Zhu",
    "affiliation": "Ohio University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Auditing of Event-driven Web Applications",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2626,
    "paper_ids": [
      2860
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaojun Guo",
    "display_name": "Xiaojun Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLOWS: Balanced MRC Profiling for Heterogeneous Object-Size Cache",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2627,
    "paper_ids": [
      2103
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hua Wang 0008",
    "display_name": "Hua Wang",
    "affiliation": "Huazhong University of Science and Technology, Wuhan, Hubei, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLOWS: Balanced MRC Profiling for Heterogeneous Object-Size Cache",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2628,
    "paper_ids": [
      2103
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guangjie Xing",
    "display_name": "Guangjie Xing",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLOWS: Balanced MRC Profiling for Heterogeneous Object-Size Cache",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2629,
    "paper_ids": [
      2103
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yijia Zhang",
    "display_name": "Yijia Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improving GPU Energy Efficiency through an Application-transparent Frequency Scaling Policy with Performance Assurance",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2630,
    "paper_ids": [
      3712
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhe Lin",
    "display_name": "Zhe Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improving GPU Energy Efficiency through an Application-transparent Frequency Scaling Policy with Performance Assurance",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2631,
    "paper_ids": [
      3712
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pengxiang Xu",
    "display_name": "Pengxiang Xu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improving GPU Energy Efficiency through an Application-transparent Frequency Scaling Policy with Performance Assurance",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2632,
    "paper_ids": [
      3712
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bingqiang Wang",
    "display_name": "Bingqiang Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improving GPU Energy Efficiency through an Application-transparent Frequency Scaling Policy with Performance Assurance",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2633,
    "paper_ids": [
      3712
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ka-Ho Chow",
    "display_name": "Ka-Ho Chow",
    "affiliation": "University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Atlas: Hybrid Cloud Migration Advisor for Interactive Microservices",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diversitydriven privacy protection masks against unauthorized face recognition",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 2634,
    "paper_ids": [
      3713
    ],
    "papers_without_artifact_ids": [
      3718
    ]
  },
  {
    "name": "Veera Deenadhayalan",
    "display_name": "Veera Deenadhayalan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "FAST": {
        "2005": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Atlas: Hybrid Cloud Migration Advisor for Interactive Microservices",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "matrix methods for lost data reconstruction in erasure codes",
        "conference": "FAST",
        "year": 2005
      }
    ],
    "author_id": 2635,
    "paper_ids": [
      3713
    ],
    "papers_without_artifact_ids": [
      4802
    ]
  },
  {
    "name": "Sian Jin",
    "display_name": "Sian Jin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Concealing Compression-accelerated I/O for HPC Applications through In Situ Task Scheduling",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2636,
    "paper_ids": [
      4803
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sheng Di",
    "display_name": "Sheng Di",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Concealing Compression-accelerated I/O for HPC Applications through In Situ Task Scheduling",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "resilient errorbounded lossy compressor for data transfer",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2637,
    "paper_ids": [
      4803
    ],
    "papers_without_artifact_ids": [
      4804
    ]
  },
  {
    "name": "Frédéric Vivien",
    "display_name": "Frédéric Vivien",
    "affiliation": "Inria",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Concealing Compression-accelerated I/O for HPC Applications through In Situ Task Scheduling",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7983,
    "paper_ids": [
      4803
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daoce Wang",
    "display_name": "Daoce Wang",
    "affiliation": "University of Nebraska - Omaha",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Concealing Compression-accelerated I/O for HPC Applications through In Situ Task Scheduling",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2639,
    "paper_ids": [
      4803
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yves Robert",
    "display_name": "Yves Robert",
    "affiliation": "Ecole Normale Superieure de Lyon",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Concealing Compression-accelerated I/O for HPC Applications through In Situ Task Scheduling",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2640,
    "paper_ids": [
      4803
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dingwen Tao",
    "display_name": "Dingwen Tao",
    "affiliation": "Chinese Academy of Sciences",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SC": {},
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Concealing Compression-accelerated I/O for HPC Applications through In Situ Task Scheduling",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "centimani enabling fast ai accelerator selection for dnn training with a novel performance predictor",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 2641,
    "paper_ids": [
      4803
    ],
    "papers_without_artifact_ids": [
      4805
    ]
  },
  {
    "name": "Franck Cappello",
    "display_name": "Franck Cappello",
    "affiliation": "University of Illinois",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Concealing Compression-accelerated I/O for HPC Applications through In Situ Task Scheduling",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "resilient errorbounded lossy compressor for data transfer",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2642,
    "paper_ids": [
      4803
    ],
    "papers_without_artifact_ids": [
      4804
    ]
  },
  {
    "name": "Lei Yan 0003",
    "display_name": "Lei Yan",
    "affiliation": "HKUST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Transparent Multicore Scaling of Single-Threaded Network Functions",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2643,
    "paper_ids": [
      526
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Samantha Miller",
    "display_name": "Samantha Miller",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Enoki: High Velocity Linux Kernel Scheduler Development",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "high velocity kernel file systems with bento",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2644,
    "paper_ids": [
      695
    ],
    "papers_without_artifact_ids": [
      707
    ]
  },
  {
    "name": "Anirudh Kumar",
    "display_name": "Anirudh Kumar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Enoki: High Velocity Linux Kernel Scheduler Development",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2645,
    "paper_ids": [
      695
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tanay Vakharia",
    "display_name": "Tanay Vakharia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Enoki: High Velocity Linux Kernel Scheduler Development",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2646,
    "paper_ids": [
      695
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiacheng Yang",
    "display_name": "Jiacheng Yang",
    "affiliation": "University of Toronto",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Minuet: Accelerating 3D Sparse Convolutions on GPUs",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2647,
    "paper_ids": [
      2069
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jun Wu",
    "display_name": "Jun Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Minuet: Accelerating 3D Sparse Convolutions on GPUs",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2648,
    "paper_ids": [
      2069
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mostafa Elhoushi",
    "display_name": "Mostafa Elhoushi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Minuet: Accelerating 3D Sparse Convolutions on GPUs",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2649,
    "paper_ids": [
      2069
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "James Gleeson 0001",
    "display_name": "James Gleeson",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Minuet: Accelerating 3D Sparse Convolutions on GPUs",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2650,
    "paper_ids": [
      2069
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zongpu Zhang",
    "display_name": "Zongpu Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HD-IOV: SW-HW Co-designed I/O Virtualization with Scalability and Flexibility for Hyper-Density Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2651,
    "paper_ids": [
      1681
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiangtao Chen",
    "display_name": "Jiangtao Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HD-IOV: SW-HW Co-designed I/O Virtualization with Scalability and Flexibility for Hyper-Density Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2652,
    "paper_ids": [
      1681
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Banghao Ying",
    "display_name": "Banghao Ying",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HD-IOV: SW-HW Co-designed I/O Virtualization with Scalability and Flexibility for Hyper-Density Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2653,
    "paper_ids": [
      1681
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yahui Cao",
    "display_name": "Yahui Cao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HD-IOV: SW-HW Co-designed I/O Virtualization with Scalability and Flexibility for Hyper-Density Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2654,
    "paper_ids": [
      1681
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lingyu Liu",
    "display_name": "Lingyu Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HD-IOV: SW-HW Co-designed I/O Virtualization with Scalability and Flexibility for Hyper-Density Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2655,
    "paper_ids": [
      1681
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jian Li 0021",
    "display_name": "Jian Li",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HD-IOV: SW-HW Co-designed I/O Virtualization with Scalability and Flexibility for Hyper-Density Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2656,
    "paper_ids": [
      1681
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xin Zeng",
    "display_name": "Xin Zeng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HD-IOV: SW-HW Co-designed I/O Virtualization with Scalability and Flexibility for Hyper-Density Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2657,
    "paper_ids": [
      1681
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junyuan Wang",
    "display_name": "Junyuan Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HD-IOV: SW-HW Co-designed I/O Virtualization with Scalability and Flexibility for Hyper-Density Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2658,
    "paper_ids": [
      1681
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weigang Li 0002",
    "display_name": "Weigang Li",
    "affiliation": "Intel Corporation, Shanghai, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HD-IOV: SW-HW Co-designed I/O Virtualization with Scalability and Flexibility for Hyper-Density Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2659,
    "paper_ids": [
      1681
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Songyuan Bai",
    "display_name": "Songyuan Bai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unison: A Parallel-Efficient and User-Transparent Network Simulation Kernel",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2660,
    "paper_ids": [
      996
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hao Zheng",
    "display_name": "Hao Zheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 0,
      "CHES": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SOSP": {},
      "ATC": {},
      "CHES": {},
      "NSDI": {
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unison: A Parallel-Efficient and User-Transparent Network Simulation Kernel",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "when p4 meets runtocompletion architecture",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "norma towards practical network load testing",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 2661,
    "paper_ids": [
      996
    ],
    "papers_without_artifact_ids": [
      2879,
      2883
    ]
  },
  {
    "name": "Xiaoliang Wang 0001",
    "display_name": "Xiaoliang Wang",
    "affiliation": "Nanjing University",
    "artifact_count": 1,
    "total_papers": 11,
    "total_papers_by_conf": {
      "EUROSYS": 4,
      "ATC": 1,
      "FAST": 2,
      "NSDI": 3,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 2,
        "2023": 1,
        "2024": 1
      },
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2018": 1,
        "2023": 1
      },
      "NSDI": {
        "2021": 1,
        "2025": 2
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 9.1,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unison: A Parallel-Efficient and User-Transparent Network Simulation Kernel",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enabling virtual priority in data center congestion control",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "marlin enabling highthroughput congestion control testing in largescale networks",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "when p4 meets runtocompletion architecture",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "pyrrha congestionrootbased flow control to eliminate headofline blocking in datacenter",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "cyberstar simple elastic and costeffective network functions management in cloud network at scale",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "alt breaking the wall between data layout and loop optimizations for deep learning compilation",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "fisc a largescale cloudnativeoriented file system",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "flor an open high performance rdma framework over heterogeneous rnics",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "accessing cloud with disaggregated softwaredefined router",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "uksm swift memory deduplication via hierarchical and adaptive memory region distilling",
        "conference": "FAST",
        "year": 2018
      }
    ],
    "author_id": 2662,
    "paper_ids": [
      996
    ],
    "papers_without_artifact_ids": [
      2876,
      2878,
      2879,
      2881,
      3730,
      2882,
      1064,
      1065,
      4806,
      3589
    ]
  },
  {
    "name": "Chang Liu 0001",
    "display_name": "Chang Liu",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unison: A Parallel-Efficient and User-Transparent Network Simulation Kernel",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pyrrha congestionrootbased flow control to eliminate headofline blocking in datacenter",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 2663,
    "paper_ids": [
      996
    ],
    "papers_without_artifact_ids": [
      2881
    ]
  },
  {
    "name": "Fu Xiao 0001",
    "display_name": "Fu Xiao",
    "affiliation": "Nanjing University of Posts and Telecommunications, School of Computer Science, Nanjing, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unison: A Parallel-Efficient and User-Transparent Network Simulation Kernel",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2664,
    "paper_ids": [
      996
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qiao Xiang",
    "display_name": "Qiao Xiang",
    "affiliation": "Xiamen University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 1,
      "FAST": 2,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SC": {},
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2023": 2
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unison: A Parallel-Efficient and User-Transparent Network Simulation Kernel",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diagnosing applicationnetwork anomalies for millions of ips in production clouds",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "more than capacity performanceoriented evolution of pangu in alibaba",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "fisc a largescale cloudnativeoriented file system",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "flor an open high performance rdma framework over heterogeneous rnics",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 2665,
    "paper_ids": [
      996
    ],
    "papers_without_artifact_ids": [
      1935,
      1063,
      1064,
      1065
    ]
  },
  {
    "name": "Wanchun Dou",
    "display_name": "Wanchun Dou",
    "affiliation": "Nanjing University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 3,
      "ATC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 2,
        "2024": 1
      },
      "ATC": {},
      "NSDI": {
        "2025": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unison: A Parallel-Efficient and User-Transparent Network Simulation Kernel",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enabling virtual priority in data center congestion control",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "marlin enabling highthroughput congestion control testing in largescale networks",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "when p4 meets runtocompletion architecture",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "pyrrha congestionrootbased flow control to eliminate headofline blocking in datacenter",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 2666,
    "paper_ids": [
      996
    ],
    "papers_without_artifact_ids": [
      2876,
      2878,
      2879,
      2881
    ]
  },
  {
    "name": "Thanathorn Sukprasert",
    "display_name": "Thanathorn Sukprasert",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the Limitations of Carbon-Aware Temporal and Spatial Workload Shifting in the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2667,
    "paper_ids": [
      3731
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abel Souza",
    "display_name": "Abel Souza",
    "affiliation": "Univ. of California - Santa Cruz",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the Limitations of Carbon-Aware Temporal and Spatial Workload Shifting in the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2668,
    "paper_ids": [
      3731
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Prashant J. Shenoy",
    "display_name": "Prashant J. Shenoy",
    "affiliation": "Univ. of Massachusetts Amherst",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 1,
      "ATC": 0,
      "FAST": 1,
      "NSDI": 3,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SC": {
        "2021": 1
      },
      "ATC": {},
      "FAST": {
        "2004": 1
      },
      "NSDI": {
        "2013": 1,
        "2006": 1,
        "2007": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the Limitations of Carbon-Aware Temporal and Spatial Workload Shifting in the Cloud",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the hidden cost of the edge a performance comparison of edge and cloud latencies",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "yank enabling green data centers to pull the plug",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "blackbox and graybox strategies for virtual machine migration",
        "conference": "NSDI",
        "year": 2007
      },
      {
        "title": "presto feedbackdriven data management in sensor networks",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "a performance comparison of nfs and iscsi for ipnetworked storage",
        "conference": "FAST",
        "year": 2004
      }
    ],
    "author_id": 2669,
    "paper_ids": [
      3731
    ],
    "papers_without_artifact_ids": [
      4807,
      3733,
      4808,
      4809,
      4810
    ]
  },
  {
    "name": "Daniel Mendoza",
    "display_name": "Daniel Mendoza",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Model Selection for Latency-Critical Inference Serving",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "interferenceaware scheduling for inference serving",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 2670,
    "paper_ids": [
      4811
    ],
    "papers_without_artifact_ids": [
      4812
    ]
  },
  {
    "name": "Francisco Romero",
    "display_name": "Francisco Romero",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Model Selection for Latency-Critical Inference Serving",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "interferenceaware scheduling for inference serving",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 2671,
    "paper_ids": [
      4811
    ],
    "papers_without_artifact_ids": [
      4812
    ]
  },
  {
    "name": "Caroline Trippel",
    "display_name": "Caroline Trippel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Model Selection for Latency-Critical Inference Serving",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2672,
    "paper_ids": [
      4811
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guodong Liu",
    "display_name": "Guodong Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aceso: Efficient Parallel DNN Training through Iterative Bottleneck Alleviation",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2673,
    "paper_ids": [
      148
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhiqi Lin",
    "display_name": "Zhiqi Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "NSDI": {
        "2025": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aceso: Efficient Parallel DNN Training through Iterative Bottleneck Alleviation",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "autoccl automated collective communication tuning for accelerating distributed and parallel dnn training",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "nnscaler constraintguided parallelization plan generation for deep learning training",
        "conference": "OSDI",
        "year": 2024
      }
    ],
    "author_id": 2674,
    "paper_ids": [
      148
    ],
    "papers_without_artifact_ids": [
      3734,
      158
    ]
  },
  {
    "name": "Xiaoxiang Shi",
    "display_name": "Xiaoxiang Shi",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aceso: Efficient Parallel DNN Training through Iterative Bottleneck Alleviation",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2675,
    "paper_ids": [
      148
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Saeed Maleki",
    "display_name": "Saeed Maleki",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "NSDI": {
        "2023": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aceso: Efficient Parallel DNN Training through Iterative Bottleneck Alleviation",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "nnscaler constraintguided parallelization plan generation for deep learning training",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "taccl guiding collective algorithm synthesis using communication sketches",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 2676,
    "paper_ids": [
      148
    ],
    "papers_without_artifact_ids": [
      158,
      2687
    ]
  },
  {
    "name": "Yungang Bao",
    "display_name": "Yungang Bao",
    "affiliation": "Chinese Academy of Sciences",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SC": {},
      "ATC": {},
      "NSDI": {
        "2021": 1,
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aceso: Efficient Parallel DNN Training through Iterative Bottleneck Alleviation",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "autosketch automatic sketchoriented compiler for querydriven network telemetry",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "toward nearlyzeroerror sketching via compressive sensing",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 2677,
    "paper_ids": [
      148
    ],
    "papers_without_artifact_ids": [
      3526,
      3527
    ]
  },
  {
    "name": "Sa Wang",
    "display_name": "Sa Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aceso: Efficient Parallel DNN Training through Iterative Bottleneck Alleviation",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2678,
    "paper_ids": [
      148
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sumer Kohli",
    "display_name": "Sumer Kohli",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pronghorn: Effective Checkpoint Orchestration for Serverless Hot-Starts",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2679,
    "paper_ids": [
      1976
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shreyas Kharbanda",
    "display_name": "Shreyas Kharbanda",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pronghorn: Effective Checkpoint Orchestration for Serverless Hot-Starts",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "alwayson recording framework for serverless computations opportunities and challenges",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 2680,
    "paper_ids": [
      1976
    ],
    "papers_without_artifact_ids": [
      1977
    ]
  },
  {
    "name": "Rodrigo Bruno",
    "display_name": "Rodrigo Bruno",
    "affiliation": "Universidade de Lisboa",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SOSP": 1,
      "SC": 0,
      "ATC": 0,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      },
      "SOSP": {
        "2023": 1
      },
      "SC": {},
      "ATC": {},
      "NSDI": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pronghorn: Effective Checkpoint Orchestration for Serverless Hot-Starts",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mosaic optimizing cloud resource efficiency with lazilypackaged application modules",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "granny granular management of computeintensive applications in the cloud",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "evicting for the greater good the case for reactive checkpointing in serverless computing",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 2681,
    "paper_ids": [
      1976
    ],
    "papers_without_artifact_ids": [
      4813,
      1391,
      1986
    ]
  },
  {
    "name": "João Carreira",
    "display_name": "João Carreira",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pronghorn: Effective Checkpoint Orchestration for Serverless Hot-Starts",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7984,
    "paper_ids": [
      1976
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shiwei Zhang 0002",
    "display_name": "Shiwei Zhang",
    "affiliation": "University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HAP: SPMD DNN Training on Heterogeneous GPU Clusters with Automated Program Synthesis",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2683,
    "paper_ids": [
      2855
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lansong Diao",
    "display_name": "Lansong Diao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HAP: SPMD DNN Training on Heterogeneous GPU Clusters with Automated Program Synthesis",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "disc a dynamic shape compiler for machine learning workloads",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 2684,
    "paper_ids": [
      2855
    ],
    "papers_without_artifact_ids": [
      2859
    ]
  },
  {
    "name": "Zongyan Cao",
    "display_name": "Zongyan Cao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HAP: SPMD DNN Training on Heterogeneous GPU Clusters with Automated Program Synthesis",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2685,
    "paper_ids": [
      2855
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Siyu Wang",
    "display_name": "Siyu Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HAP: SPMD DNN Training on Heterogeneous GPU Clusters with Automated Program Synthesis",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2686,
    "paper_ids": [
      2855
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Suyash Mahar",
    "display_name": "Suyash Mahar",
    "affiliation": "University of California, San Diego",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Puddles: Application-Independent Recovery and Location-Independent Data for Persistent Memory",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2687,
    "paper_ids": [
      3735
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingyao Shen",
    "display_name": "Mingyao Shen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Puddles: Application-Independent Recovery and Location-Independent Data for Persistent Memory",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "can systems explain permissions better understanding users misperceptions under smartphone runtime permission model",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 2688,
    "paper_ids": [
      3735
    ],
    "papers_without_artifact_ids": [
      3707
    ]
  },
  {
    "name": "TJ Smith",
    "display_name": "TJ Smith",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Puddles: Application-Independent Recovery and Location-Independent Data for Persistent Memory",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2689,
    "paper_ids": [
      3735
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joseph Izraelevitz",
    "display_name": "Joseph Izraelevitz",
    "affiliation": "University of Colorado Boulder",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1,
      "FAST": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2020": 1,
        "2019": 1
      },
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Puddles: Application-Independent Recovery and Location-Independent Data for Persistent Memory",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "zhuque failure is not an option its an exception",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "an empirical guide to the behavior and use of scalable persistent memory",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "filemr rethinking rdma networking for scalable persistent memory",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "orion a distributed file system for nonvolatile main memory and rdmacapable networks",
        "conference": "FAST",
        "year": 2019
      }
    ],
    "author_id": 2690,
    "paper_ids": [
      3735
    ],
    "papers_without_artifact_ids": [
      3736,
      3737,
      3738,
      3739
    ]
  },
  {
    "name": "Zhifeng Jiang 0001",
    "display_name": "Zhifeng Jiang",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dordis: Efficient Federated Learning with Dropout-Resilient Differential Privacy",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lotto secure participant selection against adversarial servers in federated learning",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 2691,
    "paper_ids": [
      2800
    ],
    "papers_without_artifact_ids": [
      2803
    ]
  },
  {
    "name": "Chenyu Jiang 0002",
    "display_name": "Chenyu Jiang",
    "affiliation": "University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DynaPipe: Optimizing Multi-task Training through Dynamic Pipelines",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2692,
    "paper_ids": [
      2650
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Foteini Strati",
    "display_name": "Foteini Strati",
    "affiliation": "ETH Zurich",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 3,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1,
        "2024": 2
      },
      "SOSP": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Orion: Interference-aware, Fine-grained GPU Sharing for ML Applications",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ml training with cloud gpu shortages is crossregion the answer",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "towards a platform and benchmark suite for model training on dynamic datasets",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 2693,
    "paper_ids": [
      1665
    ],
    "papers_without_artifact_ids": [
      1668,
      1670
    ]
  },
  {
    "name": "Xianzhe Ma",
    "display_name": "Xianzhe Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Orion: Interference-aware, Fine-grained GPU Sharing for ML Applications",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2694,
    "paper_ids": [
      1665
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ahmad Faraz Khan 0001",
    "display_name": "Ahmad Faraz Khan",
    "affiliation": "University of Kentucky",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLOAT: Federated Learning Optimizations with Automated Tuning",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2695,
    "paper_ids": [
      3682
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Azal Ahmad Khan",
    "display_name": "Azal Ahmad Khan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLOAT: Federated Learning Optimizations with Automated Tuning",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2696,
    "paper_ids": [
      3682
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Samuel Fountain",
    "display_name": "Samuel Fountain",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLOAT: Federated Learning Optimizations with Automated Tuning",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2697,
    "paper_ids": [
      3682
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ali Raza Butt",
    "display_name": "Ali Raza Butt",
    "affiliation": "Virginia Tech",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0,
      "FAST": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SC": {},
      "ATC": {},
      "FAST": {
        "2018": 1,
        "2023": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLOAT: Federated Learning Optimizations with Automated Tuning",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shade enable fundamental cacheability for distributed deep learning training",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "improving docker registry design based on production workload analysis",
        "conference": "FAST",
        "year": 2018
      }
    ],
    "author_id": 2698,
    "paper_ids": [
      3682
    ],
    "papers_without_artifact_ids": [
      4814,
      4815
    ]
  },
  {
    "name": "Ali Anwar 0001",
    "display_name": "Ali Anwar",
    "affiliation": "University of Minnesota",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 1,
      "ATC": 0,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1
      },
      "SC": {
        "2021": 1
      },
      "ATC": {},
      "FAST": {
        "2021": 1,
        "2020": 1,
        "2018": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLOAT: Federated Learning Optimizations with Automated Tuning",
        "conference": "EUROSYS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cnsbench a cloud native storage benchmark",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "fedat a highperformance and communicationefficient federated learning system with asynchronous tiers",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "infinicache exploiting ephemeral serverless functions to build a costeffective memory cache",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "improving docker registry design based on production workload analysis",
        "conference": "FAST",
        "year": 2018
      }
    ],
    "author_id": 2699,
    "paper_ids": [
      3682
    ],
    "papers_without_artifact_ids": [
      4816,
      4817,
      3498,
      4815
    ]
  },
  {
    "name": "Haoze Song",
    "display_name": "Haoze Song",
    "affiliation": "Univ. of Maryland - Baltimore County",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "FAST": {
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Achieving low tail-latency and high scalability for serializable transactions in edge computing",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dmtree towards efficient tree indexing on disaggregated memory via computeside collaborative design",
        "conference": "FAST",
        "year": 2026
      }
    ],
    "author_id": 2700,
    "paper_ids": [
      1604
    ],
    "papers_without_artifact_ids": [
      1661
    ]
  },
  {
    "name": "Chaoyi Ruan",
    "display_name": "Chaoyi Ruan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Achieving low tail-latency and high scalability for serializable transactions in edge computing",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "spandb a fast costeffective lsmtree based kv store on hybrid storage",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2701,
    "paper_ids": [
      1604
    ],
    "papers_without_artifact_ids": [
      1607
    ]
  },
  {
    "name": "Reynold Cheng",
    "display_name": "Reynold Cheng",
    "affiliation": "University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {},
      "PETS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Achieving low tail-latency and high scalability for serializable transactions in edge computing",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2702,
    "paper_ids": [
      1604
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mugilan Mariappan",
    "display_name": "Mugilan Mariappan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DZiG: sparsity-aware incremental processing of streaming graphs",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2703,
    "paper_ids": [
      3747
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joanna Che",
    "display_name": "Joanna Che",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DZiG: sparsity-aware incremental processing of streaming graphs",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "contigra graph mining with containment constraints",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 2704,
    "paper_ids": [
      3747
    ],
    "papers_without_artifact_ids": [
      3748
    ]
  },
  {
    "name": "Yijun Ma",
    "display_name": "Yijun Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Zeus: locality-aware distributed transactions",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2705,
    "paper_ids": [
      3750
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhaowei Tan",
    "display_name": "Zhaowei Tan",
    "affiliation": "Univ. of California - Riverside",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "NSDI": {
        "2021": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Zeus: locality-aware distributed transactions",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "celldam userspace rootless detection and mitigation for 5g data plane",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "devicebased lte latency reduction at the application layer",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 2706,
    "paper_ids": [
      3750
    ],
    "papers_without_artifact_ids": [
      4818,
      4819
    ]
  },
  {
    "name": "Andrew Bainbridge",
    "display_name": "Andrew Bainbridge",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Zeus: locality-aware distributed transactions",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2707,
    "paper_ids": [
      3750
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matthew Balkwill",
    "display_name": "Matthew Balkwill",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Zeus: locality-aware distributed transactions",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2708,
    "paper_ids": [
      3750
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aleksandar Dragojevic",
    "display_name": "Aleksandar Dragojevic",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "SOSP": {},
      "ATC": {},
      "NSDI": {
        "2014": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Zeus: locality-aware distributed transactions",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "farm fast remote memory",
        "conference": "NSDI",
        "year": 2014
      }
    ],
    "author_id": 2709,
    "paper_ids": [
      3750
    ],
    "papers_without_artifact_ids": [
      4820
    ]
  },
  {
    "name": "Boris Grot",
    "display_name": "Boris Grot",
    "affiliation": "University of Edinburgh",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 3,
      "SOSP": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2023": 1,
        "2021": 1
      },
      "SOSP": {
        "2023": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Zeus: locality-aware distributed transactions",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shattering the ephemeral storage cost barrier for dataintensive serverless workflows",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "saba rethinking datacenter network allocation from applications perspective",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "enabling invitro serverless systems research",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "bankrupt covert channel turning network predictability into vulnerability",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 2710,
    "paper_ids": [
      3750
    ],
    "papers_without_artifact_ids": [
      4625,
      4821,
      1672,
      4822
    ]
  },
  {
    "name": "Bozidar Radunovic",
    "display_name": "Bozidar Radunovic",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "NSDI": {
        "2025": 1,
        "2012": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Zeus: locality-aware distributed transactions",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards energy efficient 5g vran servers",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "wifinc wifi over narrow channels",
        "conference": "NSDI",
        "year": 2012
      }
    ],
    "author_id": 2711,
    "paper_ids": [
      3750
    ],
    "papers_without_artifact_ids": [
      4823,
      3799
    ]
  },
  {
    "name": "Yongguang Zhang",
    "display_name": "Yongguang Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "USENIXSEC": 0,
      "NSDI": 4
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "USENIXSEC": {},
      "NSDI": {
        "2013": 2,
        "2009": 1,
        "2011": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Zeus: locality-aware distributed transactions",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vedge fast selfconstructive power modeling of smartphones based on battery voltage dynamics",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "walkiemarkie indoor pathway mapping made easy",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "serverswitch a programmable and high performance platform for data center networks",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "sora high performance software radio using general purpose multicore processors",
        "conference": "NSDI",
        "year": 2009
      }
    ],
    "author_id": 2712,
    "paper_ids": [
      3750
    ],
    "papers_without_artifact_ids": [
      4824,
      4825,
      4598,
      4826
    ]
  },
  {
    "name": "Abhinav Jangda",
    "display_name": "Abhinav Jangda",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Accelerating graph sampling for graph machine learning using GPUs",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2713,
    "paper_ids": [
      3703
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sandeep Polisetty",
    "display_name": "Sandeep Polisetty",
    "affiliation": "University of Massachusetts Amherst",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Accelerating graph sampling for graph machine learning using GPUs",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2714,
    "paper_ids": [
      3703
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arjun Guha",
    "display_name": "Arjun Guha",
    "affiliation": "Northeastern University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "SC": {},
      "ATC": {},
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Accelerating graph sampling for graph machine learning using GPUs",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2715,
    "paper_ids": [
      3703
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Brian Choi",
    "display_name": "Brian Choi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding and dealing with hard faults in persistent memory systems",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2716,
    "paper_ids": [
      4827
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Randal C. Burns",
    "display_name": "Randal C. Burns",
    "affiliation": "Johns Hopkins University",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0,
      "FAST": 6
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "SC": {},
      "ATC": {},
      "FAST": {
        "2009": 1,
        "2008": 1,
        "2015": 1,
        "2005": 1,
        "2012": 1,
        "2007": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding and dealing with hard faults in persistent memory systems",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flashgraph processing billionnode graphs on an array of commodity ssds",
        "conference": "FAST",
        "year": 2015
      },
      {
        "title": "rethinking erasure codes for cloud file systems minimizing io for recovery and degraded reads",
        "conference": "FAST",
        "year": 2012
      },
      {
        "title": "canfs a congestionaware network file system",
        "conference": "FAST",
        "year": 2009
      },
      {
        "title": "awol an adaptive write optimizations layer",
        "conference": "FAST",
        "year": 2008
      },
      {
        "title": "design and implementation of verifiable audit trails for a versioning file system",
        "conference": "FAST",
        "year": 2007
      },
      {
        "title": "secure deletion for a versioning file system",
        "conference": "FAST",
        "year": 2005
      }
    ],
    "author_id": 2717,
    "paper_ids": [
      4827
    ],
    "papers_without_artifact_ids": [
      4738,
      4828,
      4829,
      4830,
      4831,
      4832
    ]
  },
  {
    "name": "Peng Huang",
    "display_name": "Peng Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding and dealing with hard faults in persistent memory systems",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2718,
    "paper_ids": [
      4827
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tatiana Jin",
    "display_name": "Tatiana Jin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Seastar: vertex-centric programming for graph neural networks",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2719,
    "paper_ids": [
      2661
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Boyang Li 0016",
    "display_name": "Boyang Li",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Seastar: vertex-centric programming for graph neural networks",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2720,
    "paper_ids": [
      2661
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chengguang Zheng",
    "display_name": "Chengguang Zheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Seastar: vertex-centric programming for graph neural networks",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2721,
    "paper_ids": [
      2661
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nan Deng",
    "display_name": "Nan Deng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Take it to the limit: peak prediction-driven resource overcommitment in datacenters",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a case for task sampling based learning for cluster job scheduling",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 2722,
    "paper_ids": [
      3732
    ],
    "papers_without_artifact_ids": [
      4833
    ]
  },
  {
    "name": "Krzysztof Rzadca",
    "display_name": "Krzysztof Rzadca",
    "affiliation": "University of Warsaw",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Take it to the limit: peak prediction-driven resource overcommitment in datacenters",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2723,
    "paper_ids": [
      3732
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sree Kodak",
    "display_name": "Sree Kodak",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Take it to the limit: peak prediction-driven resource overcommitment in datacenters",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2724,
    "paper_ids": [
      3732
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rohit Jnagal",
    "display_name": "Rohit Jnagal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Take it to the limit: peak prediction-driven resource overcommitment in datacenters",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2725,
    "paper_ids": [
      3732
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Konstantinos Mamouras",
    "display_name": "Konstantinos Mamouras",
    "affiliation": "Rice University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PaSh: light-touch data-parallel shell processing",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2726,
    "paper_ids": [
      3550
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Achilles Benetopoulos",
    "display_name": "Achilles Benetopoulos",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PaSh: light-touch data-parallel shell processing",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2727,
    "paper_ids": [
      3550
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christian Priebe",
    "display_name": "Christian Priebe",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {},
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "rkt-io: a direct I/O stack for shielded execution",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2728,
    "paper_ids": [
      1386
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vasilis Gavrielatos",
    "display_name": "Vasilis Gavrielatos",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 2
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Odyssey: the impact of modern hardware on strongly-consistent replication protocols",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards the synthesis of coherencereplication protocols from consistency models via realtime orderings",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 2729,
    "paper_ids": [
      3751
    ],
    "papers_without_artifact_ids": [
      4834
    ]
  },
  {
    "name": "Vijay Nagarajan",
    "display_name": "Vijay Nagarajan",
    "affiliation": "University of Utah",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 2
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Odyssey: the impact of modern hardware on strongly-consistent replication protocols",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards the synthesis of coherencereplication protocols from consistency models via realtime orderings",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 2730,
    "paper_ids": [
      3751
    ],
    "papers_without_artifact_ids": [
      4834
    ]
  },
  {
    "name": "Djob Mvondo",
    "display_name": "Djob Mvondo",
    "affiliation": "University of Edinburgh",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "SOSP": {
        "2023": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OFC: an opportunistic caching system for FaaS platforms",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "disc backpressure mitigation in multitier applications with distributed shared connection",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "takeaways of implementing a native rust udp tunneling network driver in the linux kernel",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 2731,
    "paper_ids": [
      4835
    ],
    "papers_without_artifact_ids": [
      4836,
      4837
    ]
  },
  {
    "name": "Mathieu Bacou",
    "display_name": "Mathieu Bacou",
    "affiliation": "Télécom SudParis",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OFC: an opportunistic caching system for FaaS platforms",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2732,
    "paper_ids": [
      4835
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kevin Nguetchouang",
    "display_name": "Kevin Nguetchouang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OFC: an opportunistic caching system for FaaS platforms",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2733,
    "paper_ids": [
      4835
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lucien Ngale",
    "display_name": "Lucien Ngale",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OFC: an opportunistic caching system for FaaS platforms",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2734,
    "paper_ids": [
      4835
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stéphane Pouget",
    "display_name": "Stéphane Pouget",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OFC: an opportunistic caching system for FaaS platforms",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7985,
    "paper_ids": [
      4835
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Josiane Kouam",
    "display_name": "Josiane Kouam",
    "affiliation": "INRIA, Ecole Polytechnique-IPP",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OFC: an opportunistic caching system for FaaS platforms",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2736,
    "paper_ids": [
      4835
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Renaud Lachaize",
    "display_name": "Renaud Lachaize",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {},
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OFC: an opportunistic caching system for FaaS platforms",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "disc backpressure mitigation in multitier applications with distributed shared connection",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 2737,
    "paper_ids": [
      4835
    ],
    "papers_without_artifact_ids": [
      4836
    ]
  },
  {
    "name": "Jinho Hwang",
    "display_name": "Jinho Hwang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "SC": {},
      "NSDI": {
        "2014": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OFC: an opportunistic caching system for FaaS platforms",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "netvm high performance and flexible networking using virtualization on commodity platforms",
        "conference": "NSDI",
        "year": 2014
      }
    ],
    "author_id": 2738,
    "paper_ids": [
      4835
    ],
    "papers_without_artifact_ids": [
      4838
    ]
  },
  {
    "name": "Tim Wood 0006",
    "display_name": "Tim Wood",
    "affiliation": "George Washington University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OFC: an opportunistic caching system for FaaS platforms",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2739,
    "paper_ids": [
      4835
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Hagimont",
    "display_name": "Daniel Hagimont",
    "affiliation": "University of Toulouse",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 2
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OFC: an opportunistic caching system for FaaS platforms",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "disc backpressure mitigation in multitier applications with distributed shared connection",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "mitigating vulnerability windows with hypervisor transplant",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 2740,
    "paper_ids": [
      4835
    ],
    "papers_without_artifact_ids": [
      4836,
      4839
    ]
  },
  {
    "name": "Noël De Palma",
    "display_name": "Noël De Palma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OFC: an opportunistic caching system for FaaS platforms",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7986,
    "paper_ids": [
      4835
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bernabé Batchakui",
    "display_name": "Bernabé Batchakui",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OFC: an opportunistic caching system for FaaS platforms",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7987,
    "paper_ids": [
      4835
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alain Tchana",
    "display_name": "Alain Tchana",
    "affiliation": "Grenoble INP",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "EUROSYS": 3,
      "SC": 0,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2021": 2
      },
      "SC": {},
      "ATC": {},
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OFC: an opportunistic caching system for FaaS platforms",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "disc backpressure mitigation in multitier applications with distributed shared connection",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "trackiops realtime nfs performance metrics extractor",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "mitigating vulnerability windows with hypervisor transplant",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 2743,
    "paper_ids": [
      4835
    ],
    "papers_without_artifact_ids": [
      4836,
      4790,
      4839
    ]
  },
  {
    "name": "Sixiang Ma",
    "display_name": "Sixiang Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {},
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Finding heterogeneous-unsafe configuration parameters in cloud systems",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2744,
    "paper_ids": [
      3677
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fang Zhou",
    "display_name": "Fang Zhou",
    "affiliation": "The Ohio State University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Finding heterogeneous-unsafe configuration parameters in cloud systems",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "owl scale and flexibility in distribution of hot content",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 2745,
    "paper_ids": [
      3677
    ],
    "papers_without_artifact_ids": [
      4840
    ]
  },
  {
    "name": "Zhen Xie",
    "display_name": "Zhen Xie",
    "affiliation": "Binghamton University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "SC": {},
      "ATC": {
        "2024": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tahoe: tree structure-aware high performance inference engine for decision tree ensemble on GPU",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "centimani enabling fast ai accelerator selection for dnn training with a novel performance predictor",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 2746,
    "paper_ids": [
      3586
    ],
    "papers_without_artifact_ids": [
      4805
    ]
  },
  {
    "name": "Wenqian Dong",
    "display_name": "Wenqian Dong",
    "affiliation": "Oregon State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tahoe: tree structure-aware high performance inference engine for decision tree ensemble on GPU",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2747,
    "paper_ids": [
      3586
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiawen Liu",
    "display_name": "Jiawen Liu",
    "affiliation": "University of California, Merced",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tahoe: tree structure-aware high performance inference engine for decision tree ensemble on GPU",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2748,
    "paper_ids": [
      3586
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dong Li 0001",
    "display_name": "Dong Li",
    "affiliation": "Univ. of California - Merced",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SC": 0,
      "ATC": 2,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2021": 1
      },
      "SC": {},
      "ATC": {
        "2022": 1,
        "2024": 1
      },
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tahoe: tree structure-aware high performance inference engine for decision tree ensemble on GPU",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flexmem adaptive page profiling and migration for tiered memory",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "mtm rethinking memory profiling and migration for multitiered large memory",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "campo costaware performance optimization for mixedprecision neural network training",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "archtm architectureaware high performance transaction for persistent memory",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2749,
    "paper_ids": [
      3586
    ],
    "papers_without_artifact_ids": [
      4841,
      4842,
      4843,
      4844
    ]
  },
  {
    "name": "Frank Cangialosi",
    "display_name": "Frank Cangialosi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Site-to-site internet traffic control",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privid practical privacypreserving video analytics queries",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 2750,
    "paper_ids": [
      3755
    ],
    "papers_without_artifact_ids": [
      2624
    ]
  },
  {
    "name": "Akshay Narayan 0001",
    "display_name": "Akshay Narayan",
    "affiliation": "Brown University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Site-to-site internet traffic control",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2751,
    "paper_ids": [
      3755
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Prateesh Goyal",
    "display_name": "Prateesh Goyal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "NSDI": {
        "2023": 1,
        "2020": 1,
        "2022": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Site-to-site internet traffic control",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scalable tail latency estimation for data center networks",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "backpressure flow control",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "abc a simple explicit congestion controller for wireless networks",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 2752,
    "paper_ids": [
      3755
    ],
    "papers_without_artifact_ids": [
      3719,
      3720,
      2628
    ]
  },
  {
    "name": "Radhika Mittal",
    "display_name": "Radhika Mittal",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 6
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "NSDI": {
        "2021": 1,
        "2014": 1,
        "2023": 2,
        "2016": 1,
        "2020": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Site-to-site internet traffic control",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "channelaware 5g ran slicing with customizable schedulers",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "enabling users to control their internet",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "on the use of ml for blackbox system performance prediction",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "high throughput cryptocurrency routing in payment channel networks",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "universal packet scheduling",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "recursively cautious congestion control",
        "conference": "NSDI",
        "year": 2014
      }
    ],
    "author_id": 2753,
    "paper_ids": [
      3755
    ],
    "papers_without_artifact_ids": [
      4845,
      4846,
      4656,
      3760,
      2763,
      4608
    ]
  },
  {
    "name": "Hari Balakrishnan",
    "display_name": "Hari Balakrishnan",
    "affiliation": "Massachusetts Inst. of Technology",
    "artifact_count": 1,
    "total_papers": 21,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 0,
      "USENIXSEC": 0,
      "NSDI": 20,
      "PETS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "SOSP": {},
      "ATC": {},
      "USENIXSEC": {},
      "NSDI": {
        "2013": 1,
        "2009": 2,
        "2014": 1,
        "2017": 2,
        "2019": 1,
        "2006": 1,
        "2016": 1,
        "2020": 2,
        "2008": 1,
        "2005": 2,
        "2004": 3,
        "2018": 2,
        "2011": 1
      },
      "PETS": {},
      "OSDI": {}
    },
    "artifact_rate": 4.8,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Site-to-site internet traffic control",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "abc a simple explicit congestion controller for wireless networks",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "rfocus beamforming using thousands of passive antennas",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "shenango achieving high cpu efficiency for latencysensitive datacenter workloads",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "copa practical delaybased congestion control for the internet",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "vesper measuring timetointeractivity for web pages",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "flowtune flowlet control for datacenter networks",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "flexplane an experimentation platform for resource management in datacenters",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "polaris faster page loads using finegrained dependency tracking",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "building web applications on top of encrypted data using mylar",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "stochastic forecasts achieve high throughput and low delay over cellular networks",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "accurate lowenergy trajectory mapping for mobile devices",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "wishbone profilebased partitioning for sensornet applications",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "notabot improving service availability in the face of botnet attacks",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "harnessing exposed terminals in wireless networks",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "distributed quota enforcement for spam control",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "improving web availability for clients with monet",
        "conference": "NSDI",
        "year": 2005
      },
      {
        "title": "detecting bgp configuration faults with static analysis awarded best paper",
        "conference": "NSDI",
        "year": 2005
      },
      {
        "title": "contractbased load management in federated distributed systems",
        "conference": "NSDI",
        "year": 2004
      },
      {
        "title": "untangling the web from dns",
        "conference": "NSDI",
        "year": 2004
      },
      {
        "title": "overqos an overlay based architecture for enhancing internet qos",
        "conference": "NSDI",
        "year": 2004
      }
    ],
    "author_id": 2755,
    "paper_ids": [
      3755
    ],
    "papers_without_artifact_ids": [
      2628,
      4847,
      2643,
      4848,
      2629,
      4849,
      3457,
      2631,
      683,
      4624,
      4850,
      4851,
      3479,
      4852,
      2873,
      1301,
      3384,
      4853,
      2874,
      522
    ]
  },
  {
    "name": "Simon Kuenzer",
    "display_name": "Simon Kuenzer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unikraft: fast, specialized unikernels the easy way",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2756,
    "paper_ids": [
      3687
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vlad-Andrei Badoiu",
    "display_name": "Vlad-Andrei Badoiu",
    "affiliation": "Universitatea Politehnica of Bucharest",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "SOSP": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unikraft: fast, specialized unikernels the easy way",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "civscope analyzing potential memory corruption bugs in compartment interfaces",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 2757,
    "paper_ids": [
      3687
    ],
    "papers_without_artifact_ids": [
      4792
    ]
  },
  {
    "name": "Hugo Lefeuvre",
    "display_name": "Hugo Lefeuvre",
    "affiliation": "The University of Manchester",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "SOSP": {
        "2023": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unikraft: fast, specialized unikernels the easy way",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "software compartmentalization tradeoffs with hardware capabilities",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "civscope analyzing potential memory corruption bugs in compartment interfaces",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 2758,
    "paper_ids": [
      3687
    ],
    "papers_without_artifact_ids": [
      4791,
      4792
    ]
  },
  {
    "name": "Sharan Santhanam",
    "display_name": "Sharan Santhanam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unikraft: fast, specialized unikernels the easy way",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "syslrn learning what to monitor for efficient anomaly detection",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 2759,
    "paper_ids": [
      3687
    ],
    "papers_without_artifact_ids": [
      4854
    ]
  },
  {
    "name": "Alexander Jung 0002",
    "display_name": "Alexander Jung",
    "affiliation": "Lancaster University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unikraft: fast, specialized unikernels the easy way",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2760,
    "paper_ids": [
      3687
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gaulthier Gain",
    "display_name": "Gaulthier Gain",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unikraft: fast, specialized unikernels the easy way",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2761,
    "paper_ids": [
      3687
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cyril Soldani",
    "display_name": "Cyril Soldani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unikraft: fast, specialized unikernels the easy way",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2762,
    "paper_ids": [
      3687
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stefan Teodorescu",
    "display_name": "Stefan Teodorescu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unikraft: fast, specialized unikernels the easy way",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2763,
    "paper_ids": [
      3687
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Costi Raducanu",
    "display_name": "Costi Raducanu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unikraft: fast, specialized unikernels the easy way",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2764,
    "paper_ids": [
      3687
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cristian Banu",
    "display_name": "Cristian Banu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unikraft: fast, specialized unikernels the easy way",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2765,
    "paper_ids": [
      3687
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Laurent Mathy",
    "display_name": "Laurent Mathy",
    "affiliation": "Universit de Lige, Belgium",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unikraft: fast, specialized unikernels the easy way",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2766,
    "paper_ids": [
      3687
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Felipe Huici",
    "display_name": "Felipe Huici",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0,
      "NSDI": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "SOSP": {},
      "NSDI": {
        "2014": 1,
        "2019": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unikraft: fast, specialized unikernels the easy way",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flowblaze stateful packet processing in hardware",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "clickos and the art of network function virtualization",
        "conference": "NSDI",
        "year": 2014
      }
    ],
    "author_id": 2767,
    "paper_ids": [
      3687
    ],
    "papers_without_artifact_ids": [
      4855,
      3693
    ]
  },
  {
    "name": "Rubaba Hasan",
    "display_name": "Rubaba Hasan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TraceSplitter: a new paradigm for downscaling traces",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2768,
    "paper_ids": [
      2125
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alex Markuze",
    "display_name": "Alex Markuze",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Characterizing, exploiting, and detecting DMA code injection vulnerabilities in the presence of an IOMMU",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2769,
    "paper_ids": [
      3765
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shay Vargaftik",
    "display_name": "Shay Vargaftik",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1,
        "2022": 1
      },
      "NSDI": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Characterizing, exploiting, and detecting DMA code injection vulnerabilities in the presence of an IOMMU",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "optireduce resilient and tailoptimal allreduce for distributed deep learning in the cloud",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "thc accelerating distributed deep learning using tensor homomorphic compression",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "efficient multiclass classification with duet",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 2770,
    "paper_ids": [
      3765
    ],
    "papers_without_artifact_ids": [
      3446,
      4856,
      4857
    ]
  },
  {
    "name": "Gil Kupfer",
    "display_name": "Gil Kupfer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Characterizing, exploiting, and detecting DMA code injection vulnerabilities in the presence of an IOMMU",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2771,
    "paper_ids": [
      3765
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Boris Pismenny",
    "display_name": "Boris Pismenny",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Characterizing, exploiting, and detecting DMA code injection vulnerabilities in the presence of an IOMMU",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shring networking with shared receive rings",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 2772,
    "paper_ids": [
      3765
    ],
    "papers_without_artifact_ids": [
      3769
    ]
  },
  {
    "name": "Shegufta Bakht Ahsan",
    "display_name": "Shegufta Bakht Ahsan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Home, safehome: smart home reliability with visibility and atomicity",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2773,
    "paper_ids": [
      3664
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rui Yang 0034",
    "display_name": "Rui Yang",
    "affiliation": "Google, Mountain View, CA, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Home, safehome: smart home reliability with visibility and atomicity",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2774,
    "paper_ids": [
      3664
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shadi A. Noghabi",
    "display_name": "Shadi A. Noghabi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 2,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "NSDI": {
        "2023": 2
      },
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Home, safehome: smart home reliability with visibility and atomicity",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "doing more with less orchestrating serverless applications without an orchestrator",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "unlocking unallocated cloud capacity for long uninterruptible workloads",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "blockflex enabling storage harvesting with softwaredefined flash in modern cloud platforms",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 2775,
    "paper_ids": [
      3664
    ],
    "papers_without_artifact_ids": [
      3536,
      4858,
      3468
    ]
  },
  {
    "name": "Ramachandra Pai",
    "display_name": "Ramachandra Pai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2776,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sukadev Bhattiprolu",
    "display_name": "Sukadev Bhattiprolu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2777,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rick Boivie",
    "display_name": "Rick Boivie",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2778,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Laurent Dufour",
    "display_name": "Laurent Dufour",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2779,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Brad Frey",
    "display_name": "Brad Frey",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2780,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohit Kapur",
    "display_name": "Mohit Kapur",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2781,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kenneth A. Goldman",
    "display_name": "Kenneth A. Goldman",
    "affiliation": "Thomas J. Watson Research Center, Yorktown Heights, NY, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2782,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ryan Grimm",
    "display_name": "Ryan Grimm",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2783,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Janani Janakirman",
    "display_name": "Janani Janakirman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2784,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "John M. Ludden",
    "display_name": "John M. Ludden",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2785,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Paul Mackerras",
    "display_name": "Paul Mackerras",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2786,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cathy May",
    "display_name": "Cathy May",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2787,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Elaine R. Palmer",
    "display_name": "Elaine R. Palmer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2788,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bharata Bhasker Rao",
    "display_name": "Bharata Bhasker Rao",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2789,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lawrence Roy",
    "display_name": "Lawrence Roy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "practical privacypreserving authentication for ssh",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 2790,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": [
      4859
    ]
  },
  {
    "name": "William A. Starke",
    "display_name": "William A. Starke",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2791,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jeff Stuecheli",
    "display_name": "Jeff Stuecheli",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2792,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Enriquillo Valdez",
    "display_name": "Enriquillo Valdez",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2021": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deta minimizing data leaks in federated learning via decentralized and trustworthy aggregation",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 2793,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": [
      2140
    ]
  },
  {
    "name": "Wendel Voigt",
    "display_name": "Wendel Voigt",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Confidential computing for OpenPOWER",
        "conference": "EUROSYS",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2794,
    "paper_ids": [
      2139
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xia Zhou",
    "display_name": "Xia Zhou",
    "affiliation": "Columbia University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "NSDI": {
        "2024": 1,
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OPEC: operation-based security isolation for bare-metal embedded systems",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "catch me if you can laser tethering with highly mobile targets",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "amphilight direct airwater communication with laser light",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 2795,
    "paper_ids": [
      295
    ],
    "papers_without_artifact_ids": [
      4860,
      4861
    ]
  },
  {
    "name": "Jiaqi Li 0023",
    "display_name": "Jiaqi Li",
    "affiliation": "Ant Group CO Ltd, Department of Security Countermeasure Technology, Hangzhou, Zhejiang, China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OPEC: operation-based security isolation for bare-metal embedded systems",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sgxlock towards efficiently establishing mutual distrust between host application and enclave for sgx",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 2796,
    "paper_ids": [
      295
    ],
    "papers_without_artifact_ids": [
      322
    ]
  },
  {
    "name": "Wenlong Zhang",
    "display_name": "Wenlong Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OPEC: operation-based security isolation for bare-metal embedded systems",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2797,
    "paper_ids": [
      295
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ka Ho Chow",
    "display_name": "Ka Ho Chow",
    "affiliation": "University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeepRest: deep resource estimation for interactive microservices",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2798,
    "paper_ids": [
      3714
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weihai Shen",
    "display_name": "Weihai Shen",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {
        "2022": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rolis: a software approach to efficiently replicating multi-core transactions",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "depfast orchestrating code of quorum systems",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 2799,
    "paper_ids": [
      1075
    ],
    "papers_without_artifact_ids": [
      628
    ]
  },
  {
    "name": "Ansh Khanna",
    "display_name": "Ansh Khanna",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rolis: a software approach to efficiently replicating multi-core transactions",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2800,
    "paper_ids": [
      1075
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Esmail Asyabi",
    "display_name": "Esmail Asyabi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A new benchmark harness for systematic and robust evaluation of streaming state stores",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2801,
    "paper_ids": [
      2819
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Azer Bestavros",
    "display_name": "Azer Bestavros",
    "affiliation": "Boston University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A new benchmark harness for systematic and robust evaluation of streaming state stores",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2802,
    "paper_ids": [
      2819
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peter Okelmann",
    "display_name": "Peter Okelmann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VMSH: hypervisor-agnostic guest overlays for VMs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2803,
    "paper_ids": [
      2134
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Redha Gouicem",
    "display_name": "Redha Gouicem",
    "affiliation": "RWTH Aachen University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "SOSP": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VMSH: hypervisor-agnostic guest overlays for VMs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2804,
    "paper_ids": [
      2134
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chen Chen 0124",
    "display_name": "Chen Chen",
    "affiliation": "ShanghaiTech University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building an efficient key-value store in a flexible address space",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2805,
    "paper_ids": [
      4862
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenshao Zhong",
    "display_name": "Wenshao Zhong",
    "affiliation": "University of Illinois at Chicago",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building an efficient key-value store in a flexible address space",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "remix efficient range query for lsmtrees",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2806,
    "paper_ids": [
      4862
    ],
    "papers_without_artifact_ids": [
      4863
    ]
  },
  {
    "name": "Xingbo Wu",
    "display_name": "Xingbo Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {},
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building an efficient key-value store in a flexible address space",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "remix efficient range query for lsmtrees",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2807,
    "paper_ids": [
      4862
    ],
    "papers_without_artifact_ids": [
      4863
    ]
  },
  {
    "name": "Hyungjun Oh",
    "display_name": "Hyungjun Oh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Out-of-order backprop: an effective scheduling technique for deep learning",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2808,
    "paper_ids": [
      4864
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junyeol Lee",
    "display_name": "Junyeol Lee",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Out-of-order backprop: an effective scheduling technique for deep learning",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2809,
    "paper_ids": [
      4864
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "HyeongJu Kim",
    "display_name": "HyeongJu Kim",
    "affiliation": "Seoul National University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Out-of-order backprop: an effective scheduling technique for deep learning",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2810,
    "paper_ids": [
      4864
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiwon Seo 0002",
    "display_name": "Jiwon Seo",
    "affiliation": "Seoul National University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Out-of-order backprop: an effective scheduling technique for deep learning",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2811,
    "paper_ids": [
      4864
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ionel Gog",
    "display_name": "Ionel Gog",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "NSDI": {
        "2015": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "D3: a dynamic deadline-driven approach for building autonomous vehicles",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "queues dont matter when you can jump them",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 2812,
    "paper_ids": [
      467
    ],
    "papers_without_artifact_ids": [
      3473
    ]
  },
  {
    "name": "Sukrit Kalra",
    "display_name": "Sukrit Kalra",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "USENIXSEC": 1,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "NSDI": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "D3: a dynamic deadline-driven approach for building autonomous vehicles",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "superserve finegrained inference serving for unpredictable workloads",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "senate a maliciouslysecure mpc platform for collaborative analytics",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 2813,
    "paper_ids": [
      467
    ],
    "papers_without_artifact_ids": [
      475,
      675
    ]
  },
  {
    "name": "Peter Schafhalter",
    "display_name": "Peter Schafhalter",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "D3: a dynamic deadline-driven approach for building autonomous vehicles",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2814,
    "paper_ids": [
      467
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Divyanshu Saxena",
    "display_name": "Divyanshu Saxena",
    "affiliation": "University of Texas at Austin",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Memory deduplication for serverless computing with Medes",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2815,
    "paper_ids": [
      2890
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tao Ji",
    "display_name": "Tao Ji",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "NSDI": {
        "2025": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Memory deduplication for serverless computing with Medes",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mtp transport for innetwork computing",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "enabling portable and highperformance smartnic programs with alkali",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 2816,
    "paper_ids": [
      2890
    ],
    "papers_without_artifact_ids": [
      2892,
      2893
    ]
  },
  {
    "name": "Arjun Singhvi",
    "display_name": "Arjun Singhvi",
    "affiliation": "University of Wisconsin-Madison",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {},
      "NSDI": {
        "2021": 1,
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Memory deduplication for serverless computing with Medes",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "whiz datadriven analytics execution",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "themis fair and efficient gpu cluster scheduling",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 2817,
    "paper_ids": [
      2890
    ],
    "papers_without_artifact_ids": [
      2897,
      1313
    ]
  },
  {
    "name": "Junaid Khalid",
    "display_name": "Junaid Khalid",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "NSDI": {
        "2019": 1,
        "2016": 1,
        "2018": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Memory deduplication for serverless computing with Medes",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "correctness and performance for stateful chained network functions",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "iron isolating networkbased cpu in container environments",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "paving the way for nfv simplifying middlebox modifications using statealyzr",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 2818,
    "paper_ids": [
      2890
    ],
    "papers_without_artifact_ids": [
      2902,
      2904,
      2906
    ]
  },
  {
    "name": "Yizheng Jiao",
    "display_name": "Yizheng Jiao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0,
      "SC": 0,
      "FAST": 4
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "SOSP": {},
      "SC": {},
      "FAST": {
        "2015": 1,
        "2020": 1,
        "2017": 1,
        "2018": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BetrFS: a compleat file system for commodity SSDs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how to copy files",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "the full path to fullpath indexing",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "file systems fated for senescence nonsense says science",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "betrfs a rightoptimized writeoptimized file system",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 2819,
    "paper_ids": [
      3776
    ],
    "papers_without_artifact_ids": [
      3777,
      3778,
      3779,
      3781
    ]
  },
  {
    "name": "Simon Bertron",
    "display_name": "Simon Bertron",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BetrFS: a compleat file system for commodity SSDs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2820,
    "paper_ids": [
      3776
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sagar Patel",
    "display_name": "Sagar Patel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BetrFS: a compleat file system for commodity SSDs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deep entity classification abusive account detection for online social networks",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 2821,
    "paper_ids": [
      3776
    ],
    "papers_without_artifact_ids": [
      3227
    ]
  },
  {
    "name": "Luke Zeller",
    "display_name": "Luke Zeller",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BetrFS: a compleat file system for commodity SSDs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2822,
    "paper_ids": [
      3776
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rory Bennett",
    "display_name": "Rory Bennett",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BetrFS: a compleat file system for commodity SSDs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2823,
    "paper_ids": [
      3776
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nirjhar Mukherjee",
    "display_name": "Nirjhar Mukherjee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "FAST": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BetrFS: a compleat file system for commodity SSDs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how to copy files",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 2824,
    "paper_ids": [
      3776
    ],
    "papers_without_artifact_ids": [
      3777
    ]
  },
  {
    "name": "Michael A. Bender",
    "display_name": "Michael A. Bender",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 5
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {},
      "FAST": {
        "2015": 1,
        "2016": 1,
        "2020": 1,
        "2017": 1,
        "2018": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BetrFS: a compleat file system for commodity SSDs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how to copy files",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "the full path to fullpath indexing",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "file systems fated for senescence nonsense says science",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "optimizing every operation in a writeoptimized file system",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "betrfs a rightoptimized writeoptimized file system",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 2825,
    "paper_ids": [
      3776
    ],
    "papers_without_artifact_ids": [
      3777,
      3778,
      3779,
      3780,
      3781
    ]
  },
  {
    "name": "Michael Condict",
    "display_name": "Michael Condict",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BetrFS: a compleat file system for commodity SSDs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2826,
    "paper_ids": [
      3776
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Farach-Colton",
    "display_name": "Martin Farach-Colton",
    "affiliation": "New York University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 5
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {},
      "FAST": {
        "2015": 1,
        "2016": 1,
        "2020": 1,
        "2017": 1,
        "2018": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BetrFS: a compleat file system for commodity SSDs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how to copy files",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "the full path to fullpath indexing",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "file systems fated for senescence nonsense says science",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "optimizing every operation in a writeoptimized file system",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "betrfs a rightoptimized writeoptimized file system",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 2827,
    "paper_ids": [
      3776
    ],
    "papers_without_artifact_ids": [
      3777,
      3778,
      3779,
      3780,
      3781
    ]
  },
  {
    "name": "Xiongzi Ge",
    "display_name": "Xiongzi Ge",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BetrFS: a compleat file system for commodity SSDs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2828,
    "paper_ids": [
      3776
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "William Jannen",
    "display_name": "William Jannen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 5
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {},
      "FAST": {
        "2015": 1,
        "2016": 1,
        "2020": 1,
        "2017": 1,
        "2018": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BetrFS: a compleat file system for commodity SSDs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how to copy files",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "the full path to fullpath indexing",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "file systems fated for senescence nonsense says science",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "optimizing every operation in a writeoptimized file system",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "betrfs a rightoptimized writeoptimized file system",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 2829,
    "paper_ids": [
      3776
    ],
    "papers_without_artifact_ids": [
      3777,
      3778,
      3779,
      3780,
      3781
    ]
  },
  {
    "name": "Donald E. Porter",
    "display_name": "Donald E. Porter",
    "affiliation": "University of North Carolina",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 0,
      "FAST": 6,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "SOSP": {},
      "ATC": {},
      "FAST": {
        "2015": 1,
        "2016": 1,
        "2020": 1,
        "2017": 1,
        "2018": 2
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 12.5,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BetrFS: a compleat file system for commodity SSDs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how to copy files",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "civet an efficient java partitioning framework for hardware enclaves",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "stash in a flash",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "the full path to fullpath indexing",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "file systems fated for senescence nonsense says science",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "optimizing every operation in a writeoptimized file system",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "betrfs a rightoptimized writeoptimized file system",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 2830,
    "paper_ids": [
      3776
    ],
    "papers_without_artifact_ids": [
      3777,
      680,
      3773,
      3778,
      3779,
      3780,
      3781
    ]
  },
  {
    "name": "Jun Yuan 0006",
    "display_name": "Jun Yuan",
    "affiliation": "Shenzhen University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 5
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {},
      "FAST": {
        "2015": 1,
        "2016": 1,
        "2020": 1,
        "2017": 1,
        "2018": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BetrFS: a compleat file system for commodity SSDs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how to copy files",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "the full path to fullpath indexing",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "file systems fated for senescence nonsense says science",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "optimizing every operation in a writeoptimized file system",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "betrfs a rightoptimized writeoptimized file system",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 2831,
    "paper_ids": [
      3776
    ],
    "papers_without_artifact_ids": [
      3777,
      3778,
      3779,
      3780,
      3781
    ]
  },
  {
    "name": "Jianbang Yang",
    "display_name": "Jianbang Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GNNLab: a factored system for sample-based GNN training over GPUs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flexgraph a flexible and efficient distributed framework for gnn training",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 2832,
    "paper_ids": [
      1316
    ],
    "papers_without_artifact_ids": [
      1318
    ]
  },
  {
    "name": "Dahai Tang",
    "display_name": "Dahai Tang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GNNLab: a factored system for sample-based GNN training over GPUs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2833,
    "paper_ids": [
      1316
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qiang Yin 0002",
    "display_name": "Qiang Yin",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GNNLab: a factored system for sample-based GNN training over GPUs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flexgraph a flexible and efficient distributed framework for gnn training",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 2834,
    "paper_ids": [
      1316
    ],
    "papers_without_artifact_ids": [
      1318
    ]
  },
  {
    "name": "Chrysoula Stathakopoulou",
    "display_name": "Chrysoula Stathakopoulou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "State machine replication scalability made simple",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2835,
    "paper_ids": [
      4865
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matej Pavlovic",
    "display_name": "Matej Pavlovic",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {},
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "State machine replication scalability made simple",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2836,
    "paper_ids": [
      4865
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marko Vukolic",
    "display_name": "Marko Vukolic",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {},
      "NSDI": {
        "2016": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "State machine replication scalability made simple",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "consensus in a box inexpensive coordination in hardware",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 2837,
    "paper_ids": [
      4865
    ],
    "papers_without_artifact_ids": [
      3841
    ]
  },
  {
    "name": "Ran Xu 0003",
    "display_name": "Ran Xu",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LiteReconfig: cost and content aware reconfiguration of video object detection systems for mobile GPUs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2838,
    "paper_ids": [
      2912
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jayoung Lee",
    "display_name": "Jayoung Lee",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LiteReconfig: cost and content aware reconfiguration of video object detection systems for mobile GPUs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2839,
    "paper_ids": [
      2912
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pengcheng Wang 0001",
    "display_name": "Pengcheng Wang",
    "affiliation": "Queen's University Belfast",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LiteReconfig: cost and content aware reconfiguration of video object detection systems for mobile GPUs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2840,
    "paper_ids": [
      2912
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yin Li 0003",
    "display_name": "Yin Li",
    "affiliation": "University of Wisconsin - Madison",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LiteReconfig: cost and content aware reconfiguration of video object detection systems for mobile GPUs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2841,
    "paper_ids": [
      2912
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Animesh Baranawal",
    "display_name": "Animesh Baranawal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Optimizing the interval-centric distributed computing model for temporal graph algorithms",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2842,
    "paper_ids": [
      4866
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yogesh Simmhan",
    "display_name": "Yogesh Simmhan",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Optimizing the interval-centric distributed computing model for temporal graph algorithms",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2843,
    "paper_ids": [
      4866
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ning Li 0010",
    "display_name": "Ning Li",
    "affiliation": "Huazhong University of Science and Technology, Wuhan National Laboratory for Optoelectronics, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Improving scalability of database systems by reshaping user parallel I/O",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2844,
    "paper_ids": [
      2104
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hao Che",
    "display_name": "Hao Che",
    "affiliation": "University of Texas at Arlington",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Improving scalability of database systems by reshaping user parallel I/O",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2845,
    "paper_ids": [
      2104
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhijun Wang 0001",
    "display_name": "Zhijun Wang",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Improving scalability of database systems by reshaping user parallel I/O",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2846,
    "paper_ids": [
      2104
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minh Q. Nguyen 0001",
    "display_name": "Minh Q. Nguyen",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Improving scalability of database systems by reshaping user parallel I/O",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2847,
    "paper_ids": [
      2104
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jérémie Decouchant",
    "display_name": "Jérémie Decouchant",
    "affiliation": "TU Delft",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0,
      "SYSTEX": 0,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "SOSP": {},
      "SYSTEX": {},
      "PETS": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DAMYSUS: streamlined BFT consensus leveraging trusted components",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "igwas privacypreserving interdependent genomewide association studies",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "dyps dynamic private and secure gwas",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 7988,
    "paper_ids": [
      3644
    ],
    "papers_without_artifact_ids": [
      4867,
      4868
    ]
  },
  {
    "name": "David Kozhaya",
    "display_name": "David Kozhaya",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DAMYSUS: streamlined BFT consensus leveraging trusted components",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2849,
    "paper_ids": [
      3644
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vincent Rahli",
    "display_name": "Vincent Rahli",
    "affiliation": "University of Birmingham",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SYSTEX": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "SYSTEX": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DAMYSUS: streamlined BFT consensus leveraging trusted components",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2850,
    "paper_ids": [
      3644
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kartal Kaan Bozdogan",
    "display_name": "Kartal Kaan Bozdogan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SafePM: a sanitizer for persistent memory",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2851,
    "paper_ids": [
      2135
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dimitrios Stavrakakis",
    "display_name": "Dimitrios Stavrakakis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SafePM: a sanitizer for persistent memory",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2852,
    "paper_ids": [
      2135
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shady Issa",
    "display_name": "Shady Issa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SafePM: a sanitizer for persistent memory",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2853,
    "paper_ids": [
      2135
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonas Vinck",
    "display_name": "Jonas Vinck",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 2
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sharing is caring: secure and efficient shared memory support for MVEEs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "moneta exvivo gpu driver fuzzing by recalling invivo execution states",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "you shall not bypass practical secure and fast pkubased sandboxing",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 2854,
    "paper_ids": [
      3782
    ],
    "papers_without_artifact_ids": [
      3784,
      3788
    ]
  },
  {
    "name": "Bert Abrath",
    "display_name": "Bert Abrath",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sharing is caring: secure and efficient shared memory support for MVEEs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2855,
    "paper_ids": [
      3782
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexios Voulimeneas",
    "display_name": "Alexios Voulimeneas",
    "affiliation": "TU Delft",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 3,
      "ATC": 0,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1,
        "2022": 2
      },
      "ATC": {},
      "ACSAC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sharing is caring: secure and efficient shared memory support for MVEEs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "moneta exvivo gpu driver fuzzing by recalling invivo execution states",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "ill be there for you perpetual availability in the a",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "you shall not bypass practical secure and fast pkubased sandboxing",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "dmvx secure and efficient multivariant execution in a distributed setting",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 2856,
    "paper_ids": [
      3782
    ],
    "papers_without_artifact_ids": [
      3784,
      3785,
      3788,
      3789
    ]
  },
  {
    "name": "Bjorn De Sutter",
    "display_name": "Bjorn De Sutter",
    "affiliation": "Ghent University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {},
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sharing is caring: secure and efficient shared memory support for MVEEs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2857,
    "paper_ids": [
      3782
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohammad Hossein Hajkazemi",
    "display_name": "Mohammad Hossein Hajkazemi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {},
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Beating the I/O bottleneck: a case for log-structured virtual disks",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a community cache with complete information",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2858,
    "paper_ids": [
      3476
    ],
    "papers_without_artifact_ids": [
      3663
    ]
  },
  {
    "name": "Mania Abdi",
    "display_name": "Mania Abdi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1,
        "2022": 1
      },
      "ATC": {},
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Beating the I/O bottleneck: a case for log-structured virtual disks",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "palette load balancing locality hints for serverless functions",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "a community cache with complete information",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2859,
    "paper_ids": [
      3476
    ],
    "papers_without_artifact_ids": [
      2698,
      3663
    ]
  },
  {
    "name": "Emine Ugur Kaynar",
    "display_name": "Emine Ugur Kaynar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Beating the I/O bottleneck: a case for log-structured virtual disks",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a community cache with complete information",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2860,
    "paper_ids": [
      3476
    ],
    "papers_without_artifact_ids": [
      3663
    ]
  },
  {
    "name": "Amin Mossayebzadeh",
    "display_name": "Amin Mossayebzadeh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Beating the I/O bottleneck: a case for log-structured virtual disks",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2861,
    "paper_ids": [
      3476
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peter Desnoyers",
    "display_name": "Peter Desnoyers",
    "affiliation": "Northeastern University",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 1,
      "ATC": 0,
      "FAST": 5
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "SOSP": {
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2015": 1,
        "2021": 1,
        "2017": 1,
        "2010": 1,
        "2013": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Beating the I/O bottleneck: a case for log-structured virtual disks",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "persistent memory research in the postoptane era",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "a community cache with complete information",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "evolving ext4 for shingled disks",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "skylighta window on shingled disk operation",
        "conference": "FAST",
        "year": 2015
      },
      {
        "title": "active flash towards energyefficient insitu data analytics on extremescale machines",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "write endurance in flash drives measurements and analysis",
        "conference": "FAST",
        "year": 2010
      }
    ],
    "author_id": 2862,
    "paper_ids": [
      3476
    ],
    "papers_without_artifact_ids": [
      4869,
      3663,
      4870,
      4871,
      3575,
      4872
    ]
  },
  {
    "name": "George Danezis",
    "display_name": "George Danezis",
    "affiliation": "Microsoft Research",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "USENIXSEC": 0,
      "PETS": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "USENIXSEC": {},
      "PETS": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Narwhal and Tusk: a DAG-based mempool and efficient BFT consensus",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mysticeti reaching the latency limits with uncertified dags",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 2863,
    "paper_ids": [
      2664
    ],
    "papers_without_artifact_ids": [
      2666
    ]
  },
  {
    "name": "Alexander Spiegelman",
    "display_name": "Alexander Spiegelman",
    "affiliation": "Aptos Labs, Palo Alto, USA",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Narwhal and Tusk: a DAG-based mempool and efficient BFT consensus",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shoal high throughput dag bft can be fast and robust",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 2864,
    "paper_ids": [
      2664
    ],
    "papers_without_artifact_ids": [
      3489
    ]
  },
  {
    "name": "Julia Lawall",
    "display_name": "Julia Lawall",
    "affiliation": "Sorbonne University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SOSP": 0,
      "SC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1,
        "2022": 1
      },
      "SOSP": {},
      "SC": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OS scheduling with nest: keeping tasks close together on warm cores",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ofence pairing barriers to find concurrency bugs in the linux kernel",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "refactoring for performance with semantic patching case study with recipes",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2865,
    "paper_ids": [
      4873
    ],
    "papers_without_artifact_ids": [
      4874,
      4875
    ]
  },
  {
    "name": "Himadri Chhaya-Shailesh",
    "display_name": "Himadri Chhaya-Shailesh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OS scheduling with nest: keeping tasks close together on warm cores",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2866,
    "paper_ids": [
      4873
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jean-Pierre Lozi",
    "display_name": "Jean-Pierre Lozi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "SOSP": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OS scheduling with nest: keeping tasks close together on warm cores",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2867,
    "paper_ids": [
      4873
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Baptiste Lepers",
    "display_name": "Baptiste Lepers",
    "affiliation": "University of Neuchtel",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "EUROSYS": 5,
      "SOSP": 0,
      "ATC": 0,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2023": 2,
        "2021": 1,
        "2022": 1
      },
      "SOSP": {},
      "ATC": {},
      "OSDI": {
        "2023": 1,
        "2020": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OS scheduling with nest: keeping tasks close together on warm cores",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "prestores proactive softwareguided movement of data down the memory hierarchy",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "ofence pairing barriers to find concurrency bugs in the linux kernel",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "tea a generalpurpose temporal graph random walk engine",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "johnny cache the end of dram cache conflicts in tiered main memory systems",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "tesseract distributed general graph pattern mining on evolving graphs",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "kvell snapshot isolation without snapshots",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 2868,
    "paper_ids": [
      4873
    ],
    "papers_without_artifact_ids": [
      4876,
      4874,
      644,
      4877,
      2723,
      4878
    ]
  },
  {
    "name": "Willy Zwaenepoel",
    "display_name": "Willy Zwaenepoel",
    "affiliation": "University of Sydney",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "EUROSYS": 4,
      "SOSP": 0,
      "SC": 0,
      "ATC": 0,
      "NSDI": 1,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2025": 1,
        "2023": 1,
        "2021": 1,
        "2022": 1
      },
      "SOSP": {},
      "SC": {},
      "ATC": {},
      "NSDI": {
        "2019": 1
      },
      "OSDI": {
        "2023": 1,
        "2020": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OS scheduling with nest: keeping tasks close together on warm cores",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "prestores proactive softwareguided movement of data down the memory hierarchy",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "ofence pairing barriers to find concurrency bugs in the linux kernel",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "johnny cache the end of dram cache conflicts in tiered main memory systems",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "tesseract distributed general graph pattern mining on evolving graphs",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "kvell snapshot isolation without snapshots",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "sizeaware sharding for improving tail latencies in inmemory keyvalue stores",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 2869,
    "paper_ids": [
      4873
    ],
    "papers_without_artifact_ids": [
      4876,
      4874,
      4877,
      2723,
      4878,
      4879
    ]
  },
  {
    "name": "Gilles Muller",
    "display_name": "Gilles Muller",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SOSP": 0,
      "ATC": 0,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1,
        "2022": 1
      },
      "SOSP": {},
      "ATC": {},
      "NSDI": {
        "2021": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OS scheduling with nest: keeping tasks close together on warm cores",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mitigating vulnerability windows with hypervisor transplant",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "bmc accelerating memcached using safe inkernel caching and prestack processing",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 2870,
    "paper_ids": [
      4873
    ],
    "papers_without_artifact_ids": [
      4839,
      4880
    ]
  },
  {
    "name": "Xingsheng Zhao",
    "display_name": "Xingsheng Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Characterizing the performance of intel optane persistent memory: a close look at its on-DIMM buffering",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "chameleondb a keyvalue store for optane persistent memory",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 2871,
    "paper_ids": [
      2105
    ],
    "papers_without_artifact_ids": [
      2111
    ]
  },
  {
    "name": "Song Jiang 0001",
    "display_name": "Song Jiang",
    "affiliation": "University of Texas at Arlington",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "SC": 0,
      "ATC": 0,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1,
        "2022": 1
      },
      "SC": {},
      "ATC": {},
      "FAST": {
        "2021": 1,
        "2011": 1,
        "2005": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Characterizing the performance of intel optane persistent memory: a close look at its on-DIMM buffering",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "chameleondb a keyvalue store for optane persistent memory",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "remix efficient range query for lsmtrees",
        "conference": "FAST",
        "year": 2021
      },
      {
        "title": "a scheduling framework that makes any disk schedulers nonworkconserving solely based on request characteristics",
        "conference": "FAST",
        "year": 2011
      },
      {
        "title": "dulo an effective buffer cache management scheme to exploit both temporal and spatial localities",
        "conference": "FAST",
        "year": 2005
      }
    ],
    "author_id": 2872,
    "paper_ids": [
      2105
    ],
    "papers_without_artifact_ids": [
      2111,
      4863,
      4881,
      4882
    ]
  },
  {
    "name": "Benjamin Holmes 0002",
    "display_name": "Benjamin Holmes",
    "affiliation": "VU Amsterdam",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "KASLR in the age of MicroVMs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2873,
    "paper_ids": [
      2919
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jason Waterman",
    "display_name": "Jason Waterman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "KASLR in the age of MicroVMs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2874,
    "paper_ids": [
      2919
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Paul Kirth",
    "display_name": "Paul Kirth",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PKRU-safe: automatically locking down the heap between safe and unsafe languages",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2875,
    "paper_ids": [
      2149
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mitchel Dickerson",
    "display_name": "Mitchel Dickerson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PKRU-safe: automatically locking down the heap between safe and unsafe languages",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2876,
    "paper_ids": [
      2149
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stephen Crane",
    "display_name": "Stephen Crane",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PKRU-safe: automatically locking down the heap between safe and unsafe languages",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2877,
    "paper_ids": [
      2149
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Per Larsen",
    "display_name": "Per Larsen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "ATC": 0,
      "WOOT": 0,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 1,
        "2022": 1
      },
      "ATC": {},
      "WOOT": {},
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PKRU-safe: automatically locking down the heap between safe and unsafe languages",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dmvx secure and efficient multivariant execution in a distributed setting",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 2878,
    "paper_ids": [
      2149
    ],
    "papers_without_artifact_ids": [
      3789
    ]
  },
  {
    "name": "David Gens",
    "display_name": "David Gens",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PKRU-safe: automatically locking down the heap between safe and unsafe languages",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "v0ltpwn attacking x86 processor integrity from software",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 2879,
    "paper_ids": [
      2149
    ],
    "papers_without_artifact_ids": [
      2321
    ]
  },
  {
    "name": "Yeoul Na",
    "display_name": "Yeoul Na",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PKRU-safe: automatically locking down the heap between safe and unsafe languages",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2880,
    "paper_ids": [
      2149
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lixiang Ao",
    "display_name": "Lixiang Ao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FaaSnap: FaaS made fast using snapshot-based VMs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2881,
    "paper_ids": [
      4883
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "George Porter",
    "display_name": "George Porter",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "FAST": 1,
      "NSDI": 7
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "FAST": {
        "2012": 1
      },
      "NSDI": {
        "2014": 2,
        "2017": 2,
        "2020": 1,
        "2011": 1,
        "2007": 1
      }
    },
    "artifact_rate": 11.1,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FaaSnap: FaaS made fast using snapshot-based VMs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "expanding across time to deliver bandwidth efficiency and low latency",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "encoding fast and slow lowlatency video processing using thousands of tiny threads",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "enabling widespread communications on optical fabric with megaswitch",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "circuit switching under the radar with reactor",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "senic scalable nic for endhost rate limiting",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "scc cluster storage provisioning informed by application characteristics and slas",
        "conference": "FAST",
        "year": 2012
      },
      {
        "title": "tritonsort a balanced largescale sorting system",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "xtrace a pervasive network tracing framework",
        "conference": "NSDI",
        "year": 2007
      }
    ],
    "author_id": 2882,
    "paper_ids": [
      4883
    ],
    "papers_without_artifact_ids": [
      4884,
      3146,
      2716,
      4885,
      4886,
      3438,
      3439,
      516
    ]
  },
  {
    "name": "Geoffrey M. Voelker",
    "display_name": "Geoffrey M. Voelker",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 1,
    "total_papers": 14,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 0,
      "ATC": 0,
      "ACSAC": 1,
      "FAST": 2,
      "USENIXSEC": 2,
      "NSDI": 7,
      "PETS": 1,
      "NDSS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "SOSP": {},
      "ATC": {},
      "ACSAC": {
        "2023": 1
      },
      "FAST": {
        "2009": 1,
        "2012": 1
      },
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      },
      "NSDI": {
        "2013": 2,
        "2009": 2,
        "2014": 1,
        "2006": 1,
        "2004": 1
      },
      "PETS": {
        "2023": 1
      },
      "NDSS": {},
      "OSDI": {}
    },
    "artifact_rate": 7.1,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FaaSnap: FaaS made fast using snapshot-based VMs",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an empirical analysis of enterprisewide mandatory password updates",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "no privacy among spies assessing the functionality and insecurity of consumer android spyware apps",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "in the line of fire risks of dpitriggered data collection",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "hopper modeling and detecting lateral movement",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "circuit switching under the radar with reactor",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "slomo downclocking wifi communication",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "edoctor automatically diagnosing abnormal battery drain issues on smartphones",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "bluesky a cloudbacked file system for the enterprise",
        "conference": "FAST",
        "year": 2012
      },
      {
        "title": "cumulus filesystem backup to the cloud",
        "conference": "FAST",
        "year": 2009
      },
      {
        "title": "netprints diagnosing home network misconfigurations using shared knowledge",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "sora high performance software radio using general purpose multicore processors",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "to infinity and beyond timewarped network emulation",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "total recall system support for automated availability management",
        "conference": "NSDI",
        "year": 2004
      }
    ],
    "author_id": 2883,
    "paper_ids": [
      4883
    ],
    "papers_without_artifact_ids": [
      4887,
      4546,
      4888,
      4889,
      4885,
      4890,
      1933,
      4891,
      4892,
      4893,
      4826,
      4894,
      4895
    ]
  },
  {
    "name": "Md Shahriar Iqbal",
    "display_name": "Md Shahriar Iqbal",
    "affiliation": "University of South Carolina",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unicorn: reasoning about configurable system performance through the lens of causality",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2884,
    "paper_ids": [
      3792
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rahul Krishna",
    "display_name": "Rahul Krishna",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unicorn: reasoning about configurable system performance through the lens of causality",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2885,
    "paper_ids": [
      3792
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohammad Ali Javidian",
    "display_name": "Mohammad Ali Javidian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unicorn: reasoning about configurable system performance through the lens of causality",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2886,
    "paper_ids": [
      3792
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pooyan Jamshidi",
    "display_name": "Pooyan Jamshidi",
    "affiliation": "University of South Carolina",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 3
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2023": 1,
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unicorn: reasoning about configurable system performance through the lens of causality",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sponge inference serving with dynamic slos using inplace vertical scaling",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "reconciling high accuracy costefficiency and low latency of inference serving systems",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 2887,
    "paper_ids": [
      3792
    ],
    "papers_without_artifact_ids": [
      4321,
      4322
    ]
  },
  {
    "name": "Michalis Vardoulakis",
    "display_name": "Michalis Vardoulakis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tebis: index shipping for efficient replication in LSM key-value stores",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2888,
    "paper_ids": [
      4896
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Giorgos Saloustros",
    "display_name": "Giorgos Saloustros",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tebis: index shipping for efficient replication in LSM key-value stores",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2889,
    "paper_ids": [
      4896
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pilar González-Férez",
    "display_name": "Pilar González-Férez",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tebis: index shipping for efficient replication in LSM key-value stores",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7989,
    "paper_ids": [
      4896
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Angelos Bilas",
    "display_name": "Angelos Bilas",
    "affiliation": "University of Crete",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "EUROSYS": 4,
      "SC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2021": 3,
        "2022": 1
      },
      "SC": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tebis: index shipping for efficient replication in LSM key-value stores",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a unified storage layer for supporting distributed workflows in kubernetes",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "frisbee a suite for benchmarking systems recovery",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "memorymapped io on steroids",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "h3 an applicationlevel lowoverhead object store",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2891,
    "paper_ids": [
      4896
    ],
    "papers_without_artifact_ids": [
      4897,
      4898,
      4899,
      4900
    ]
  },
  {
    "name": "Sanjith Athlur",
    "display_name": "Sanjith Athlur",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "EUROSYS": 1,
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      },
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Varuna: scalable, low-cost training of massive deep learning models",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "morph efficient filelifetime redundancy management for cluster file systems",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "tiger diskadaptive redundancy without placement restrictions",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 2892,
    "paper_ids": [
      3794
    ],
    "papers_without_artifact_ids": [
      1327,
      1329
    ]
  },
  {
    "name": "Nitika Saran",
    "display_name": "Nitika Saran",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Varuna: scalable, low-cost training of massive deep learning models",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2893,
    "paper_ids": [
      3794
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muthian Sivathanu",
    "display_name": "Muthian Sivathanu",
    "affiliation": "University of Wisconsin-Madison",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "EUROSYS": 2,
      "FAST": 6,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "EUROSYS": {
        "2024": 1,
        "2022": 1
      },
      "FAST": {
        "2005": 2,
        "2020": 1,
        "2004": 1,
        "2003": 1,
        "2019": 1
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 11.1,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "EUROSYS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Varuna: scalable, low-cost training of massive deep learning models",
        "conference": "EUROSYS",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "justintime checkpointing low cost error recovery from deep learning training failures",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "quiver an informed storage cache for deep learning",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "blockene a highthroughput blockchain over mobile devices",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "instalytics cluster filesystem codesign for bigdata analytics",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "a logic of file systems",
        "conference": "FAST",
        "year": 2005
      },
      {
        "title": "databaseaware semanticallysmart storage",
        "conference": "FAST",
        "year": 2005
      },
      {
        "title": "improving storage system availability with dgraid awarded best student paper",
        "conference": "FAST",
        "year": 2004
      },
      {
        "title": "semanticallysmart disk systems",
        "conference": "FAST",
        "year": 2003
      }
    ],
    "author_id": 2894,
    "paper_ids": [
      3794
    ],
    "papers_without_artifact_ids": [
      3796,
      4901,
      2539,
      3549,
      2043,
      2045,
      2046,
      2048
    ]
  },
  {
    "name": "Seungbeom Choi",
    "display_name": "Seungbeom Choi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Serving Heterogeneous Machine Learning Models on Multi-GPU Servers with Spatio-Temporal Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2895,
    "paper_ids": [
      347
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sunho Lee 0003",
    "display_name": "Sunho Lee",
    "affiliation": "KAIST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Serving Heterogeneous Machine Learning Models on Multi-GPU Servers with Spatio-Temporal Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2896,
    "paper_ids": [
      347
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yeonjae Kim",
    "display_name": "Yeonjae Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Serving Heterogeneous Machine Learning Models on Multi-GPU Servers with Spatio-Temporal Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2897,
    "paper_ids": [
      347
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jaehyuk Huh 0001",
    "display_name": "Jaehyuk Huh",
    "affiliation": "KAIST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "SC": {},
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Serving Heterogeneous Machine Learning Models on Multi-GPU Servers with Spatio-Temporal Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2898,
    "paper_ids": [
      347
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Samuel Kalbfleisch",
    "display_name": "Samuel Kalbfleisch",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Vinter: Automatic Non-Volatile Memory Crash Consistency Testing for Full Systems",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2899,
    "paper_ids": [
      4902
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lukas Werling",
    "display_name": "Lukas Werling",
    "affiliation": "Karlsruhe Institute of Technology",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "SOSP": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Vinter: Automatic Non-Volatile Memory Crash Consistency Testing for Full Systems",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fundamental os design considerations for cxlbased hybrid ssds",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "analyzing and improving cpu and energy efficiency of pm file systems",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 2900,
    "paper_ids": [
      4902
    ],
    "papers_without_artifact_ids": [
      4903,
      4904
    ]
  },
  {
    "name": "Frank Bellosa",
    "display_name": "Frank Bellosa",
    "affiliation": "Karlsruhe Inst. of Technology",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 2,
      "EUROSYS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "EUROSYS": {},
      "OSDI": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Vinter: Automatic Non-Volatile Memory Crash Consistency Testing for Full Systems",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fundamental os design considerations for cxlbased hybrid ssds",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "analyzing and improving cpu and energy efficiency of pm file systems",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 2901,
    "paper_ids": [
      4902
    ],
    "papers_without_artifact_ids": [
      4903,
      4904
    ]
  },
  {
    "name": "Javier Picorel",
    "display_name": "Javier Picorel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "uKharon: A Membership Service for Microsecond Applications",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2902,
    "paper_ids": [
      1380
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Huabing Yan",
    "display_name": "Huabing Yan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "uKharon: A Membership Service for Microsecond Applications",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2903,
    "paper_ids": [
      1380
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mark Mansi",
    "display_name": "Mark Mansi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CBMM: Financial Advice for Kernel Memory Managers",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "styx exploiting smartnic capability to reduce datacenter memory tax",
        "conference": "ATC",
        "year": 2023
      }
    ],
    "author_id": 2904,
    "paper_ids": [
      2920
    ],
    "papers_without_artifact_ids": [
      2924
    ]
  },
  {
    "name": "Bijan Tabatabai",
    "display_name": "Bijan Tabatabai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CBMM: Financial Advice for Kernel Memory Managers",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fbmm making memory management extensible with filesystems",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 2905,
    "paper_ids": [
      2920
    ],
    "papers_without_artifact_ids": [
      2923
    ]
  },
  {
    "name": "Pedro Fouto",
    "display_name": "Pedro Fouto",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "High Throughput Replication with Integrated Membership Management",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2906,
    "paper_ids": [
      4905
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nuno M. Preguiça",
    "display_name": "Nuno M. Preguiça",
    "affiliation": "Universidade NOVA de Lisboa",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 3,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {
        "2025": 2,
        "2023": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "High Throughput Replication with Integrated Membership Management",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "redunt automatically deriving redundancy relations for pure opbased crdts",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "towards localfirst distributed property graphs",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "data management for mobile applications dependent on geolocated data",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 7990,
    "paper_ids": [
      4905
    ],
    "papers_without_artifact_ids": [
      4906,
      4907,
      4908
    ]
  },
  {
    "name": "João Leitão 0001",
    "display_name": "João Leitão",
    "affiliation": "Universidade NOVA de Lisboa",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "High Throughput Replication with Integrated Membership Management",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "data management for mobile applications dependent on geolocated data",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 7991,
    "paper_ids": [
      4905
    ],
    "papers_without_artifact_ids": [
      4908
    ]
  },
  {
    "name": "Dmitry Kuznetsov",
    "display_name": "Dmitry Kuznetsov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Privbox: Faster System Calls Through Sandboxed Privileged Execution",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2909,
    "paper_ids": [
      3767
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Linsong Guo",
    "display_name": "Linsong Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Help Rather Than Recycle: Alleviating Cold Startup in Serverless Computing Through Inter-Function Container Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the benefits and limitations of user interrupts for preemptive userspace scheduling",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 2910,
    "paper_ids": [
      1085
    ],
    "papers_without_artifact_ids": [
      3455
    ]
  },
  {
    "name": "Chuhao Xu",
    "display_name": "Chuhao Xu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Help Rather Than Recycle: Alleviating Cold Startup in Serverless Computing Through Inter-Function Container Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2911,
    "paper_ids": [
      1085
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anja Kalaba",
    "display_name": "Anja Kalaba",
    "affiliation": "Princeton",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Speculative Recovery: Cheap, Highly Available Fault Tolerance with Disaggregated Storage",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2912,
    "paper_ids": [
      2742
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Juwon Kim",
    "display_name": "Juwon Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2025": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IPLFS: Log-Structured File System without Garbage Collection",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "opimq order preserving io stack for multiqueue block device",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "d2fs devicedriven filesystem garbage collection",
        "conference": "FAST",
        "year": 2025
      }
    ],
    "author_id": 498,
    "paper_ids": [
      4909
    ],
    "papers_without_artifact_ids": [
      4910,
      4911
    ]
  },
  {
    "name": "Minsu Kim",
    "display_name": "Minsu Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IPLFS: Log-Structured File System without Garbage Collection",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2913,
    "paper_ids": [
      4909
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muhammad Danish Tehseen",
    "display_name": "Muhammad Danish Tehseen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IPLFS: Log-Structured File System without Garbage Collection",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2914,
    "paper_ids": [
      4909
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joontaek Oh",
    "display_name": "Joontaek Oh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 7
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2018": 1,
        "2023": 1,
        "2022": 2,
        "2025": 3
      }
    },
    "artifact_rate": 12.5,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IPLFS: Log-Structured File System without Garbage Collection",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "djfs directorygranularity filesystem journaling for cmmh ssds",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "opimq order preserving io stack for multiqueue block device",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "d2fs devicedriven filesystem garbage collection",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "cjfs concurrent journaling for better scalability",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "scalexfs getting scalability of xfs back on the ring",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "exf2fs transaction support in logstructured filesystem",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "barrierenabled io stack for flash storage",
        "conference": "FAST",
        "year": 2018
      }
    ],
    "author_id": 499,
    "paper_ids": [
      4909
    ],
    "papers_without_artifact_ids": [
      4912,
      4910,
      4911,
      1587,
      4913,
      4914,
      4915
    ]
  },
  {
    "name": "Youjip Won",
    "display_name": "Youjip Won",
    "affiliation": "KAIST",
    "artifact_count": 1,
    "total_papers": 11,
    "total_papers_by_conf": {
      "ATC": 2,
      "SOSP": 0,
      "FAST": 9
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2024": 1
      },
      "SOSP": {},
      "FAST": {
        "2018": 2,
        "2014": 1,
        "2023": 1,
        "2022": 2,
        "2025": 3
      }
    },
    "artifact_rate": 9.1,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IPLFS: Log-Structured File System without Garbage Collection",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "djfs directorygranularity filesystem journaling for cmmh ssds",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "opimq order preserving io stack for multiqueue block device",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "d2fs devicedriven filesystem garbage collection",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "zms zone abstraction for mobile flash storage",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "cjfs concurrent journaling for better scalability",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "scalexfs getting scalability of xfs back on the ring",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "exf2fs transaction support in logstructured filesystem",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "endurable transient inconsistency in byteaddressable persistent btree",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "barrierenabled io stack for flash storage",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "resolving journaling of journal anomaly in android io multiversion btree with lazy split",
        "conference": "FAST",
        "year": 2014
      }
    ],
    "author_id": 500,
    "paper_ids": [
      4909
    ],
    "papers_without_artifact_ids": [
      4912,
      4910,
      4911,
      4916,
      1587,
      4913,
      4914,
      3502,
      4915,
      3503
    ]
  },
  {
    "name": "Johanna Ullrich",
    "display_name": "Johanna Ullrich",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "ACSAC": 1,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "ACSAC": {
        "2017": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Not that Simple: Email Delivery in the 21st Century",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "grid shock coordinated loadchanging attacks on power grids the nonsmart power grid is vulnerable to cyber attacks as well",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 2915,
    "paper_ids": [
      2925
    ],
    "papers_without_artifact_ids": [
      2152
    ]
  },
  {
    "name": "Damien Aymon",
    "display_name": "Damien Aymon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cachew: Machine Learning Input Data Processing as a Service",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2916,
    "paper_ids": [
      1666
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dan Kluser",
    "display_name": "Dan Kluser",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cachew: Machine Learning Input Data Processing as a Service",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2917,
    "paper_ids": [
      1666
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tanguy Albrici",
    "display_name": "Tanguy Albrici",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cachew: Machine Learning Input Data Processing as a Service",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2918,
    "paper_ids": [
      1666
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhengde Zhai",
    "display_name": "Zhengde Zhai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HyperEnclave: An Open and Cross-platform Trusted Execution Environment",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2919,
    "paper_ids": [
      2929
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhengyu He",
    "display_name": "Zhengyu He",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 1,
      "USENIXSEC": 1,
      "NDSS": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "SOSP": {
        "2023": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HyperEnclave: An Open and Cross-platform Trusted Execution Environment",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scrutinizer towards secure forensics on compromised trustzone",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "cage complementing arm cca with gpu extensions",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "pvm efficient shadow paging for deploying secure containers in cloudnative environment",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "shelter extending arm cca with isolation in user space",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 2920,
    "paper_ids": [
      2929
    ],
    "papers_without_artifact_ids": [
      776,
      2154,
      1936,
      784
    ]
  },
  {
    "name": "Taeksoo Kim",
    "display_name": "Taeksoo Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Memory Harvesting in Multi-GPU Systems with Hierarchical Unified Virtual Memory",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2921,
    "paper_ids": [
      348
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rachata Ausavarungnirun",
    "display_name": "Rachata Ausavarungnirun",
    "affiliation": "King Mongkut's University of Technology North Bangkok, Thailand",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "FAST": {
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Memory Harvesting in Multi-GPU Systems with Hierarchical Unified Virtual Memory",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ice collaborating memory and process management for user experience on resourcelimited mobile devices",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "cachesifter sifting cache files for boosted mobile performance and lifetime",
        "conference": "FAST",
        "year": 2022
      }
    ],
    "author_id": 2922,
    "paper_ids": [
      348
    ],
    "papers_without_artifact_ids": [
      4917,
      4918
    ]
  },
  {
    "name": "Charlie Curtsinger",
    "display_name": "Charlie Curtsinger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 0,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "SOSP": {},
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Riker: Always-Correct and Fast Incremental Builds from Simple Specifications",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2923,
    "paper_ids": [
      4919
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel W. Barowy",
    "display_name": "Daniel W. Barowy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Riker: Always-Correct and Fast Incremental Builds from Simple Specifications",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2924,
    "paper_ids": [
      4919
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Niklas Cassel",
    "display_name": "Niklas Cassel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZNSwap: un-Block your Swap",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2925,
    "paper_ids": [
      3812
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matias Bjørling",
    "display_name": "Matias Bjørling",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2026": 1,
        "2017": 1,
        "2018": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZNSwap: un-Block your Swap",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "characterizing and emulating fdp ssds with warp",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "the case of femu cheap accurate scalable and extensible flash emulator",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "lightnvm the linux openchannel ssd subsystem",
        "conference": "FAST",
        "year": 2017
      }
    ],
    "author_id": 7992,
    "paper_ids": [
      3812
    ],
    "papers_without_artifact_ids": [
      3648,
      3632,
      4920
    ]
  },
  {
    "name": "Shucheng Wang",
    "display_name": "Shucheng Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "FAST": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "StRAID: Stripe-threaded Architecture for Parity-based RAIDs with Ultra-fast SSDs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "p",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "bcw buffercontrolled writes to hdds for ssdhdd hybrid storage server",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 2927,
    "paper_ids": [
      2106
    ],
    "papers_without_artifact_ids": [
      2110,
      2113
    ]
  },
  {
    "name": "Qiang Cao 0001",
    "display_name": "Qiang Cao",
    "affiliation": "University of Kentucky",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "EUROSYS": 1,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "SC": {},
      "EUROSYS": {
        "2022": 1
      },
      "FAST": {
        "2020": 1,
        "2026": 1,
        "2025": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "StRAID: Stripe-threaded Architecture for Parity-based RAIDs with Ultra-fast SSDs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rearchitecting buffered io in the era of highbandwidth ssds",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "rethinking the requesttoio transformation process of file systems for full utilization of highbandwidth ssds",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "p",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "bcw buffercontrolled writes to hdds for ssdhdd hybrid storage server",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 1030,
    "paper_ids": [
      2106
    ],
    "papers_without_artifact_ids": [
      2107,
      2108,
      2110,
      2113
    ]
  },
  {
    "name": "Ziyi Lu",
    "display_name": "Ziyi Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "FAST": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "StRAID: Stripe-threaded Architecture for Parity-based RAIDs with Ultra-fast SSDs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "p",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "bcw buffercontrolled writes to hdds for ssdhdd hybrid storage server",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 2928,
    "paper_ids": [
      2106
    ],
    "papers_without_artifact_ids": [
      2110,
      2113
    ]
  },
  {
    "name": "Jie Yao 0001",
    "display_name": "Jie Yao",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 0,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {},
      "FAST": {
        "2020": 1,
        "2026": 1,
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "StRAID: Stripe-threaded Architecture for Parity-based RAIDs with Ultra-fast SSDs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rearchitecting buffered io in the era of highbandwidth ssds",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "rethinking the requesttoio transformation process of file systems for full utilization of highbandwidth ssds",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "bcw buffercontrolled writes to hdds for ssdhdd hybrid storage server",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 1031,
    "paper_ids": [
      2106
    ],
    "papers_without_artifact_ids": [
      2107,
      2108,
      2113
    ]
  },
  {
    "name": "Yuanyuan Dong",
    "display_name": "Yuanyuan Dong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1,
      "FAST": 4
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "FAST": {
        "2024": 1,
        "2020": 1,
        "2023": 2
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "StRAID: Stripe-threaded Architecture for Parity-based RAIDs with Ultra-fast SSDs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "whats the story in ebs glory evolutions and lessons in building cloud block store",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "more than capacity performanceoriented evolution of pangu in alibaba",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "fisc a largescale cloudnativeoriented file system",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "p",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "bcw buffercontrolled writes to hdds for ssdhdd hybrid storage server",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 2929,
    "paper_ids": [
      2106
    ],
    "papers_without_artifact_ids": [
      2091,
      1063,
      1064,
      2110,
      2113
    ]
  },
  {
    "name": "Tianqi Tang 0001",
    "display_name": "Tianqi Tang",
    "affiliation": "Virginia Tech",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Faith: An Efficient Framework for Transformer Verification on GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2930,
    "paper_ids": [
      1675
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shu Yang",
    "display_name": "Shu Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Faith: An Efficient Framework for Transformer Verification on GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2931,
    "paper_ids": [
      1675
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haojun Ma",
    "display_name": "Haojun Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sift: Using Refinement-guided Automation to Verify Complex Distributed Systems",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2932,
    "paper_ids": [
      1624
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hammad Ahmad",
    "display_name": "Hammad Ahmad",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sift: Using Refinement-guided Automation to Verify Complex Distributed Systems",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2933,
    "paper_ids": [
      1624
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aman Goel",
    "display_name": "Aman Goel",
    "affiliation": "Amazon Web Services",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sift: Using Refinement-guided Automation to Verify Complex Distributed Systems",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2934,
    "paper_ids": [
      1624
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jean-Baptiste Jeannin",
    "display_name": "Jean-Baptiste Jeannin",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "SOSP": {},
      "NSDI": {
        "2017": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sift: Using Refinement-guided Automation to Verify Complex Distributed Systems",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "correct by construction networks using stepwise refinement",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 2935,
    "paper_ids": [
      1624
    ],
    "papers_without_artifact_ids": [
      1654
    ]
  },
  {
    "name": "Alexey Khrabrov 0002",
    "display_name": "Alexey Khrabrov",
    "affiliation": "University of Toronto",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "JITServer: Disaggregated Caching JIT Compiler for the JVM in the Cloud",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2936,
    "paper_ids": [
      4921
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marius Pirvu",
    "display_name": "Marius Pirvu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "JITServer: Disaggregated Caching JIT Compiler for the JVM in the Cloud",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2937,
    "paper_ids": [
      4921
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vijay Sundaresan",
    "display_name": "Vijay Sundaresan",
    "affiliation": "IBM Toronto Lab, Canada",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "JITServer: Disaggregated Caching JIT Compiler for the JVM in the Cloud",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2938,
    "paper_ids": [
      4921
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eyal de Lara",
    "display_name": "Eyal de Lara",
    "affiliation": "University of Toronto",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 0,
      "EUROSYS": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2024": 1,
        "2022": 1
      },
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "JITServer: Disaggregated Caching JIT Compiler for the JVM in the Cloud",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pathfs a file system for the hierarchical edge",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "combining dnn partitioning and early exit",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "starlight fast container provisioning on the edge and over the wan",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 2939,
    "paper_ids": [
      4921
    ],
    "papers_without_artifact_ids": [
      4922,
      4923,
      4924
    ]
  },
  {
    "name": "Xianyan Jia",
    "display_name": "Xianyan Jia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Whale: Efficient Giant Model Training over Heterogeneous GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2940,
    "paper_ids": [
      2858
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Le Jiang",
    "display_name": "Le Jiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Whale: Efficient Giant Model Training over Heterogeneous GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2941,
    "paper_ids": [
      2858
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ang Wang",
    "display_name": "Ang Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Whale: Efficient Giant Model Training over Heterogeneous GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2942,
    "paper_ids": [
      2858
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ziji Shi",
    "display_name": "Ziji Shi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Whale: Efficient Giant Model Training over Heterogeneous GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2943,
    "paper_ids": [
      2858
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jie Zhang 0135",
    "display_name": "Jie Zhang",
    "affiliation": "Alibaba Group, Beijing, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Whale: Efficient Giant Model Training over Heterogeneous GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2944,
    "paper_ids": [
      2858
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xinyuan Li",
    "display_name": "Xinyuan Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Whale: Efficient Giant Model Training over Heterogeneous GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2945,
    "paper_ids": [
      2858
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Langshi Chen",
    "display_name": "Langshi Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Whale: Efficient Giant Model Training over Heterogeneous GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2946,
    "paper_ids": [
      2858
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaoyong Liu",
    "display_name": "Xiaoyong Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Whale: Efficient Giant Model Training over Heterogeneous GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "disc a dynamic shape compiler for machine learning workloads",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 2947,
    "paper_ids": [
      2858
    ],
    "papers_without_artifact_ids": [
      2859
    ]
  },
  {
    "name": "Wei Zhang 0149",
    "display_name": "Wei Zhang",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PilotFish: Harvesting Free Cycles of Cloud Gaming with Deep Learning Training",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2948,
    "paper_ids": [
      149
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Binghao Chen",
    "display_name": "Binghao Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PilotFish: Harvesting Free Cycles of Cloud Gaming with Deep Learning Training",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2949,
    "paper_ids": [
      149
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fangming Lu",
    "display_name": "Fangming Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "KRCORE: A Microsecond-scale RDMA Control Plane for Elastic Computing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "serializationdeserializationfree state transfer in serverless workflows",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "no provisioned concurrency fast rdmacodesigned remote fork for serverless computing",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 2950,
    "paper_ids": [
      34
    ],
    "papers_without_artifact_ids": [
      54,
      62
    ]
  },
  {
    "name": "Han Yin",
    "display_name": "Han Yin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Meces: Latency-efficient Rescaling via Prioritized State Migration for Stateful Distributed Stream Processing Systems",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2951,
    "paper_ids": [
      3818
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weichang Zhong",
    "display_name": "Weichang Zhong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Meces: Latency-efficient Rescaling via Prioritized State Migration for Stateful Distributed Stream Processing Systems",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2952,
    "paper_ids": [
      3818
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chunfeng Yuan",
    "display_name": "Chunfeng Yuan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Meces: Latency-efficient Rescaling via Prioritized State Migration for Stateful Distributed Stream Processing Systems",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2953,
    "paper_ids": [
      3818
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuaiwei Wang",
    "display_name": "Shuaiwei Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Zero-Change Object Transmission for Distributed Big Data Analytics",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2954,
    "paper_ids": [
      35
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haijun Zhang 0002",
    "display_name": "Haijun Zhang",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Building a High-performance Fine-grained Deduplication Framework for Backup Storage with High Deduplication Ratio",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the dilemma between deduplication and locality can both be achieved",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2955,
    "paper_ids": [
      2061
    ],
    "papers_without_artifact_ids": [
      2065
    ]
  },
  {
    "name": "Xuan Wang 0002",
    "display_name": "Xuan Wang",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Building a High-performance Fine-grained Deduplication Framework for Backup Storage with High Deduplication Ratio",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the dilemma between deduplication and locality can both be achieved",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 2956,
    "paper_ids": [
      2061
    ],
    "papers_without_artifact_ids": [
      2065
    ]
  },
  {
    "name": "Ryan Court",
    "display_name": "Ryan Court",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Automatic Recovery of Fine-grained Compiler Artifacts at the Binary Level",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the circle of life a largescale study of the iot malware lifecycle",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 2957,
    "paper_ids": [
      2935
    ],
    "papers_without_artifact_ids": [
      4925
    ]
  },
  {
    "name": "Kevin Z. Snow",
    "display_name": "Kevin Z. Snow",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Automatic Recovery of Fine-grained Compiler Artifacts at the Binary Level",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the circle of life a largescale study of the iot malware lifecycle",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 2958,
    "paper_ids": [
      2935
    ],
    "papers_without_artifact_ids": [
      4925
    ]
  },
  {
    "name": "Fabian Monrose",
    "display_name": "Fabian Monrose",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "ATC": 1,
      "ACSAC": 3,
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "ACSAC": {
        "2022": 1,
        "2019": 1,
        "2020": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 12.5,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Automatic Recovery of Fine-grained Compiler Artifacts at the Binary Level",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the guardians of name street studying the defensive registration practices of the fortune 500",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "comparing malware evasion theory with practice results from interviews with expert analysts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "beyond the gates an empirical analysis of httpmanaged password stealers and operators",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "view from above exploring the malware ecosystem from the upper dns hierarchy",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "the circle of life a largescale study of the iot malware lifecycle",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "a flexible framework for expediting bug finding by leveraging past misbehavior to discover new bugs",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "mitigating data leakage by protecting memoryresident sensitive data",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 2959,
    "paper_ids": [
      2935
    ],
    "papers_without_artifact_ids": [
      4926,
      3224,
      4927,
      4928,
      4925,
      2994,
      2995
    ]
  },
  {
    "name": "Guanglei Song",
    "display_name": "Guanglei Song",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AddrMiner: A Comprehensive Global Active IPv6 Address Discovery System",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2960,
    "paper_ids": [
      2783
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiahai Yang 0001",
    "display_name": "Jiahai Yang",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "ACSAC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {
        "2024": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AddrMiner: A Comprehensive Global Active IPv6 Address Discovery System",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cpiot a crossplatform monitoring system for smart home",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "lordma a new lowrate dos attack in rdma networks",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "minehunter a practical cryptomining traffic detection algorithm based on time series tracking",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 2961,
    "paper_ids": [
      2783
    ],
    "papers_without_artifact_ids": [
      4929,
      4930,
      4931
    ]
  },
  {
    "name": "Lin He 0004",
    "display_name": "Lin He",
    "affiliation": "Chinese Academy of Sciences",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AddrMiner: A Comprehensive Global Active IPv6 Address Discovery System",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "firebolt finding bugs in programmable data plane generators",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 2962,
    "paper_ids": [
      2783
    ],
    "papers_without_artifact_ids": [
      4932
    ]
  },
  {
    "name": "Zhiliang Wang",
    "display_name": "Zhiliang Wang",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "ACSAC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {
        "2024": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AddrMiner: A Comprehensive Global Active IPv6 Address Discovery System",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cpiot a crossplatform monitoring system for smart home",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "lordma a new lowrate dos attack in rdma networks",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "minehunter a practical cryptomining traffic detection algorithm based on time series tracking",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 2963,
    "paper_ids": [
      2783
    ],
    "papers_without_artifact_ids": [
      4929,
      4930,
      4931
    ]
  },
  {
    "name": "Chenxin Duan",
    "display_name": "Chenxin Duan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AddrMiner: A Comprehensive Global Active IPv6 Address Discovery System",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cpiot a crossplatform monitoring system for smart home",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 2964,
    "paper_ids": [
      2783
    ],
    "papers_without_artifact_ids": [
      4929
    ]
  },
  {
    "name": "Yaozhong Liu",
    "display_name": "Yaozhong Liu",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AddrMiner: A Comprehensive Global Active IPv6 Address Discovery System",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2965,
    "paper_ids": [
      2783
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhongxiang Sun",
    "display_name": "Zhongxiang Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AddrMiner: A Comprehensive Global Active IPv6 Address Discovery System",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2966,
    "paper_ids": [
      2783
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Harsha Nori",
    "display_name": "Harsha Nori",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Primo: Practical Learning-Augmented Systems with Interpretable Models",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2967,
    "paper_ids": [
      731
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zuoru Yang",
    "display_name": "Zuoru Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Secure and Lightweight Deduplicated Storage via Shielded Deduplication-Before-Encryption",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2968,
    "paper_ids": [
      3819
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zirui Li",
    "display_name": "Zirui Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DVABatch: Diversity-aware Multi-Entry Multi-Exit Batching for Efficient Processing of DNN Services on GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2969,
    "paper_ids": [
      1086
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jie Li",
    "display_name": "Jie Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tetris: Memory-efficient Serverless Inference through Tensor Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2970,
    "paper_ids": [
      2791
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kunlin Zhan",
    "display_name": "Kunlin Zhan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tetris: Memory-efficient Serverless Inference through Tensor Sharing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2971,
    "paper_ids": [
      2791
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lilith Oberhauser",
    "display_name": "Lilith Oberhauser",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BBQ: A Block-based Bounded Queue for Exchanging Data and Profiling",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2972,
    "paper_ids": [
      36
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonas Oberhauser",
    "display_name": "Jonas Oberhauser",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BBQ: A Block-based Bounded Queue for Exchanging Data and Profiling",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2973,
    "paper_ids": [
      36
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Geng Chen",
    "display_name": "Geng Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BBQ: A Block-based Bounded Queue for Exchanging Data and Profiling",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2974,
    "paper_ids": [
      36
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yiming Zhang 0003",
    "display_name": "Yiming Zhang",
    "affiliation": "Xiamen University",
    "artifact_count": 1,
    "total_papers": 12,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "EUROSYS": 2,
      "FAST": 7,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "SC": {},
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      },
      "FAST": {
        "2020": 1,
        "2026": 3,
        "2023": 1,
        "2025": 2
      },
      "NSDI": {
        "2025": 1,
        "2015": 1
      }
    },
    "artifact_rate": 8.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "NVMe SSD Failures in the Field: the Fail-Stop and the Fail-Slow",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "skysync accelerating file synchronization with collaborative delta generation",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "mlsdisk trusted block storage for tees based on layered secure logging",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "parasync exploiting finegrained parallelism for efficient file synchronization",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "cheetah metadata aggregation for fast object storage without distributed ordering",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "atomicdisk a secure virtual disk for tees against eviction attacks",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "geminifs a companion file system for gpus",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "vegeta enabling parallel smart contract execution in leaderless blockchains",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "bandle asynchronous state machine replication made efficient",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "perseus a failslow detection framework for cloud storage systems",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "mapx controlled data migration in the expansion of decentralized objectbased storage systems",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "cubicring enabling onehop failure detection and recovery for distributed inmemory storage systems",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 2975,
    "paper_ids": [
      2087
    ],
    "papers_without_artifact_ids": [
      1044,
      1045,
      1046,
      1050,
      2814,
      3525,
      3627,
      4650,
      1062,
      3629,
      4597
    ]
  },
  {
    "name": "Zhaosheng Zhu",
    "display_name": "Zhaosheng Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 3,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2023": 3
      },
      "NSDI": {
        "2010": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "NVMe SSD Failures in the Field: the Fail-Stop and the Fail-Slow",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "perseus a failslow detection framework for cloud storage systems",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "more than capacity performanceoriented evolution of pangu in alibaba",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "fisc a largescale cloudnativeoriented file system",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "webprophet automating performance prediction for web services",
        "conference": "NSDI",
        "year": 2010
      }
    ],
    "author_id": 2976,
    "paper_ids": [
      2087
    ],
    "papers_without_artifact_ids": [
      1062,
      1063,
      1064,
      4933
    ]
  },
  {
    "name": "Mengtian Wang",
    "display_name": "Mengtian Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "NVMe SSD Failures in the Field: the Fail-Stop and the Fail-Slow",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "perseus a failslow detection framework for cloud storage systems",
        "conference": "FAST",
        "year": 2023
      }
    ],
    "author_id": 2977,
    "paper_ids": [
      2087
    ],
    "papers_without_artifact_ids": [
      1062
    ]
  },
  {
    "name": "Zongpeng Zhu",
    "display_name": "Zongpeng Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "NVMe SSD Failures in the Field: the Fail-Stop and the Fail-Slow",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "perseus a failslow detection framework for cloud storage systems",
        "conference": "FAST",
        "year": 2023
      }
    ],
    "author_id": 2978,
    "paper_ids": [
      2087
    ],
    "papers_without_artifact_ids": [
      1062
    ]
  },
  {
    "name": "Minglu Li 0001",
    "display_name": "Minglu Li",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "NVMe SSD Failures in the Field: the Fail-Stop and the Fail-Slow",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "perseus a failslow detection framework for cloud storage systems",
        "conference": "FAST",
        "year": 2023
      }
    ],
    "author_id": 2979,
    "paper_ids": [
      2087
    ],
    "papers_without_artifact_ids": [
      1062
    ]
  },
  {
    "name": "Zhe Zhou 0002",
    "display_name": "Zhe Zhou",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PetS: A Unified Framework for Parameter-Efficient Transformers Serving",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2980,
    "paper_ids": [
      4934
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xuechao Wei",
    "display_name": "Xuechao Wei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PetS: A Unified Framework for Parameter-Efficient Transformers Serving",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2981,
    "paper_ids": [
      4934
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiejing Zhang",
    "display_name": "Jiejing Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PetS: A Unified Framework for Parameter-Efficient Transformers Serving",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2982,
    "paper_ids": [
      4934
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guangyu Sun 0003",
    "display_name": "Guangyu Sun",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {},
      "FAST": {
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PetS: A Unified Framework for Parameter-Efficient Transformers Serving",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "xerxes extensive exploration of scalable hardware systems with cxlbased simulation framework",
        "conference": "FAST",
        "year": 2026
      }
    ],
    "author_id": 2983,
    "paper_ids": [
      4934
    ],
    "papers_without_artifact_ids": [
      649
    ]
  },
  {
    "name": "Jinwoo Hwang",
    "display_name": "Jinwoo Hwang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CoVA: Exploiting Compressed-Domain Analysis to Accelerate Video Analytics",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2984,
    "paper_ids": [
      3801
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minsu Kim 0004",
    "display_name": "Minsu Kim",
    "affiliation": "Mila - Quebec Artificial Intelligence Institute",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CoVA: Exploiting Compressed-Domain Analysis to Accelerate Video Analytics",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2985,
    "paper_ids": [
      3801
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daeun Kim",
    "display_name": "Daeun Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CoVA: Exploiting Compressed-Domain Analysis to Accelerate Video Analytics",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2986,
    "paper_ids": [
      3801
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seungho Nam",
    "display_name": "Seungho Nam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CoVA: Exploiting Compressed-Domain Analysis to Accelerate Video Analytics",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2987,
    "paper_ids": [
      3801
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yoonsung Kim",
    "display_name": "Yoonsung Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CoVA: Exploiting Compressed-Domain Analysis to Accelerate Video Analytics",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2988,
    "paper_ids": [
      3801
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dohee Kim",
    "display_name": "Dohee Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CoVA: Exploiting Compressed-Domain Analysis to Accelerate Video Analytics",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2989,
    "paper_ids": [
      3801
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hardik Sharma",
    "display_name": "Hardik Sharma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CoVA: Exploiting Compressed-Domain Analysis to Accelerate Video Analytics",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2990,
    "paper_ids": [
      3801
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minghua Wang",
    "display_name": "Minghua Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2991,
    "paper_ids": [
      760
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei He",
    "display_name": "Wei He",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "SC": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tossing in the dark practical bitflipping on graybox deep neural networks for runtime trojan injection",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "potential of interpreter specialization for data analysis",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 2992,
    "paper_ids": [
      760
    ],
    "papers_without_artifact_ids": [
      604,
      4935
    ]
  },
  {
    "name": "Zhe Wang 0017",
    "display_name": "Zhe Wang",
    "affiliation": "University of Chinese Academy of Sciences",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ATC": 1,
      "USENIXSEC": 3,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2022": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a tale of two paths toward a hybrid data plane for efficient farmemory applications",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "hive a hardwareassisted isolated execution environment for ebpf on aarch64",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "optfuzz optimization path guided fuzzing for javascript jit compilers",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "ferry stateaware symbolic execution for exploring statedependent program paths",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 2993,
    "paper_ids": [
      760
    ],
    "papers_without_artifact_ids": [
      1377,
      373,
      4936,
      255
    ]
  },
  {
    "name": "Chenggang Wu 0002",
    "display_name": "Chenggang Wu",
    "affiliation": "Chinese Academy of Sciences, State Key Laboratory of Computer Architecture, Huairou, Beijing, China",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ATC": 1,
      "USENIXSEC": 3,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2022": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a tale of two paths toward a hybrid data plane for efficient farmemory applications",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "hive a hardwareassisted isolated execution environment for ebpf on aarch64",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "optfuzz optimization path guided fuzzing for javascript jit compilers",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "ferry stateaware symbolic execution for exploring statedependent program paths",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 2994,
    "paper_ids": [
      760
    ],
    "papers_without_artifact_ids": [
      1377,
      373,
      4936,
      255
    ]
  },
  {
    "name": "Bin Tang 0002",
    "display_name": "Bin Tang",
    "affiliation": "VU Amsterdam",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FlatFS: Flatten Hierarchical File System Namespace on Non-volatile Memories",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2995,
    "paper_ids": [
      3831
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hao Huang 0011",
    "display_name": "Hao Huang",
    "affiliation": "HKUST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FlatFS: Flatten Hierarchical File System Namespace on Non-volatile Memories",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2996,
    "paper_ids": [
      3831
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Siyuan Wen",
    "display_name": "Siyuan Wen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SOTER: Guarding Black-box Inference for General Neural Networks at the Edge",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2997,
    "paper_ids": [
      770
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gang Yan 0002",
    "display_name": "Gang Yan",
    "affiliation": "Jilin University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards Latency Awareness for Content Delivery Network Caching",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2998,
    "paper_ids": [
      4937
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jian Li 0008",
    "display_name": "Jian Li",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards Latency Awareness for Content Delivery Network Caching",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 2999,
    "paper_ids": [
      4937
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "James Newsome",
    "display_name": "James Newsome",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 0,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "EUROSYS": {},
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Co-opting Linux Processes for High-Performance Network Simulation",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3000,
    "paper_ids": [
      1699
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhe Wang 0015",
    "display_name": "Zhe Wang",
    "affiliation": "Fudan University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Zero Overhead Monitoring for Cloud-native Infrastructure using RDMA",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diagnosing applicationnetwork anomalies for millions of ips in production clouds",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 3001,
    "paper_ids": [
      2660
    ],
    "papers_without_artifact_ids": [
      1935
    ]
  },
  {
    "name": "Linghe Kong",
    "display_name": "Linghe Kong",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Zero Overhead Monitoring for Cloud-native Infrastructure using RDMA",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diagnosing applicationnetwork anomalies for millions of ips in production clouds",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 3002,
    "paper_ids": [
      2660
    ],
    "papers_without_artifact_ids": [
      1935
    ]
  },
  {
    "name": "Zhenzao Wen",
    "display_name": "Zhenzao Wen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Zero Overhead Monitoring for Cloud-native Infrastructure using RDMA",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3003,
    "paper_ids": [
      2660
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jingxuan Li",
    "display_name": "Jingxuan Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Zero Overhead Monitoring for Cloud-native Infrastructure using RDMA",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diagnosing applicationnetwork anomalies for millions of ips in production clouds",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 3004,
    "paper_ids": [
      2660
    ],
    "papers_without_artifact_ids": [
      1935
    ]
  },
  {
    "name": "Yang Lu",
    "display_name": "Yang Lu",
    "affiliation": "University of Waterloo",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Zero Overhead Monitoring for Cloud-native Infrastructure using RDMA",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diagnosing applicationnetwork anomalies for millions of ips in production clouds",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 3005,
    "paper_ids": [
      2660
    ],
    "papers_without_artifact_ids": [
      1935
    ]
  },
  {
    "name": "Wei Cao 0006",
    "display_name": "Wei Cao",
    "affiliation": "University of North Texas",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Zero Overhead Monitoring for Cloud-native Infrastructure using RDMA",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fpgaaccelerated compactions for lsmbased keyvalue store",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 3006,
    "paper_ids": [
      2660
    ],
    "papers_without_artifact_ids": [
      4938
    ]
  },
  {
    "name": "Minhui Xie",
    "display_name": "Minhui Xie",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "EUROSYS": 1,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "SC": {},
      "EUROSYS": {
        "2022": 1
      },
      "FAST": {
        "2023": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pacman: An Efficient Compaction Approach for Log-Structured Key-Value Store on Persistent Memory",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "patronus highperformance and protective remote memory",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "citron distributed range lock management with onesided rdma",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "fleche an efficient gpu embedding cache for personalized recommendations",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 3007,
    "paper_ids": [
      1038
    ],
    "papers_without_artifact_ids": [
      1059,
      1060,
      1067
    ]
  },
  {
    "name": "Keji Huang",
    "display_name": "Keji Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pacman: An Efficient Compaction Approach for Log-Structured Key-Value Store on Persistent Memory",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "term extending rdmaattached memory with ssd",
        "conference": "FAST",
        "year": 2024
      }
    ],
    "author_id": 512,
    "paper_ids": [
      1038
    ],
    "papers_without_artifact_ids": [
      1056
    ]
  },
  {
    "name": "Eryu Guan",
    "display_name": "Eryu Guan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RunD: A Lightweight Secure Container Runtime for High-density Deployment and High-concurrency Startup in Serverless Computing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3008,
    "paper_ids": [
      1087
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zizheng Bian",
    "display_name": "Zizheng Bian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RunD: A Lightweight Secure Container Runtime for High-density Deployment and High-concurrency Startup in Serverless Computing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3009,
    "paper_ids": [
      1087
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yi Tao",
    "display_name": "Yi Tao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RunD: A Lightweight Secure Container Runtime for High-density Deployment and High-concurrency Startup in Serverless Computing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3010,
    "paper_ids": [
      1087
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bin Zha",
    "display_name": "Bin Zha",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RunD: A Lightweight Secure Container Runtime for High-density Deployment and High-concurrency Startup in Serverless Computing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3011,
    "paper_ids": [
      1087
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weidong Han 0003",
    "display_name": "Weidong Han",
    "affiliation": "Alibaba Group, Hang Zhou, China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      },
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RunD: A Lightweight Secure Container Runtime for High-density Deployment and High-concurrency Startup in Serverless Computing",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pvm efficient shadow paging for deploying secure containers in cloudnative environment",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 3012,
    "paper_ids": [
      1087
    ],
    "papers_without_artifact_ids": [
      1936
    ]
  },
  {
    "name": "Hongjing Huang",
    "display_name": "Hongjing Huang",
    "affiliation": "George Washington University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FpgaNIC: An FPGA-based Versatile 100Gb SmartNIC for GPUs",
        "conference": "ATC",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3013,
    "paper_ids": [
      3833
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiyang Chen",
    "display_name": "Jiyang Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "vFPIO: A Virtual I/O Abstraction for FPGA-accelerated I/O Devices",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3014,
    "paper_ids": [
      2136
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Atsushi Koshiba",
    "display_name": "Atsushi Koshiba",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "vFPIO: A Virtual I/O Abstraction for FPGA-accelerated I/O Devices",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3015,
    "paper_ids": [
      2136
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Li Zhang 0133",
    "display_name": "Li Zhang",
    "affiliation": "Beijing University of Posts and Telecommunications (BUPT), Key Laboratory of Networking and Switching Technology, Beijing, China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More is Different: Prototyping and Analyzing a New Form of Edge Server with Massive Mobile SoCs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "highdensity mobile cloud gaming on edge soc clusters",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 3016,
    "paper_ids": [
      3842
    ],
    "papers_without_artifact_ids": [
      3844
    ]
  },
  {
    "name": "Zhe Fu",
    "display_name": "Zhe Fu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More is Different: Prototyping and Analyzing a New Form of Edge Server with Massive Mobile SoCs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3017,
    "paper_ids": [
      3842
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Boqing Shi",
    "display_name": "Boqing Shi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More is Different: Prototyping and Analyzing a New Form of Edge Server with Massive Mobile SoCs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3018,
    "paper_ids": [
      3842
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiang Li 0067",
    "display_name": "Xiang Li",
    "affiliation": "East China Normal University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 2
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More is Different: Prototyping and Analyzing a New Form of Edge Server with Massive Mobile SoCs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fwdllm efficient federated finetuning of large language models with perturbed inferences",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "megascale scaling large language model training to more than 10 000 gpus",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 3019,
    "paper_ids": [
      3842
    ],
    "papers_without_artifact_ids": [
      3845,
      1001
    ]
  },
  {
    "name": "Rujin Lai",
    "display_name": "Rujin Lai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More is Different: Prototyping and Analyzing a New Form of Edge Server with Massive Mobile SoCs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3020,
    "paper_ids": [
      3842
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chenyang Yang 0004",
    "display_name": "Chenyang Yang",
    "affiliation": "vclusters",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More is Different: Prototyping and Analyzing a New Form of Edge Server with Massive Mobile SoCs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3021,
    "paper_ids": [
      3842
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ao Zhou 0001",
    "display_name": "Ao Zhou",
    "affiliation": "BUPT",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More is Different: Prototyping and Analyzing a New Form of Edge Server with Massive Mobile SoCs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fedrdma communicationefficient crosssilo federated llm via chunked rdma transmission",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 3022,
    "paper_ids": [
      3842
    ],
    "papers_without_artifact_ids": [
      3846
    ]
  },
  {
    "name": "Xiao Ma 0009",
    "display_name": "Xiao Ma",
    "affiliation": "Beijing University of Posts and Telecommunications, School of Computing, State Key Laboratory of Networking and Switching Technology, Beijing, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More is Different: Prototyping and Analyzing a New Form of Edge Server with Massive Mobile SoCs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3023,
    "paper_ids": [
      3842
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Oto Mraz",
    "display_name": "Oto Mraz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pecan: Cost-Efficient ML Data Preprocessing with Automatic Transformation Ordering and Hybrid Placement",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3024,
    "paper_ids": [
      1667
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muyu Li",
    "display_name": "Muyu Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pecan: Cost-Efficient ML Data Preprocessing with Automatic Transformation Ordering and Hybrid Placement",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3025,
    "paper_ids": [
      1667
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohammad Sepehr Pourghannad",
    "display_name": "Mohammad Sepehr Pourghannad",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pecan: Cost-Efficient ML Data Preprocessing with Automatic Transformation Ordering and Hybrid Placement",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3026,
    "paper_ids": [
      1667
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rui Wang 0076",
    "display_name": "Rui Wang",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {},
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficient Large Graph Processing with Chunk-Based Graph Representation Model",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cclbtree a crashconsistent localityaware btree for reducing xpbufferinduced write amplification in persistent memory",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 3027,
    "paper_ids": [
      4939
    ],
    "papers_without_artifact_ids": [
      3836
    ]
  },
  {
    "name": "Weixu Zong",
    "display_name": "Weixu Zong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficient Large Graph Processing with Chunk-Based Graph Representation Model",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3028,
    "paper_ids": [
      4939
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuibing He",
    "display_name": "Shuibing He",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "EUROSYS": 1,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {},
      "EUROSYS": {
        "2024": 1
      },
      "FAST": {
        "2025": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficient Large Graph Processing with Chunk-Based Graph Representation Model",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "leapgnn accelerating distributed gnn training leveraging featurecentric model migration",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "impress an importanceinformed multitier prefix kv storage system for large language model inference",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "cclbtree a crashconsistent localityaware btree for reducing xpbufferinduced write amplification in persistent memory",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 1051,
    "paper_ids": [
      4939
    ],
    "papers_without_artifact_ids": [
      4940,
      4941,
      3836
    ]
  },
  {
    "name": "Xinyu Chen",
    "display_name": "Xinyu Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficient Large Graph Processing with Chunk-Based Graph Representation Model",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3029,
    "paper_ids": [
      4939
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhenxin Li",
    "display_name": "Zhenxin Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficient Large Graph Processing with Chunk-Based Graph Representation Model",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cclbtree a crashconsistent localityaware btree for reducing xpbufferinduced write amplification in persistent memory",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 3030,
    "paper_ids": [
      4939
    ],
    "papers_without_artifact_ids": [
      3836
    ]
  },
  {
    "name": "Zheng Dang",
    "display_name": "Zheng Dang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficient Large Graph Processing with Chunk-Based Graph Representation Model",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cclbtree a crashconsistent localityaware btree for reducing xpbufferinduced write amplification in persistent memory",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 3031,
    "paper_ids": [
      4939
    ],
    "papers_without_artifact_ids": [
      3836
    ]
  },
  {
    "name": "Zhixin Wen",
    "display_name": "Zhixin Wen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HiP4-UPF: Towards High-Performance Comprehensive 5G User Plane Function on P4 Programmable Switches",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vet5g a virtual endtoend testbed for 5g network security experimentation",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 3032,
    "paper_ids": [
      4942
    ],
    "papers_without_artifact_ids": [
      4943
    ]
  },
  {
    "name": "Guanhua Yan",
    "display_name": "Guanhua Yan",
    "affiliation": "Binghamton University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "ACSAC": 0,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "ACSAC": {},
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HiP4-UPF: Towards High-Performance Comprehensive 5G User Plane Function on P4 Programmable Switches",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vet5g a virtual endtoend testbed for 5g network security experimentation",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 3033,
    "paper_ids": [
      4942
    ],
    "papers_without_artifact_ids": [
      4943
    ]
  },
  {
    "name": "Xiurui Pan",
    "display_name": "Xiurui Pan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ScalaAFA: Constructing User-Space All-Flash Array Engine with Holistic Designs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3034,
    "paper_ids": [
      2779
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qiang Li",
    "display_name": "Qiang Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ScalaAFA: Constructing User-Space All-Flash Array Engine with Holistic Designs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tickets or privacy understand the ecosystem of chinese ticket grabbing apps",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3035,
    "paper_ids": [
      2779
    ],
    "papers_without_artifact_ids": [
      911
    ]
  },
  {
    "name": "Bo Mao 0003",
    "display_name": "Bo Mao",
    "affiliation": "Hong Kong Baptist University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "ACSAC": 0,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "ACSAC": {},
      "FAST": {
        "2009": 1,
        "2026": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ScalaAFA: Constructing User-Space All-Flash Array Engine with Holistic Designs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "xerxes extensive exploration of scalable hardware systems with cxlbased simulation framework",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "workout io workload outsourcing for boosting raid reconstruction performance",
        "conference": "FAST",
        "year": 2009
      }
    ],
    "author_id": 3036,
    "paper_ids": [
      2779
    ],
    "papers_without_artifact_ids": [
      649,
      2114
    ]
  },
  {
    "name": "Xingguo Pang",
    "display_name": "Xingguo Pang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Expeditious High-Concurrency MicroVM SnapStart in Persistent Memory with an Augmented Hypervisor",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3037,
    "paper_ids": [
      3848
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yanze Zhang",
    "display_name": "Yanze Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Expeditious High-Concurrency MicroVM SnapStart in Persistent Memory with an Augmented Hypervisor",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3038,
    "paper_ids": [
      3848
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chengzhong Xu 0001",
    "display_name": "Chengzhong Xu",
    "affiliation": "University of Macau",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {},
      "EUROSYS": {
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Expeditious High-Concurrency MicroVM SnapStart in Persistent Memory with an Augmented Hypervisor",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "multiplexing dynamic deep learning workloads with sloawareness in gpu clusters",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "understanding and optimizing workloads for unified resource management in large cloud platforms",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 3039,
    "paper_ids": [
      3848
    ],
    "papers_without_artifact_ids": [
      4944,
      4945
    ]
  },
  {
    "name": "Junghan Yoon",
    "display_name": "Junghan Yoon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "mmTLS: Scaling the Performance of Encrypted Network Traffic Inspection",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3040,
    "paper_ids": [
      2155
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seunghyun Do",
    "display_name": "Seunghyun Do",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "mmTLS: Scaling the Performance of Encrypted Network Traffic Inspection",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3041,
    "paper_ids": [
      2155
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Duckwoo Kim",
    "display_name": "Duckwoo Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "mmTLS: Scaling the Performance of Encrypted Network Traffic Inspection",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3042,
    "paper_ids": [
      2155
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "KyoungSoo Park",
    "display_name": "KyoungSoo Park",
    "affiliation": "KAIST",
    "artifact_count": 1,
    "total_papers": 14,
    "total_papers_by_conf": {
      "ATC": 1,
      "NSDI": 13,
      "NDSS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "NSDI": {
        "2021": 1,
        "2009": 1,
        "2014": 1,
        "2017": 2,
        "2019": 1,
        "2023": 2,
        "2006": 2,
        "2016": 1,
        "2020": 1,
        "2011": 1
      },
      "NDSS": {},
      "OSDI": {}
    },
    "artifact_rate": 7.1,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "mmTLS: Scaling the Performance of Encrypted Network Traffic Inspection",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ark gpudriven code execution for distributed deep learning",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "rearchitecting the tcp stack for iooffloaded content delivery",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "elastic resource sharing for distributed deep learning",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "acceltcp accelerating network applications with stateful tcp offloading",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "hyperscan a fast multipattern regex matcher for modern cpus",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "mos a reusable networking stack for flow monitoring middleboxes",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "apunet revitalizing gpu as packet processing accelerator",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "dfc accelerating string pattern matching for network applications",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "mtcp a highly scalable userlevel tcp stack for multicore systems",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "sslshader cheap ssl acceleration with commodity processors",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "hashcache cache storage for the next billion",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "scale and performance in the coblitz largefile distribution service",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "connection conditioning architectureindependent support for simple robust servers",
        "conference": "NSDI",
        "year": 2006
      }
    ],
    "author_id": 3043,
    "paper_ids": [
      2155
    ],
    "papers_without_artifact_ids": [
      3460,
      356,
      4946,
      4947,
      4948,
      4783,
      4949,
      4784,
      4786,
      4781,
      4950,
      4951,
      4952
    ]
  },
  {
    "name": "Ronglong Wu",
    "display_name": "Ronglong Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Removing Obstacles before Breaking Through the Memory Wall: A Close Look at HBM Errors in the Field",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3044,
    "paper_ids": [
      1039
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuyue Zhou",
    "display_name": "Shuyue Zhou",
    "affiliation": "USTC",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Removing Obstacles before Breaking Through the Memory Wall: A Close Look at HBM Errors in the Field",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3045,
    "paper_ids": [
      1039
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiahao Lu 0003",
    "display_name": "Jiahao Lu",
    "affiliation": "Xiamen University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Removing Obstacles before Breaking Through the Memory Wall: A Close Look at HBM Errors in the Field",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3046,
    "paper_ids": [
      1039
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zikang Xu",
    "display_name": "Zikang Xu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Removing Obstacles before Breaking Through the Memory Wall: A Close Look at HBM Errors in the Field",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3047,
    "paper_ids": [
      1039
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kunlin Yang",
    "display_name": "Kunlin Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Removing Obstacles before Breaking Through the Memory Wall: A Close Look at HBM Errors in the Field",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3048,
    "paper_ids": [
      1039
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Feilong Lin",
    "display_name": "Feilong Lin",
    "affiliation": "National Chiao Tung University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Removing Obstacles before Breaking Through the Memory Wall: A Close Look at HBM Errors in the Field",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3049,
    "paper_ids": [
      1039
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yiming Zhang",
    "display_name": "Yiming Zhang",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {},
      "FAST": {
        "2026": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Removing Obstacles before Breaking Through the Memory Wall: A Close Look at HBM Errors in the Field",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rosenbridge a framework for enabling express io paths across the virtualization boundary",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "infinifs an efficient metadata service for largescale distributed filesystems",
        "conference": "FAST",
        "year": 2022
      }
    ],
    "author_id": 3050,
    "paper_ids": [
      1039
    ],
    "papers_without_artifact_ids": [
      1047,
      1068
    ]
  },
  {
    "name": "Yicheng Gu",
    "display_name": "Yicheng Gu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "gVulkan: Scalable GPU Pooling for Pixel-Grained Rendering in Ray Tracing",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3051,
    "paper_ids": [
      1682
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yun Wang 0039",
    "display_name": "Yun Wang",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "gVulkan: Scalable GPU Pooling for Pixel-Grained Rendering in Ray Tracing",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3052,
    "paper_ids": [
      1682
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunfan Sun",
    "display_name": "Yunfan Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "gVulkan: Scalable GPU Pooling for Pixel-Grained Rendering in Ray Tracing",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3053,
    "paper_ids": [
      1682
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuxin Xiang",
    "display_name": "Yuxin Xiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "gVulkan: Scalable GPU Pooling for Pixel-Grained Rendering in Ray Tracing",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3054,
    "paper_ids": [
      1682
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xuyan Hu",
    "display_name": "Xuyan Hu",
    "affiliation": "University of Notre Dame",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "gVulkan: Scalable GPU Pooling for Pixel-Grained Rendering in Ray Tracing",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3055,
    "paper_ids": [
      1682
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhengwei Qi",
    "display_name": "Zhengwei Qi",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {},
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "gVulkan: Scalable GPU Pooling for Pixel-Grained Rendering in Ray Tracing",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3056,
    "paper_ids": [
      1682
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinghao Jia",
    "display_name": "Jinghao Jia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fast (Trapless) Kernel Probes Everywhere",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3057,
    "paper_ids": [
      620
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chuandong Li 0004",
    "display_name": "Chuandong Li",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 0,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Taming Hot Bloat Under Virtualization with HUGESCOPE",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vtmm tiered memory management for virtual machines",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 3058,
    "paper_ids": [
      647
    ],
    "papers_without_artifact_ids": [
      4953
    ]
  },
  {
    "name": "Sai Sha",
    "display_name": "Sai Sha",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Taming Hot Bloat Under Virtualization with HUGESCOPE",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vtmm tiered memory management for virtual machines",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 3059,
    "paper_ids": [
      647
    ],
    "papers_without_artifact_ids": [
      4953
    ]
  },
  {
    "name": "Yangqing Zeng",
    "display_name": "Yangqing Zeng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Taming Hot Bloat Under Virtualization with HUGESCOPE",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3060,
    "paper_ids": [
      647
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiran Yang",
    "display_name": "Xiran Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Taming Hot Bloat Under Virtualization with HUGESCOPE",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3061,
    "paper_ids": [
      647
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yingwei Luo",
    "display_name": "Yingwei Luo",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 0,
      "SC": 0,
      "EUROSYS": 1,
      "FAST": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SOSP": {},
      "SC": {},
      "EUROSYS": {
        "2023": 1
      },
      "FAST": {
        "2026": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Taming Hot Bloat Under Virtualization with HUGESCOPE",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "xerxes extensive exploration of scalable hardware systems with cxlbased simulation framework",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "characterization of large language model development in the datacenter",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "vtmm tiered memory management for virtual machines",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 3062,
    "paper_ids": [
      647
    ],
    "papers_without_artifact_ids": [
      649,
      741,
      4953
    ]
  },
  {
    "name": "Xiaolin Wang 0001",
    "display_name": "Xiaolin Wang",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 0,
      "SC": 0,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SOSP": {},
      "SC": {},
      "EUROSYS": {
        "2023": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Taming Hot Bloat Under Virtualization with HUGESCOPE",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "characterization of large language model development in the datacenter",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "vtmm tiered memory management for virtual machines",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 3063,
    "paper_ids": [
      647
    ],
    "papers_without_artifact_ids": [
      741,
      4953
    ]
  },
  {
    "name": "Zhenlin Wang 0003",
    "display_name": "Zhenlin Wang",
    "affiliation": "Michigan Technological University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 0,
      "SC": 0,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SOSP": {},
      "SC": {},
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Taming Hot Bloat Under Virtualization with HUGESCOPE",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vtmm tiered memory management for virtual machines",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 3064,
    "paper_ids": [
      647
    ],
    "papers_without_artifact_ids": [
      4953
    ]
  },
  {
    "name": "David Hildenbrand",
    "display_name": "David Hildenbrand",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Every Mapping Counts in Large Amounts: Folio Accounting",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3065,
    "paper_ids": [
      3577
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sergey Egorov",
    "display_name": "Sergey Egorov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Mangosteen: Fast Transparent Durability for Linearizable Applications using NVM",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3066,
    "paper_ids": [
      4954
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gregory V. Chockler",
    "display_name": "Gregory V. Chockler",
    "affiliation": "Royal Holloway University of London, Department of Computer Science, UK",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Mangosteen: Fast Transparent Durability for Linearizable Applications using NVM",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3067,
    "paper_ids": [
      4954
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Brijesh Dongol",
    "display_name": "Brijesh Dongol",
    "affiliation": "University of Surrey",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Mangosteen: Fast Transparent Durability for Linearizable Applications using NVM",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3068,
    "paper_ids": [
      4954
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dan O'Keeffe",
    "display_name": "Dan O'Keeffe",
    "affiliation": "Royal Holloway Univ. of London",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "EUROSYS": {},
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Mangosteen: Fast Transparent Durability for Linearizable Applications using NVM",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3069,
    "paper_ids": [
      4954
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sadegh Keshavarzi",
    "display_name": "Sadegh Keshavarzi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Mangosteen: Fast Transparent Durability for Linearizable Applications using NVM",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3070,
    "paper_ids": [
      4954
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tong Sun 0006",
    "display_name": "Tong Sun",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SimEnc: A High-Performance Similarity-Preserving Encryption Approach for Deduplication of Encrypted Docker Images",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3071,
    "paper_ids": [
      4955
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bowen Jiang",
    "display_name": "Bowen Jiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SimEnc: A High-Performance Similarity-Preserving Encryption Approach for Deduplication of Encrypted Docker Images",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "securityperformance tradeoff in dagbased proofofwork blockchain protocols",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 3072,
    "paper_ids": [
      4955
    ],
    "papers_without_artifact_ids": [
      4956
    ]
  },
  {
    "name": "Borui Li 0001",
    "display_name": "Borui Li",
    "affiliation": "University of Texas at Dallas",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SimEnc: A High-Performance Similarity-Preserving Encryption Approach for Deduplication of Encrypted Docker Images",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "linklab 20 a multitenant programmable iot testbed for experimentation with edgecloud integration",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 3073,
    "paper_ids": [
      4955
    ],
    "papers_without_artifact_ids": [
      4601
    ]
  },
  {
    "name": "Jiamei Lv",
    "display_name": "Jiamei Lv",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SimEnc: A High-Performance Similarity-Preserving Encryption Approach for Deduplication of Encrypted Docker Images",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3074,
    "paper_ids": [
      4955
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yi Gao 0001",
    "display_name": "Yi Gao",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SimEnc: A High-Performance Similarity-Preserving Encryption Approach for Deduplication of Encrypted Docker Images",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "linklab 20 a multitenant programmable iot testbed for experimentation with edgecloud integration",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 3075,
    "paper_ids": [
      4955
    ],
    "papers_without_artifact_ids": [
      4601
    ]
  },
  {
    "name": "Wei Dong 0001",
    "display_name": "Wei Dong",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SimEnc: A High-Performance Similarity-Preserving Encryption Approach for Deduplication of Encrypted Docker Images",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "linklab 20 a multitenant programmable iot testbed for experimentation with edgecloud integration",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 3076,
    "paper_ids": [
      4955
    ],
    "papers_without_artifact_ids": [
      4601
    ]
  },
  {
    "name": "Haojun Xia",
    "display_name": "Haojun Xia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Quant-LLM: Accelerating the Serving of Large Language Models via FP6-Centric Algorithm-System Co-Design on Modern GPUs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mononn enabling a new monolithic optimization space for neural network inference tasks on modern gpucentric architectures",
        "conference": "OSDI",
        "year": 2024
      }
    ],
    "author_id": 3077,
    "paper_ids": [
      2788
    ],
    "papers_without_artifact_ids": [
      2789
    ]
  },
  {
    "name": "Xiaoxia Wu",
    "display_name": "Xiaoxia Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Quant-LLM: Accelerating the Serving of Large Language Models via FP6-Centric Algorithm-System Co-Design on Modern GPUs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3078,
    "paper_ids": [
      2788
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shiyang Chen 0004",
    "display_name": "Shiyang Chen",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Quant-LLM: Accelerating the Serving of Large Language Models via FP6-Centric Algorithm-System Co-Design on Modern GPUs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "et rethinking selfattention for transformer models on gpus",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 3079,
    "paper_ids": [
      2788
    ],
    "papers_without_artifact_ids": [
      3588
    ]
  },
  {
    "name": "Zhewei Yao",
    "display_name": "Zhewei Yao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Quant-LLM: Accelerating the Serving of Large Language Models via FP6-Centric Algorithm-System Co-Design on Modern GPUs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3080,
    "paper_ids": [
      2788
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stephen Youn",
    "display_name": "Stephen Youn",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Quant-LLM: Accelerating the Serving of Large Language Models via FP6-Centric Algorithm-System Co-Design on Modern GPUs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3081,
    "paper_ids": [
      2788
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arash Bakhtiari",
    "display_name": "Arash Bakhtiari",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Quant-LLM: Accelerating the Serving of Large Language Models via FP6-Centric Algorithm-System Co-Design on Modern GPUs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3082,
    "paper_ids": [
      2788
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Wyatt",
    "display_name": "Michael Wyatt",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Quant-LLM: Accelerating the Serving of Large Language Models via FP6-Centric Algorithm-System Co-Design on Modern GPUs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3083,
    "paper_ids": [
      2788
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Donglin Zhuang",
    "display_name": "Donglin Zhuang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Quant-LLM: Accelerating the Serving of Large Language Models via FP6-Centric Algorithm-System Co-Design on Modern GPUs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mononn enabling a new monolithic optimization space for neural network inference tasks on modern gpucentric architectures",
        "conference": "OSDI",
        "year": 2024
      }
    ],
    "author_id": 3084,
    "paper_ids": [
      2788
    ],
    "papers_without_artifact_ids": [
      2789
    ]
  },
  {
    "name": "Zhongzhu Zhou",
    "display_name": "Zhongzhu Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Quant-LLM: Accelerating the Serving of Large Language Models via FP6-Centric Algorithm-System Co-Design on Modern GPUs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3085,
    "paper_ids": [
      2788
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sugi Lee",
    "display_name": "Sugi Lee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PeRF: Preemption-enabled RDMA Framework",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3086,
    "paper_ids": [
      4957
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingyu Choi",
    "display_name": "Mingyu Choi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PeRF: Preemption-enabled RDMA Framework",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3087,
    "paper_ids": [
      4957
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ikjun Yeom",
    "display_name": "Ikjun Yeom",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PeRF: Preemption-enabled RDMA Framework",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3088,
    "paper_ids": [
      4957
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Younghoon Kim",
    "display_name": "Younghoon Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "NSDI": {
        "2017": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PeRF: Preemption-enabled RDMA Framework",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "viewmap sharing private invehicle dashcam videos",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 3089,
    "paper_ids": [
      4957
    ],
    "papers_without_artifact_ids": [
      4958
    ]
  },
  {
    "name": "Mikhail Khalilov",
    "display_name": "Mikhail Khalilov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OSMOSIS: Enabling Multi-Tenancy in Datacenter SmartNICs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3090,
    "paper_ids": [
      753
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marcin Chrapek",
    "display_name": "Marcin Chrapek",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OSMOSIS: Enabling Multi-Tenancy in Datacenter SmartNICs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3091,
    "paper_ids": [
      753
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Siyuan Shen",
    "display_name": "Siyuan Shen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OSMOSIS: Enabling Multi-Tenancy in Datacenter SmartNICs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3092,
    "paper_ids": [
      753
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alessandro Vezzu",
    "display_name": "Alessandro Vezzu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OSMOSIS: Enabling Multi-Tenancy in Datacenter SmartNICs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3093,
    "paper_ids": [
      753
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas Benz",
    "display_name": "Thomas Benz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OSMOSIS: Enabling Multi-Tenancy in Datacenter SmartNICs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3094,
    "paper_ids": [
      753
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Luca Benini",
    "display_name": "Luca Benini",
    "affiliation": "ETH Zurich",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OSMOSIS: Enabling Multi-Tenancy in Datacenter SmartNICs",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3095,
    "paper_ids": [
      753
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Keita Suzuki",
    "display_name": "Keita Suzuki",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Balancing Analysis Time and Bug Detection: Daily Development-friendly Bug Detection in Linux",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3096,
    "paper_ids": [
      4959
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kenta Ishiguro",
    "display_name": "Kenta Ishiguro",
    "affiliation": "Keio University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Balancing Analysis Time and Bug Detection: Daily Development-friendly Bug Detection in Linux",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "zpoline a system call hook mechanism based on binary rewriting",
        "conference": "ATC",
        "year": 2023
      }
    ],
    "author_id": 3097,
    "paper_ids": [
      4959
    ],
    "papers_without_artifact_ids": [
      4960
    ]
  },
  {
    "name": "Kenji Kono",
    "display_name": "Kenji Kono",
    "affiliation": "Keio University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 0,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "EUROSYS": {},
      "ACSAC": {
        "2017": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Balancing Analysis Time and Bug Detection: Daily Development-friendly Bug Detection in Linux",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "nioh hardening the hypervisor by filtering illegal io requests to virtual devices",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 3098,
    "paper_ids": [
      4959
    ],
    "papers_without_artifact_ids": [
      4961
    ]
  },
  {
    "name": "Yuqi Fu",
    "display_name": "Yuqi Fu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {},
      "FAST": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ALPS: An Adaptive Learning, Priority OS Scheduler for Serverless Functions",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shade enable fundamental cacheability for distributed deep learning training",
        "conference": "FAST",
        "year": 2023
      }
    ],
    "author_id": 3099,
    "paper_ids": [
      3702
    ],
    "papers_without_artifact_ids": [
      4814
    ]
  },
  {
    "name": "Ruizhe Shi",
    "display_name": "Ruizhe Shi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ALPS: An Adaptive Learning, Priority OS Scheduler for Serverless Functions",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3100,
    "paper_ids": [
      3702
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Songqing Chen",
    "display_name": "Songqing Chen",
    "affiliation": "George Mason University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "ACSAC": 0,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {},
      "ACSAC": {},
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ALPS: An Adaptive Learning, Priority OS Scheduler for Serverless Functions",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3101,
    "paper_ids": [
      3702
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yue Cheng 0001",
    "display_name": "Yue Cheng",
    "affiliation": "University of Virginia",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 1,
      "EUROSYS": 0,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {
        "2021": 1
      },
      "EUROSYS": {},
      "FAST": {
        "2020": 1,
        "2018": 1,
        "2023": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ALPS: An Adaptive Learning, Priority OS Scheduler for Serverless Functions",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shade enable fundamental cacheability for distributed deep learning training",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "fedat a highperformance and communicationefficient federated learning system with asynchronous tiers",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "infinicache exploiting ephemeral serverless functions to build a costeffective memory cache",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "improving docker registry design based on production workload analysis",
        "conference": "FAST",
        "year": 2018
      }
    ],
    "author_id": 3102,
    "paper_ids": [
      3702
    ],
    "papers_without_artifact_ids": [
      4814,
      4817,
      3498,
      4815
    ]
  },
  {
    "name": "Archit Patke",
    "display_name": "Archit Patke",
    "affiliation": "University of Illinois Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {},
      "EUROSYS": {
        "2022": 1
      },
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Power-aware Deep Learning Model Serving with μ-Serve",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reinforcement learning for resource management in multitenant serverless platforms",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "measuring congestion in highperformance datacenter interconnects",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 3103,
    "paper_ids": [
      2644
    ],
    "papers_without_artifact_ids": [
      2648,
      3851
    ]
  },
  {
    "name": "Shengkun Cui",
    "display_name": "Shengkun Cui",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Power-aware Deep Learning Model Serving with μ-Serve",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3104,
    "paper_ids": [
      2644
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zbigniew Kalbarczyk",
    "display_name": "Zbigniew Kalbarczyk",
    "affiliation": "University of Illinois Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {},
      "USENIXSEC": {
        "2024": 1
      },
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Power-aware Deep Learning Model Serving with μ-Serve",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "true attacks attack attempts or benign triggers an empirical measurement of network alerts in a security operations center",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "measuring congestion in highperformance datacenter interconnects",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 3105,
    "paper_ids": [
      2644
    ],
    "papers_without_artifact_ids": [
      1531,
      3851
    ]
  },
  {
    "name": "Shubham Chaudhary 0006",
    "display_name": "Shubham Chaudhary",
    "affiliation": "Indraprastha Institute of Information Technology, Delhi",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TileClipper: Lightweight Selection of Regions of Interest from Videos for Traffic Surveillance",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3106,
    "paper_ids": [
      4962
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aryan Taneja",
    "display_name": "Aryan Taneja",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TileClipper: Lightweight Selection of Regions of Interest from Videos for Traffic Surveillance",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3107,
    "paper_ids": [
      4962
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anjali Singh",
    "display_name": "Anjali Singh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TileClipper: Lightweight Selection of Regions of Interest from Videos for Traffic Surveillance",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3108,
    "paper_ids": [
      4962
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Purbasha Roy",
    "display_name": "Purbasha Roy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TileClipper: Lightweight Selection of Regions of Interest from Videos for Traffic Surveillance",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3109,
    "paper_ids": [
      4962
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sohum Sikdar",
    "display_name": "Sohum Sikdar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TileClipper: Lightweight Selection of Regions of Interest from Videos for Traffic Surveillance",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3110,
    "paper_ids": [
      4962
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mukulika Maity",
    "display_name": "Mukulika Maity",
    "affiliation": "IIIT Delhi",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "PETS": {
        "2020": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TileClipper: Lightweight Selection of Regions of Interest from Videos for Traffic Surveillance",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dolphin a cellular voice based internet shutdown resistance system",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "the road not taken rethinking the feasibility of voice calling over tor",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 3111,
    "paper_ids": [
      4962
    ],
    "papers_without_artifact_ids": [
      4594,
      4596
    ]
  },
  {
    "name": "Arani Bhattacharya",
    "display_name": "Arani Bhattacharya",
    "affiliation": "IIIT Delhi",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TileClipper: Lightweight Selection of Regions of Interest from Videos for Traffic Surveillance",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3112,
    "paper_ids": [
      4962
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yijie Zhong",
    "display_name": "Yijie Zhong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "UniMem: Redesigning Disaggregated Memory within A Unified Local-Remote Memory Hierarchy",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3113,
    "paper_ids": [
      1040
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minqiang Zhou",
    "display_name": "Minqiang Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "UniMem: Redesigning Disaggregated Memory within A Unified Local-Remote Memory Hierarchy",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3114,
    "paper_ids": [
      1040
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bin Yang 0043",
    "display_name": "Bin Yang",
    "affiliation": "Tianjin University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "FAST": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {},
      "FAST": {
        "2023": 1,
        "2019": 1
      },
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Full Lifecycle Data Analysis on a Large-scale and Leadership Supercomputer: What Can We Learn from It?",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hadafs a file system bridging the local and shared burst buffer for exascale supercomputers",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "automatic applicationaware io forwarding resource allocation",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "endtoend io monitoring on a leading supercomputer",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 3115,
    "paper_ids": [
      3592
    ],
    "papers_without_artifact_ids": [
      3593,
      2101,
      2102
    ]
  },
  {
    "name": "Wenhao Zhu",
    "display_name": "Wenhao Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Full Lifecycle Data Analysis on a Large-scale and Leadership Supercomputer: What Can We Learn from It?",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3116,
    "paper_ids": [
      3592
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuhao Zhang",
    "display_name": "Yuhao Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Full Lifecycle Data Analysis on a Large-scale and Leadership Supercomputer: What Can We Learn from It?",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3117,
    "paper_ids": [
      3592
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yinxiao Feng",
    "display_name": "Yinxiao Feng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Evaluating Chiplet-based Large-Scale Interconnection Networks via Cycle-Accurate Packet-Parallel Simulation",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3118,
    "paper_ids": [
      4963
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuchen Wei",
    "display_name": "Yuchen Wei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Evaluating Chiplet-based Large-Scale Interconnection Networks via Cycle-Accurate Packet-Parallel Simulation",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3119,
    "paper_ids": [
      4963
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dong Xiang",
    "display_name": "Dong Xiang",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Evaluating Chiplet-based Large-Scale Interconnection Networks via Cycle-Accurate Packet-Parallel Simulation",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "netbouncer active device and link failure localization in data center networks",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 3120,
    "paper_ids": [
      4963
    ],
    "papers_without_artifact_ids": [
      2854
    ]
  },
  {
    "name": "Kaisheng Ma",
    "display_name": "Kaisheng Ma",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Evaluating Chiplet-based Large-Scale Interconnection Networks via Cycle-Accurate Packet-Parallel Simulation",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3121,
    "paper_ids": [
      4963
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kinman Lei",
    "display_name": "Kinman Lei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PUZZLE: Efficiently Aligning Large Language Models through Light-Weight Context Switch",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3122,
    "paper_ids": [
      2098
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingshu Zhai",
    "display_name": "Mingshu Zhai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PUZZLE: Efficiently Aligning Large Language Models through Light-Weight Context Switch",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "smartmoe efficiently training sparselyactivated models through combining offline and online parallelization",
        "conference": "ATC",
        "year": 2023
      }
    ],
    "author_id": 3123,
    "paper_ids": [
      2098
    ],
    "papers_without_artifact_ids": [
      2100
    ]
  },
  {
    "name": "Haoxing Ye",
    "display_name": "Haoxing Ye",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PUZZLE: Efficiently Aligning Large Language Models through Light-Weight Context Switch",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3124,
    "paper_ids": [
      2098
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Di Chai",
    "display_name": "Di Chai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Decentralized Federated Singular Vector Decomposition",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3125,
    "paper_ids": [
      3852
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junxue Zhang 0001",
    "display_name": "Junxue Zhang",
    "affiliation": "USTC",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 4,
      "USENIXSEC": 1,
      "NSDI": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "EUROSYS": {
        "2025": 2,
        "2024": 1,
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "NSDI": {
        "2025": 1,
        "2023": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 12.5,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Decentralized Federated Singular Vector Decomposition",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enetstl towards an inkernel library for highperformance ebpfbased network functions",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "achieving fairness generalizability for learningbased congestion control with jury",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "green carbonefficient resource scheduling for machine learning clusters",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "accelerating privacypreserving machine learning with genibatch",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "accelerating secure collaborative machine learning with protocolaware rdma",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "flash towards a highperformance hardware acceleration architecture for crosssilo federated learning",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "multiobjective congestion control",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 1060,
    "paper_ids": [
      3852
    ],
    "papers_without_artifact_ids": [
      3853,
      3854,
      3855,
      3856,
      3860,
      3600,
      1009
    ]
  },
  {
    "name": "Liu Yang 0008",
    "display_name": "Liu Yang",
    "affiliation": "Hong Kong University of Science and Technology",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Decentralized Federated Singular Vector Decomposition",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flash towards a highperformance hardware acceleration architecture for crosssilo federated learning",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 3126,
    "paper_ids": [
      3852
    ],
    "papers_without_artifact_ids": [
      3600
    ]
  },
  {
    "name": "Yilun Jin",
    "display_name": "Yilun Jin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Decentralized Federated Singular Vector Decomposition",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "achieving fairness generalizability for learningbased congestion control with jury",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "accelerating privacypreserving machine learning with genibatch",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 3127,
    "paper_ids": [
      3852
    ],
    "papers_without_artifact_ids": [
      3854,
      3856
    ]
  },
  {
    "name": "Leye Wang",
    "display_name": "Leye Wang",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Decentralized Federated Singular Vector Decomposition",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3128,
    "paper_ids": [
      3852
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qiang Yang 0001",
    "display_name": "Qiang Yang",
    "affiliation": "HKUST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Decentralized Federated Singular Vector Decomposition",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3129,
    "paper_ids": [
      3852
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jaehyun Song",
    "display_name": "Jaehyun Song",
    "affiliation": "Sungkyunkwan University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Secure, Fast, and Resource-Efficient Serverless Platform with Function REWIND",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3130,
    "paper_ids": [
      2764
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bumsuk Kim",
    "display_name": "Bumsuk Kim",
    "affiliation": "University of Massachusetts Lowell",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Secure, Fast, and Resource-Efficient Serverless Platform with Function REWIND",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3131,
    "paper_ids": [
      2764
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minwoo Kwak",
    "display_name": "Minwoo Kwak",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Secure, Fast, and Resource-Efficient Serverless Platform with Function REWIND",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3132,
    "paper_ids": [
      2764
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Euiseong Seo",
    "display_name": "Euiseong Seo",
    "affiliation": "Sungkyunkwan University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Secure, Fast, and Resource-Efficient Serverless Platform with Function REWIND",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "awupf rediscovered atomic writes to unleash pivotal faulttolerance in ssds",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "we aint afraid of no file fragmentation causes and prevention of its performance impact on modern flash ssds",
        "conference": "FAST",
        "year": 2024
      }
    ],
    "author_id": 1061,
    "paper_ids": [
      2764
    ],
    "papers_without_artifact_ids": [
      3649,
      4964
    ]
  },
  {
    "name": "Zhiyue Li",
    "display_name": "Zhiyue Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2021": 1,
        "2026": 1,
        "2022": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "StreamCache: Revisiting Page Cache for File Scanning on Fast Storage Devices",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "drboost boosting degraded read performance in msrcoded storage clusters",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "aurogon taming aborts in all phases for distributed inmemory transactions",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "fusionraid achieving consistent low latency for commodity ssd arrays",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 3133,
    "paper_ids": [
      3669
    ],
    "papers_without_artifact_ids": [
      3671,
      3672,
      3674
    ]
  },
  {
    "name": "Tailing Yuan",
    "display_name": "Tailing Yuan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Accelerating the Training of Large Language Models using Efficient Activation Rematerialization and Optimal Hybrid Parallelism",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3134,
    "paper_ids": [
      4965
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuliang Liu",
    "display_name": "Yuliang Liu",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Accelerating the Training of Large Language Models using Efficient Activation Rematerialization and Optimal Hybrid Parallelism",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3135,
    "paper_ids": [
      4965
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xucheng Ye",
    "display_name": "Xucheng Ye",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Accelerating the Training of Large Language Models using Efficient Activation Rematerialization and Optimal Hybrid Parallelism",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3136,
    "paper_ids": [
      4965
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shenglong Zhang",
    "display_name": "Shenglong Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Accelerating the Training of Large Language Models using Efficient Activation Rematerialization and Optimal Hybrid Parallelism",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3137,
    "paper_ids": [
      4965
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianchao Tan",
    "display_name": "Jianchao Tan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Accelerating the Training of Large Language Models using Efficient Activation Rematerialization and Optimal Hybrid Parallelism",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3138,
    "paper_ids": [
      4965
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bin Chen",
    "display_name": "Bin Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Accelerating the Training of Large Language Models using Efficient Activation Rematerialization and Optimal Hybrid Parallelism",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3139,
    "paper_ids": [
      4965
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chengru Song",
    "display_name": "Chengru Song",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Accelerating the Training of Large Language Models using Efficient Activation Rematerialization and Optimal Hybrid Parallelism",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3140,
    "paper_ids": [
      4965
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Di Zhang",
    "display_name": "Di Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Accelerating the Training of Large Language Models using Efficient Activation Rematerialization and Optimal Hybrid Parallelism",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3141,
    "paper_ids": [
      4965
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Liyi Zhang",
    "display_name": "Liyi Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Monarch: A Fuzzing Framework for Distributed File Systems",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3142,
    "paper_ids": [
      1
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhiyao Feng",
    "display_name": "Zhiyao Feng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Monarch: A Fuzzing Framework for Distributed File Systems",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aifore smart fuzzing based on automatic input format reverse engineering",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 3143,
    "paper_ids": [
      1
    ],
    "papers_without_artifact_ids": [
      23
    ]
  },
  {
    "name": "Yufeng Hu",
    "display_name": "Yufeng Hu",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SlimArchive: A Lightweight Architecture for Ethereum Archive Nodes",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dissecting payloadbased transaction phishing on ethereum",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 3144,
    "paper_ids": [
      685
    ],
    "papers_without_artifact_ids": [
      690
    ]
  },
  {
    "name": "Yinghan Kou",
    "display_name": "Yinghan Kou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SlimArchive: A Lightweight Architecture for Ethereum Archive Nodes",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3145,
    "paper_ids": [
      685
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianfeng Zhu",
    "display_name": "Jianfeng Zhu",
    "affiliation": "Ohio University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SlimArchive: A Lightweight Architecture for Ethereum Archive Nodes",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3146,
    "paper_ids": [
      685
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunfei Gu",
    "display_name": "Yunfei Gu",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploit both SMART Attributes and NAND Flash Wear Characteristics to Effectively Forecast SSD-based Storage Failures in Clusters",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cacheslide unlocking cross positionaware kv cache reuse for accelerating llm serving",
        "conference": "FAST",
        "year": 2026
      }
    ],
    "author_id": 3147,
    "paper_ids": [
      4966
    ],
    "papers_without_artifact_ids": [
      1090
    ]
  },
  {
    "name": "Chentao Wu",
    "display_name": "Chentao Wu",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2026": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploit both SMART Attributes and NAND Flash Wear Characteristics to Effectively Forecast SSD-based Storage Failures in Clusters",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cacheslide unlocking cross positionaware kv cache reuse for accelerating llm serving",
        "conference": "FAST",
        "year": 2026
      }
    ],
    "author_id": 1064,
    "paper_ids": [
      4966
    ],
    "papers_without_artifact_ids": [
      1090
    ]
  },
  {
    "name": "Xubin He",
    "display_name": "Xubin He",
    "affiliation": "Temple University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 0,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "EUROSYS": {},
      "FAST": {
        "2015": 1,
        "2012": 1,
        "2019": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploit both SMART Attributes and NAND Flash Wear Characteristics to Effectively Forecast SSD-based Storage Failures in Clusters",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "geardb a gcfree keyvalue store on hmsmr drives with gear compaction",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "design tradeoffs for data deduplication performance in backup workloads",
        "conference": "FAST",
        "year": 2015
      },
      {
        "title": "reducing ssd read latency via nand flash program and erase suspension",
        "conference": "FAST",
        "year": 2012
      }
    ],
    "author_id": 3148,
    "paper_ids": [
      4966
    ],
    "papers_without_artifact_ids": [
      4632,
      2067,
      4967
    ]
  },
  {
    "name": "Hongyu Li",
    "display_name": "Hongyu Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "An Empirical Study of Rust-for-Linux: The Success, Dissatisfaction, and Compromise",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3149,
    "paper_ids": [
      3843
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Liwei Guo",
    "display_name": "Liwei Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "An Empirical Study of Rust-for-Linux: The Success, Dissatisfaction, and Compromise",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "minimum viable device drivers for arm trustzone",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 3150,
    "paper_ids": [
      3843
    ],
    "papers_without_artifact_ids": [
      4968
    ]
  },
  {
    "name": "Yexuan Yang",
    "display_name": "Yexuan Yang",
    "affiliation": "Yale University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "An Empirical Study of Rust-for-Linux: The Success, Dissatisfaction, and Compromise",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3151,
    "paper_ids": [
      3843
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinyong Ha 0001",
    "display_name": "Jinyong Ha",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RL-Watchdog: A Fast and Predictable SSD Liveness Watchdog on Storage Systems",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scalelfs a logstructured file system with scalable garbage collection for commodity ssds",
        "conference": "FAST",
        "year": 2025
      }
    ],
    "author_id": 3152,
    "paper_ids": [
      4969
    ],
    "papers_without_artifact_ids": [
      4970
    ]
  },
  {
    "name": "Sangjin Lee 0003",
    "display_name": "Sangjin Lee",
    "affiliation": "Chung-Ang University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "FAST": {
        "2026": 1,
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RL-Watchdog: A Fast and Predictable SSD Liveness Watchdog on Storage Systems",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scaleswap a scalable os swap system for allflash swap arrays",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "scalelfs a logstructured file system with scalable garbage collection for commodity ssds",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "scalecache a scalable page cache for multiple solidstate drives",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 3153,
    "paper_ids": [
      4969
    ],
    "papers_without_artifact_ids": [
      4971,
      4970,
      2076
    ]
  },
  {
    "name": "Heon Young Yeom",
    "display_name": "Heon Young Yeom",
    "affiliation": "Seoul National University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RL-Watchdog: A Fast and Predictable SSD Liveness Watchdog on Storage Systems",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3154,
    "paper_ids": [
      4969
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yongseok Son",
    "display_name": "Yongseok Son",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "FAST": {
        "2026": 1,
        "2018": 1,
        "2025": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RL-Watchdog: A Fast and Predictable SSD Liveness Watchdog on Storage Systems",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scaleswap a scalable os swap system for allflash swap arrays",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "scalelfs a logstructured file system with scalable garbage collection for commodity ssds",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "scalecache a scalable page cache for multiple solidstate drives",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "highperformance transaction processing in journaling file systems",
        "conference": "FAST",
        "year": 2018
      }
    ],
    "author_id": 3155,
    "paper_ids": [
      4969
    ],
    "papers_without_artifact_ids": [
      4971,
      4970,
      2076,
      4972
    ]
  },
  {
    "name": "Qizhen Weng 0001",
    "display_name": "Qizhen Weng",
    "affiliation": "University of Toronto",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SC": {},
      "NSDI": {
        "2025": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Beware of Fragmentation: Scheduling GPU-Sharing Workloads with Fragmentation Gradient Descent",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gpudisaggregated serving for deep learning recommendation models at scale",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "mlaas in the wild workload analysis and scheduling in largescale heterogeneous gpu clusters",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 3156,
    "paper_ids": [
      2801
    ],
    "papers_without_artifact_ids": [
      2802,
      2805
    ]
  },
  {
    "name": "Lingyun Yang",
    "display_name": "Lingyun Yang",
    "affiliation": "Hong Kong University of Science and Technology",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SC": {},
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Beware of Fragmentation: Scheduling GPU-Sharing Workloads with Fragmentation Gradient Descent",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gpudisaggregated serving for deep learning recommendation models at scale",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 3157,
    "paper_ids": [
      2801
    ],
    "papers_without_artifact_ids": [
      2802
    ]
  },
  {
    "name": "Yinghao Yu",
    "display_name": "Yinghao Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SC": {},
      "NSDI": {
        "2025": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Beware of Fragmentation: Scheduling GPU-Sharing Workloads with Fragmentation Gradient Descent",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gpudisaggregated serving for deep learning recommendation models at scale",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "mlaas in the wild workload analysis and scheduling in largescale heterogeneous gpu clusters",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 3158,
    "paper_ids": [
      2801
    ],
    "papers_without_artifact_ids": [
      2802,
      2805
    ]
  },
  {
    "name": "Xiaochuan Tang",
    "display_name": "Xiaochuan Tang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Beware of Fragmentation: Scheduling GPU-Sharing Workloads with Fragmentation Gradient Descent",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3159,
    "paper_ids": [
      2801
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guodong Yang",
    "display_name": "Guodong Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 2,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 2
      },
      "EUROSYS": {
        "2023": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Beware of Fragmentation: Scheduling GPU-Sharing Workloads with Fragmentation Gradient Descent",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gpudisaggregated serving for deep learning recommendation models at scale",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "aasclepius monitoring diagnosing and detouring at the internet peering edge",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "understanding and optimizing workloads for unified resource management in large cloud platforms",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 3160,
    "paper_ids": [
      2801
    ],
    "papers_without_artifact_ids": [
      2802,
      4973,
      4945
    ]
  },
  {
    "name": "Liping Zhang 0013",
    "display_name": "Liping Zhang",
    "affiliation": "Alibaba Group, Hangzhou, China",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "NSDI": {
        "2025": 1,
        "2022": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Beware of Fragmentation: Scheduling GPU-Sharing Workloads with Fragmentation Gradient Descent",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gpudisaggregated serving for deep learning recommendation models at scale",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "understanding and optimizing workloads for unified resource management in large cloud platforms",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "mlaas in the wild workload analysis and scheduling in largescale heterogeneous gpu clusters",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 3161,
    "paper_ids": [
      2801
    ],
    "papers_without_artifact_ids": [
      2802,
      4945,
      2805
    ]
  },
  {
    "name": "Samuel Ginzburg",
    "display_name": "Samuel Ginzburg",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VectorVisor: A Binary Translation Scheme for Throughput-Oriented GPU Acceleration",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "palette load balancing locality hints for serverless functions",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 3162,
    "paper_ids": [
      2749
    ],
    "papers_without_artifact_ids": [
      2698
    ]
  },
  {
    "name": "Shao-Peng Yang 0001",
    "display_name": "Shao-Peng Yang",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Overcoming the Memory Wall with CXL-Enabled SSDs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3163,
    "paper_ids": [
      2073
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minjae Kim 0015",
    "display_name": "Minjae Kim",
    "affiliation": "DGIST, Daegu, South Korea",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Overcoming the Memory Wall with CXL-Enabled SSDs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3164,
    "paper_ids": [
      2073
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sanghyun Nam",
    "display_name": "Sanghyun Nam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Overcoming the Memory Wall with CXL-Enabled SSDs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3165,
    "paper_ids": [
      2073
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jin-Yong Choi",
    "display_name": "Jin-Yong Choi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Overcoming the Memory Wall with CXL-Enabled SSDs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3166,
    "paper_ids": [
      2073
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eyee Hyun Nam",
    "display_name": "Eyee Hyun Nam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Overcoming the Memory Wall with CXL-Enabled SSDs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3167,
    "paper_ids": [
      2073
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zihang Yao",
    "display_name": "Zihang Yao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Bridging the Gap between Relational OLTP and Graph-based OLAP",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flexgraph a flexible and efficient distributed framework for gnn training",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 3168,
    "paper_ids": [
      37
    ],
    "papers_without_artifact_ids": [
      1318
    ]
  },
  {
    "name": "Lin Shi",
    "display_name": "Lin Shi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Bridging the Gap between Relational OLTP and Graph-based OLAP",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3169,
    "paper_ids": [
      37
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qian Tao",
    "display_name": "Qian Tao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Bridging the Gap between Relational OLTP and Graph-based OLAP",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3170,
    "paper_ids": [
      37
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dmitry Duplyakin",
    "display_name": "Dmitry Duplyakin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SC": {},
      "NSDI": {
        "2020": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Avoiding the Ordering Trap in Systems Performance Measurement",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "is big data performance reproducible in modern cloud networks",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 3171,
    "paper_ids": [
      4974
    ],
    "papers_without_artifact_ids": [
      4975
    ]
  },
  {
    "name": "Nikhil Ramesh",
    "display_name": "Nikhil Ramesh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Avoiding the Ordering Trap in Systems Performance Measurement",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3172,
    "paper_ids": [
      4974
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Carina Imburgia",
    "display_name": "Carina Imburgia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Avoiding the Ordering Trap in Systems Performance Measurement",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3173,
    "paper_ids": [
      4974
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hamza Fathallah Al Sheikh",
    "display_name": "Hamza Fathallah Al Sheikh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Avoiding the Ordering Trap in Systems Performance Measurement",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3174,
    "paper_ids": [
      4974
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Semil Jain",
    "display_name": "Semil Jain",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Avoiding the Ordering Trap in Systems Performance Measurement",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3175,
    "paper_ids": [
      4974
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Prikshit Tekta",
    "display_name": "Prikshit Tekta",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Avoiding the Ordering Trap in Systems Performance Measurement",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3176,
    "paper_ids": [
      4974
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aleksander Maricq",
    "display_name": "Aleksander Maricq",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Avoiding the Ordering Trap in Systems Performance Measurement",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3177,
    "paper_ids": [
      4974
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gary Wong",
    "display_name": "Gary Wong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "NSDI": {
        "2014": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Avoiding the Ordering Trap in Systems Performance Measurement",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "operational experiences with disk imaging in a multitenant datacenter",
        "conference": "NSDI",
        "year": 2014
      }
    ],
    "author_id": 3178,
    "paper_ids": [
      4974
    ],
    "papers_without_artifact_ids": [
      4976
    ]
  },
  {
    "name": "Robert Ricci",
    "display_name": "Robert Ricci",
    "affiliation": "University of Utah",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 0,
      "FAST": 1,
      "NSDI": 5,
      "NDSS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SOSP": {},
      "FAST": {
        "2018": 1
      },
      "NSDI": {
        "2009": 1,
        "2014": 1,
        "2024": 1,
        "2020": 1,
        "2007": 1
      },
      "NDSS": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 12.5,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Avoiding the Ordering Trap in Systems Performance Measurement",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "chaos exploiting station time synchronization in 80211 networks",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "where the wild things are bruteforce ssh attacks in the wild and how to stop them",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "is big data performance reproducible in modern cloud networks",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "failslow at scale evidence of hardware performance faults in large production systems",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "operational experiences with disk imaging in a multitenant datacenter",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "modeling and emulation of internet paths",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "the flexlab approach to realistic evaluation of networked systems",
        "conference": "NSDI",
        "year": 2007
      }
    ],
    "author_id": 3179,
    "paper_ids": [
      4974
    ],
    "papers_without_artifact_ids": [
      4977,
      4196,
      4975,
      3633,
      4976,
      4978,
      4979
    ]
  },
  {
    "name": "Simian Li",
    "display_name": "Simian Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Adaptive Online Cache Capacity Optimization via Lightweight Working Set Size Estimation at Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3180,
    "paper_ids": [
      2875
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haipeng Dai 0001",
    "display_name": "Haipeng Dai",
    "affiliation": "Nanjing University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 3,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2023": 1,
        "2024": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Adaptive Online Cache Capacity Optimization via Lightweight Working Set Size Estimation at Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "empower vision applications with lora lmm",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "regionbased content enhancement for efficient video analytics at the edge",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "wormhole filters caching your hash on persistent memory",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "alt breaking the wall between data layout and loop optimizations for deep learning compilation",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 3181,
    "paper_ids": [
      2875
    ],
    "papers_without_artifact_ids": [
      2877,
      4980,
      1375,
      2882
    ]
  },
  {
    "name": "Hancheng Wang",
    "display_name": "Hancheng Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Adaptive Online Cache Capacity Optimization via Lightweight Working Set Size Estimation at Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "wormhole filters caching your hash on persistent memory",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 3182,
    "paper_ids": [
      2875
    ],
    "papers_without_artifact_ids": [
      1375
    ]
  },
  {
    "name": "Yili Luo",
    "display_name": "Yili Luo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Adaptive Online Cache Capacity Optimization via Lightweight Working Set Size Estimation at Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3183,
    "paper_ids": [
      2875
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bin Fan",
    "display_name": "Bin Fan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 2,
      "SOSP": 0,
      "ACSAC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "SOSP": {},
      "ACSAC": {},
      "NSDI": {
        "2013": 1,
        "2014": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Adaptive Online Cache Capacity Optimization via Lightweight Working Set Size Estimation at Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "data caching for enterprisegrade petabytescale olap",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "blizzard fast cloudscale block storage for cloudoblivious applications",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "memc3 compact and concurrent memcache with dumber caching and smarter hashing",
        "conference": "NSDI",
        "year": 2013
      }
    ],
    "author_id": 3184,
    "paper_ids": [
      2875
    ],
    "papers_without_artifact_ids": [
      4633,
      2690,
      4981
    ]
  },
  {
    "name": "Ran Ben Basat",
    "display_name": "Ran Ben Basat",
    "affiliation": "University College London",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "NSDI": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Adaptive Online Cache Capacity Optimization via Lightweight Working Set Size Estimation at Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enabling silent telemetry data transmission with invisiflow",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "thc accelerating distributed deep learning using tensor homomorphic compression",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 3185,
    "paper_ids": [
      2875
    ],
    "papers_without_artifact_ids": [
      1940,
      4856
    ]
  },
  {
    "name": "Ke Wang",
    "display_name": "Ke Wang",
    "affiliation": "Washington State University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 2,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Adaptive Online Cache Capacity Optimization via Lightweight Working Set Size Estimation at Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "data caching for enterprisegrade petabytescale olap",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "providing slos for resourceharvesting vms in cloud platforms",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 3186,
    "paper_ids": [
      2875
    ],
    "papers_without_artifact_ids": [
      4633,
      3870
    ]
  },
  {
    "name": "Zhenyu Song",
    "display_name": "Zhenyu Song",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "NSDI": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "NSDI": {
        "2023": 1,
        "2020": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Adaptive Online Cache Capacity Optimization via Lightweight Working Set Size Estimation at Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rcontainer a secure container architecture through extending arm cca hardware primitives",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "halp heuristic aided learned preference eviction policy for youtube content delivery network",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "learning relaxed belady for content distribution network caching",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 3187,
    "paper_ids": [
      2875
    ],
    "papers_without_artifact_ids": [
      4982,
      3477,
      2700
    ]
  },
  {
    "name": "Shouwei Chen",
    "display_name": "Shouwei Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Adaptive Online Cache Capacity Optimization via Lightweight Working Set Size Estimation at Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "data caching for enterprisegrade petabytescale olap",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 3188,
    "paper_ids": [
      2875
    ],
    "papers_without_artifact_ids": [
      4633
    ]
  },
  {
    "name": "Beinan Wang",
    "display_name": "Beinan Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Adaptive Online Cache Capacity Optimization via Lightweight Working Set Size Estimation at Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "data caching for enterprisegrade petabytescale olap",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 3189,
    "paper_ids": [
      2875
    ],
    "papers_without_artifact_ids": [
      4633
    ]
  },
  {
    "name": "Ghazal Sadeghian",
    "display_name": "Ghazal Sadeghian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "UnFaaSener: Latency and Cost Aware Offloading of Functions from Serverless Platforms",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3190,
    "paper_ids": [
      2750
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohamed Elsakhawy",
    "display_name": "Mohamed Elsakhawy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "UnFaaSener: Latency and Cost Aware Offloading of Functions from Serverless Platforms",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3191,
    "paper_ids": [
      2750
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohanna Shahrad",
    "display_name": "Mohanna Shahrad",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "UnFaaSener: Latency and Cost Aware Offloading of Functions from Serverless Platforms",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3192,
    "paper_ids": [
      2750
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joe Hattori",
    "display_name": "Joe Hattori",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "UnFaaSener: Latency and Cost Aware Offloading of Functions from Serverless Platforms",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3193,
    "paper_ids": [
      2750
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrei Ivanov",
    "display_name": "Andrei Ivanov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SAGE: Software-based Attestation for GPU Execution",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3194,
    "paper_ids": [
      754
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benjamin Rothenberger",
    "display_name": "Benjamin Rothenberger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SAGE: Software-based Attestation for GPU Execution",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "redmark bypassing rdma security mechanisms",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 3195,
    "paper_ids": [
      754
    ],
    "papers_without_artifact_ids": [
      759
    ]
  },
  {
    "name": "Arnaud Dethise",
    "display_name": "Arnaud Dethise",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SAGE: Software-based Attestation for GPU Execution",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3196,
    "paper_ids": [
      754
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Huanzhou Zhu",
    "display_name": "Huanzhou Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MSRL: Distributed Reinforcement Learning with Dataflow Fragments",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3197,
    "paper_ids": [
      1388
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gang Chen",
    "display_name": "Gang Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 3,
      "SC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2022": 2,
        "2023": 1
      },
      "SC": {},
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MSRL: Distributed Reinforcement Learning with Dataflow Fragments",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "analysis of rapid extraction of data and information based on deep learning technology",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "fast extraction algorithm of big data information based on artificial intelligence",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 3198,
    "paper_ids": [
      1388
    ],
    "papers_without_artifact_ids": [
      4983,
      4984
    ]
  },
  {
    "name": "Weifeng Chen",
    "display_name": "Weifeng Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MSRL: Distributed Reinforcement Learning with Dataflow Fragments",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3199,
    "paper_ids": [
      1388
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yijie Chen",
    "display_name": "Yijie Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MSRL: Distributed Reinforcement Learning with Dataflow Fragments",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3200,
    "paper_ids": [
      1388
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Liang Shi",
    "display_name": "Liang Shi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MSRL: Distributed Reinforcement Learning with Dataflow Fragments",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3201,
    "paper_ids": [
      1388
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yaodong Yang 0001",
    "display_name": "Yaodong Yang",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MSRL: Distributed Reinforcement Learning with Dataflow Fragments",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3202,
    "paper_ids": [
      1388
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lei Chen",
    "display_name": "Lei Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MSRL: Distributed Reinforcement Learning with Dataflow Fragments",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a tale of two paths toward a hybrid data plane for efficient farmemory applications",
        "conference": "OSDI",
        "year": 2024
      }
    ],
    "author_id": 3203,
    "paper_ids": [
      1388
    ],
    "papers_without_artifact_ids": [
      1377
    ]
  },
  {
    "name": "Inhoe Koo",
    "display_name": "Inhoe Koo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "EnvPipe: Performance-preserving DNN Training Framework for Saving Energy",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3204,
    "paper_ids": [
      349
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Giovanni Bartolomeo",
    "display_name": "Giovanni Bartolomeo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Oakestra: A Lightweight Hierarchical Orchestration Framework for Edge Computing",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "supporting hybrid virtualization orchestration for edge computing",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 3205,
    "paper_ids": [
      4985
    ],
    "papers_without_artifact_ids": [
      4986
    ]
  },
  {
    "name": "Mehdi Yosofie",
    "display_name": "Mehdi Yosofie",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Oakestra: A Lightweight Hierarchical Orchestration Framework for Edge Computing",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3206,
    "paper_ids": [
      4985
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simon Bäurle",
    "display_name": "Simon Bäurle",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Oakestra: A Lightweight Hierarchical Orchestration Framework for Edge Computing",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "comb a flexible applicationoriented benchmark for edge computing",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 7993,
    "paper_ids": [
      4985
    ],
    "papers_without_artifact_ids": [
      4987
    ]
  },
  {
    "name": "Oliver Haluszczynski",
    "display_name": "Oliver Haluszczynski",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Oakestra: A Lightweight Hierarchical Orchestration Framework for Edge Computing",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3208,
    "paper_ids": [
      4985
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nitinder Mohan",
    "display_name": "Nitinder Mohan",
    "affiliation": "TU Delft",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Oakestra: A Lightweight Hierarchical Orchestration Framework for Edge Computing",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "supporting hybrid virtualization orchestration for edge computing",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "comb a flexible applicationoriented benchmark for edge computing",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 3209,
    "paper_ids": [
      4985
    ],
    "papers_without_artifact_ids": [
      4986,
      4987
    ]
  },
  {
    "name": "Jörg Ott",
    "display_name": "Jörg Ott",
    "affiliation": "TU Munich",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Oakestra: A Lightweight Hierarchical Orchestration Framework for Edge Computing",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "supporting hybrid virtualization orchestration for edge computing",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 7994,
    "paper_ids": [
      4985
    ],
    "papers_without_artifact_ids": [
      4986
    ]
  },
  {
    "name": "Alaa Youssef",
    "display_name": "Alaa Youssef",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "AWARE: Automate Workload Autoscaling with Reinforcement Learning in Production Cloud Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a house united within itself sloawareness for onpremises containerized ml inference clusters via faro",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "towards pareto optimal throughput in small language model serving",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 3211,
    "paper_ids": [
      2645
    ],
    "papers_without_artifact_ids": [
      2646,
      2647
    ]
  },
  {
    "name": "Siyuan Sheng",
    "display_name": "Siyuan Sheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2026": 1
      },
      "NSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FarReach: Write-back Caching in Programmable Switches",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "holistic and automated task scheduling for distributed lsmtreebased storage",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "toward nearlyzeroerror sketching via compressive sensing",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 3212,
    "paper_ids": [
      3821
    ],
    "papers_without_artifact_ids": [
      3823,
      3527
    ]
  },
  {
    "name": "Huancheng Puyang",
    "display_name": "Huancheng Puyang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FarReach: Write-back Caching in Programmable Switches",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3213,
    "paper_ids": [
      3821
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qun Huang 0001",
    "display_name": "Qun Huang",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "NSDI": {
        "2021": 1,
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FarReach: Write-back Caching in Programmable Switches",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "phantom virtualizing switch register resources for accurate sketchbased network measurement",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "autosketch automatic sketchoriented compiler for querydriven network telemetry",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "toward nearlyzeroerror sketching via compressive sensing",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 3214,
    "paper_ids": [
      3821
    ],
    "papers_without_artifact_ids": [
      305,
      3526,
      3527
    ]
  },
  {
    "name": "Lu Tang 0004",
    "display_name": "Lu Tang",
    "affiliation": "Xiamen University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2026": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FarReach: Write-back Caching in Programmable Switches",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "skysync accelerating file synchronization with collaborative delta generation",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "parasync exploiting finegrained parallelism for efficient file synchronization",
        "conference": "FAST",
        "year": 2026
      }
    ],
    "author_id": 3215,
    "paper_ids": [
      3821
    ],
    "papers_without_artifact_ids": [
      1044,
      1046
    ]
  },
  {
    "name": "Jiansheng Qiu",
    "display_name": "Jiansheng Qiu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Light-Dedup: A Light-weight Inline Deduplication Framework for Non-Volatile Memory File Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3216,
    "paper_ids": [
      2062
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaojia Huang",
    "display_name": "Xiaojia Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Light-Dedup: A Light-weight Inline Deduplication Framework for Non-Volatile Memory File Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "accelerating model loading in llm inference by programmable page cache",
        "conference": "FAST",
        "year": 2026
      }
    ],
    "author_id": 3217,
    "paper_ids": [
      2062
    ],
    "papers_without_artifact_ids": [
      4988
    ]
  },
  {
    "name": "Wenjun Wu",
    "display_name": "Wenjun Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Light-Dedup: A Light-weight Inline Deduplication Framework for Non-Volatile Memory File Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3218,
    "paper_ids": [
      2062
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shiyi Li",
    "display_name": "Shiyi Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Light-Dedup: A Light-weight Inline Deduplication Framework for Non-Volatile Memory File Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dont maintain twice its alright merged metadata management in deduplication file system with gogetafs",
        "conference": "FAST",
        "year": 2025
      }
    ],
    "author_id": 1072,
    "paper_ids": [
      2062
    ],
    "papers_without_artifact_ids": [
      2064
    ]
  },
  {
    "name": "Chenhao Jiang",
    "display_name": "Chenhao Jiang",
    "affiliation": "University of Toronto",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Arbitor: A Numerically Accurate Hardware Emulation Tool for DNN Accelerators",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3219,
    "paper_ids": [
      2070
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anand Jayarajan",
    "display_name": "Anand Jayarajan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Arbitor: A Numerically Accurate Hardware Emulation Tool for DNN Accelerators",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3220,
    "paper_ids": [
      2070
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hao Lu",
    "display_name": "Hao Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "USENIXSEC": 2,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1
      },
      "NSDI": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Arbitor: A Numerically Accurate Hardware Emulation Tool for DNN Accelerators",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "holmes localizing irregularities in llm training with megascale gpu clusters",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "transferability of whitebox perturbations queryefficient adversarial attacks against commercial dnn services",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "security analysis of unified payments interface and payment apps in india",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3221,
    "paper_ids": [
      2070
    ],
    "papers_without_artifact_ids": [
      4989,
      564,
      4990
    ]
  },
  {
    "name": "Junming Ma",
    "display_name": "Junming Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SecretFlow-SPU: A Performant and User-Friendly Framework for Privacy-Preserving Machine Learning",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3222,
    "paper_ids": [
      4991
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yancheng Zheng",
    "display_name": "Yancheng Zheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SecretFlow-SPU: A Performant and User-Friendly Framework for Privacy-Preserving Machine Learning",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3223,
    "paper_ids": [
      4991
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jun Feng",
    "display_name": "Jun Feng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SecretFlow-SPU: A Performant and User-Friendly Framework for Privacy-Preserving Machine Learning",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3224,
    "paper_ids": [
      4991
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Derun Zhao",
    "display_name": "Derun Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SecretFlow-SPU: A Performant and User-Friendly Framework for Privacy-Preserving Machine Learning",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3225,
    "paper_ids": [
      4991
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haoqi Wu",
    "display_name": "Haoqi Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SecretFlow-SPU: A Performant and User-Friendly Framework for Privacy-Preserving Machine Learning",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improving realworld password guessing attacks via bidirectional transformers",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 3226,
    "paper_ids": [
      4991
    ],
    "papers_without_artifact_ids": [
      4401
    ]
  },
  {
    "name": "Wenjing Fang",
    "display_name": "Wenjing Fang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "CHES": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "CHES": {
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SecretFlow-SPU: A Performant and User-Friendly Framework for Privacy-Preserving Machine Learning",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lmsanitator defending prompttuning against taskagnostic backdoors",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "cuzk accelerating zeroknowledge proof with a faster parallel multiscalar multiplication algorithm on gpus",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 3227,
    "paper_ids": [
      4991
    ],
    "papers_without_artifact_ids": [
      2329,
      3328
    ]
  },
  {
    "name": "Jin Tan",
    "display_name": "Jin Tan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SecretFlow-SPU: A Performant and User-Friendly Framework for Privacy-Preserving Machine Learning",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3228,
    "paper_ids": [
      4991
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chaofan Yu",
    "display_name": "Chaofan Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SecretFlow-SPU: A Performant and User-Friendly Framework for Privacy-Preserving Machine Learning",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3229,
    "paper_ids": [
      4991
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benyu Zhang",
    "display_name": "Benyu Zhang",
    "affiliation": "Microsoft Research",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SecretFlow-SPU: A Performant and User-Friendly Framework for Privacy-Preserving Machine Learning",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3230,
    "paper_ids": [
      4991
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lei Wang 0152",
    "display_name": "Lei Wang",
    "affiliation": "Nanjing University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "CHES": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "CHES": {
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SecretFlow-SPU: A Performant and User-Friendly Framework for Privacy-Preserving Machine Learning",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lmsanitator defending prompttuning against taskagnostic backdoors",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "cuzk accelerating zeroknowledge proof with a faster parallel multiscalar multiplication algorithm on gpus",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 3231,
    "paper_ids": [
      4991
    ],
    "papers_without_artifact_ids": [
      2329,
      3328
    ]
  },
  {
    "name": "Jiuchen Shi",
    "display_name": "Jiuchen Shi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Nodens: Enabling Resource Efficient and Fast QoS Recovery of Dynamic Microservice Applications in Datacenters",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3232,
    "paper_ids": [
      1088
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hang Zhang",
    "display_name": "Hang Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Nodens: Enabling Resource Efficient and Fast QoS Recovery of Dynamic Microservice Applications in Datacenters",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3233,
    "paper_ids": [
      1088
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhixin Tong",
    "display_name": "Zhixin Tong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Nodens: Enabling Resource Efficient and Fast QoS Recovery of Dynamic Microservice Applications in Datacenters",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3234,
    "paper_ids": [
      1088
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kaihua Fu",
    "display_name": "Kaihua Fu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Nodens: Enabling Resource Efficient and Fast QoS Recovery of Dynamic Microservice Applications in Datacenters",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3235,
    "paper_ids": [
      1088
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ahmedur Rahman Shovon",
    "display_name": "Ahmedur Rahman Shovon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards Iterative Relational Algebra on the GPU",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3236,
    "paper_ids": [
      4992
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas Gilray",
    "display_name": "Thomas Gilray",
    "affiliation": "Washington State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards Iterative Relational Algebra on the GPU",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3237,
    "paper_ids": [
      4992
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kristopher K. Micinski",
    "display_name": "Kristopher K. Micinski",
    "affiliation": "Syracuse University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards Iterative Relational Algebra on the GPU",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an observational investigation of reverse engineers processes",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3238,
    "paper_ids": [
      4992
    ],
    "papers_without_artifact_ids": [
      1279
    ]
  },
  {
    "name": "Sidharth Kumar",
    "display_name": "Sidharth Kumar",
    "affiliation": "University of Illinois at Chicago",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards Iterative Relational Algebra on the GPU",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3239,
    "paper_ids": [
      4992
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuhao Zhang 0006",
    "display_name": "Yuhao Zhang",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "NSDI": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Revisiting Secondary Indexing in LSM-based Storage Systems with Persistent Memory",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deft a scalable tree index for disaggregated memory",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "achieving wirelatency storage systems by exploiting hardware acks",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 1073,
    "paper_ids": [
      1041
    ],
    "papers_without_artifact_ids": [
      1052,
      1054
    ]
  },
  {
    "name": "Won Wook Song",
    "display_name": "Won Wook Song",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sponge: Fast Reactive Scaling for Stream Processing with Serverless Frameworks",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "blaze holistic caching for iterative data processing",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 3240,
    "paper_ids": [
      2931
    ],
    "papers_without_artifact_ids": [
      2933
    ]
  },
  {
    "name": "Taegeon Um",
    "display_name": "Taegeon Um",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 2,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sponge: Fast Reactive Scaling for Stream Processing with Serverless Frameworks",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "metis fast automatic distributed training on heterogeneous gpus",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "blaze holistic caching for iterative data processing",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "flowkv a semanticaware store for largescale state management of stream processing engines",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 3241,
    "paper_ids": [
      2931
    ],
    "papers_without_artifact_ids": [
      2932,
      2933,
      4993
    ]
  },
  {
    "name": "Byung-Gon Chun",
    "display_name": "Byung-Gon Chun",
    "affiliation": "Seoul National University",
    "artifact_count": 1,
    "total_papers": 11,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 0,
      "EUROSYS": 2,
      "FAST": 2,
      "NSDI": 4,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2023": 1,
        "2024": 1
      },
      "FAST": {
        "2009": 2
      },
      "NSDI": {
        "2019": 1,
        "2006": 1,
        "2008": 1,
        "2015": 1
      },
      "OSDI": {
        "2021": 1,
        "2022": 1
      }
    },
    "artifact_rate": 9.1,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sponge: Fast Reactive Scaling for Stream Processing with Serverless Frameworks",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "blaze holistic caching for iterative data processing",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "flowkv a semanticaware store for largescale state management of stream processing engines",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "orca a distributed serving system for transformerbased generative models",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "finding consensus bugs in ethereum via multitransaction differential fuzzing",
        "conference": "OSDI",
        "year": 2021
      },
      {
        "title": "janus fast and flexible deep learning via symbolic graph execution of imperative programs",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "making sense of performance in data analytics frameworks",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "minuet rethinking concurrency control in storage area networks",
        "conference": "FAST",
        "year": 2009
      },
      {
        "title": "tiered fault tolerance for longterm integrity",
        "conference": "FAST",
        "year": 2009
      },
      {
        "title": "netcomplex a complexity metric for networked system designs",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "efficient replica maintenance for distributed storage systems",
        "conference": "NSDI",
        "year": 2006
      }
    ],
    "author_id": 3242,
    "paper_ids": [
      2931
    ],
    "papers_without_artifact_ids": [
      2933,
      4993,
      4994,
      666,
      4995,
      4659,
      4996,
      3478,
      4652,
      1300
    ]
  },
  {
    "name": "Jie Sun 0017",
    "display_name": "Jie Sun",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Legion: Automatically Pushing the Envelope of Multi-GPU System for Billion-Scale GNN Training",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3243,
    "paper_ids": [
      2145
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zuocheng Shi",
    "display_name": "Zuocheng Shi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SC": {},
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Legion: Automatically Pushing the Envelope of Multi-GPU System for Billion-Scale GNN Training",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1075,
    "paper_ids": [
      2145
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenting Shen",
    "display_name": "Wenting Shen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Legion: Automatically Pushing the Envelope of Multi-GPU System for Billion-Scale GNN Training",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3244,
    "paper_ids": [
      2145
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yong Li 0020",
    "display_name": "Yong Li",
    "affiliation": "Jiangsu University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Legion: Automatically Pushing the Envelope of Multi-GPU System for Billion-Scale GNN Training",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3245,
    "paper_ids": [
      2145
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yufan Yang",
    "display_name": "Yufan Yang",
    "affiliation": "Yale University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GLogS: Interactive Graph Pattern Matching Query At Large Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3246,
    "paper_ids": [
      2146
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhibin Wang 0002",
    "display_name": "Zhibin Wang",
    "affiliation": "Nanjing University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GLogS: Interactive Graph Pattern Matching Query At Large Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bingo radixbased bias factorization for random walk on dynamic graphs",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 3247,
    "paper_ids": [
      2146
    ],
    "papers_without_artifact_ids": [
      3587
    ]
  },
  {
    "name": "Haotian Ma",
    "display_name": "Haotian Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GLogS: Interactive Graph Pattern Matching Query At Large Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3248,
    "paper_ids": [
      2146
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bingqing Lyu",
    "display_name": "Bingqing Lyu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "NSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GLogS: Interactive Graph Pattern Matching Query At Large Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gaia a system for interactive analysis on distributed graphs using a highlevel language",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 3249,
    "paper_ids": [
      2146
    ],
    "papers_without_artifact_ids": [
      2148
    ]
  },
  {
    "name": "Xiaoli Zhou",
    "display_name": "Xiaoli Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "NSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GLogS: Interactive Graph Pattern Matching Query At Large Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gaia a system for interactive analysis on distributed graphs using a highlevel language",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 3250,
    "paper_ids": [
      2146
    ],
    "papers_without_artifact_ids": [
      2148
    ]
  },
  {
    "name": "Zhengping Qian",
    "display_name": "Zhengping Qian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 0,
      "NSDI": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {},
      "NSDI": {
        "2021": 1,
        "2016": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GLogS: Interactive Graph Pattern Matching Query At Large Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gaia a system for interactive analysis on distributed graphs using a highlevel language",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "streamscope continuous reliable distributed processing of big data streams",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 3251,
    "paper_ids": [
      2146
    ],
    "papers_without_artifact_ids": [
      2148,
      292
    ]
  },
  {
    "name": "Yeh-Ching Chung",
    "display_name": "Yeh-Ching Chung",
    "affiliation": "CUHK (SZ)",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SC": {},
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GLogS: Interactive Graph Pattern Matching Query At Large Scale",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mprobe make the code probing meaningless",
        "conference": "ACSAC",
        "year": 2022
      }
    ],
    "author_id": 3252,
    "paper_ids": [
      2146
    ],
    "papers_without_artifact_ids": [
      4997
    ]
  },
  {
    "name": "Pengqiang Bi",
    "display_name": "Pengqiang Bi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "oBBR: Optimize Retransmissions of BBR Flows on the Internet",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3253,
    "paper_ids": [
      4998
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mengbai Xiao",
    "display_name": "Mengbai Xiao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "oBBR: Optimize Retransmissions of BBR Flows on the Internet",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3254,
    "paper_ids": [
      4998
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dongxiao Yu",
    "display_name": "Dongxiao Yu",
    "affiliation": "Shandong University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "oBBR: Optimize Retransmissions of BBR Flows on the Internet",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hidpu a dpuoriented hybrid indexing scheme for disaggregated storage systems",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "zkcross a novel architecture for crosschain privacypreserving auditing",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1078,
    "paper_ids": [
      4998
    ],
    "papers_without_artifact_ids": [
      4999,
      5000
    ]
  },
  {
    "name": "Guanghui Zhang",
    "display_name": "Guanghui Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "oBBR: Optimize Retransmissions of BBR Flows on the Internet",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3255,
    "paper_ids": [
      4998
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zongyin Hao",
    "display_name": "Zongyin Hao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pinolo: Detecting Logical Bugs in Database Management Systems with Approximate Query Synthesis",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3256,
    "paper_ids": [
      3873
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Quanfeng Huang",
    "display_name": "Quanfeng Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pinolo: Detecting Logical Bugs in Database Management Systems with Approximate Query Synthesis",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3257,
    "paper_ids": [
      3873
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chengpeng Wang 0001",
    "display_name": "Chengpeng Wang",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pinolo: Detecting Logical Bugs in Database Management Systems with Approximate Query Synthesis",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "seal towards diverse specification inference for linux interfaces from security patches",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 3258,
    "paper_ids": [
      3873
    ],
    "papers_without_artifact_ids": [
      3875
    ]
  },
  {
    "name": "Jianfeng Wang",
    "display_name": "Jianfeng Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 3
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2023": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pinolo: Detecting Logical Bugs in Database Management Systems with Approximate Query Synthesis",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "serverless cold starts and where to find them",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "foldformer sequence folding and seasonal attention for finegrained longterm faas forecasting",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "tsmix time series data augmentation by mixing sources",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 3259,
    "paper_ids": [
      3873
    ],
    "papers_without_artifact_ids": [
      5001,
      5002,
      5003
    ]
  },
  {
    "name": "Yushan Zhang",
    "display_name": "Yushan Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pinolo: Detecting Logical Bugs in Database Management Systems with Approximate Query Synthesis",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3260,
    "paper_ids": [
      3873
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rongxin Wu",
    "display_name": "Rongxin Wu",
    "affiliation": "Xiamen University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pinolo: Detecting Logical Bugs in Database Management Systems with Approximate Query Synthesis",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3261,
    "paper_ids": [
      3873
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gloire Rubambiza",
    "display_name": "Gloire Rubambiza",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Comosum: An Extensible, Reconfigurable, and Fault-Tolerant IoT Platform for Digital Agriculture",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3262,
    "paper_ids": [
      5004
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shiang-Wan Chin",
    "display_name": "Shiang-Wan Chin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Comosum: An Extensible, Reconfigurable, and Fault-Tolerant IoT Platform for Digital Agriculture",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3263,
    "paper_ids": [
      5004
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mueed Rehman",
    "display_name": "Mueed Rehman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Comosum: An Extensible, Reconfigurable, and Fault-Tolerant IoT Platform for Digital Agriculture",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3264,
    "paper_ids": [
      5004
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sachille Atapattu",
    "display_name": "Sachille Atapattu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Comosum: An Extensible, Reconfigurable, and Fault-Tolerant IoT Platform for Digital Agriculture",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3265,
    "paper_ids": [
      5004
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "José F. Martínez",
    "display_name": "José F. Martínez",
    "affiliation": "Cornell University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Comosum: An Extensible, Reconfigurable, and Fault-Tolerant IoT Platform for Digital Agriculture",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7995,
    "paper_ids": [
      5004
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hakim Weatherspoon",
    "display_name": "Hakim Weatherspoon",
    "affiliation": "Cornell University",
    "artifact_count": 1,
    "total_papers": 10,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 0,
      "FAST": 4,
      "NSDI": 5
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {},
      "FAST": {
        "2009": 1,
        "2016": 1,
        "2013": 1,
        "2003": 1
      },
      "NSDI": {
        "2013": 1,
        "2014": 1,
        "2019": 1,
        "2006": 1,
        "2008": 1
      }
    },
    "artifact_rate": 10.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Comosum: An Extensible, Reconfigurable, and Fault-Tolerant IoT Platform for Digital Agriculture",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shoal a network architecture for disaggregated racks",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "isotope transactional isolation for block storage",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "phy covert channels can you see the idles",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "gecko contentionoblivious disk arrays for cloud storage",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "sonic precise realtime software access and control of wired networks",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "smoke and mirrors reflecting files at a geographically remote location without loss of performance",
        "conference": "FAST",
        "year": 2009
      },
      {
        "title": "maelstrom transparent error correction for lambda networks",
        "conference": "NSDI",
        "year": 2008
      },
      {
        "title": "efficient replica maintenance for distributed storage systems",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "pond the oceanstore prototype",
        "conference": "FAST",
        "year": 2003
      }
    ],
    "author_id": 3267,
    "paper_ids": [
      5004
    ],
    "papers_without_artifact_ids": [
      2761,
      5005,
      5006,
      5007,
      5008,
      5009,
      5010,
      1300,
      5011
    ]
  },
  {
    "name": "Alexander Halbuer",
    "display_name": "Alexander Halbuer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 2
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SOSP": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LLFree: Scalable and Optionally-Persistent Page-Frame Allocation",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the new costs of physical memory fragmentation",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "morsels explicit virtual memory objects",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 3268,
    "paper_ids": [
      2807
    ],
    "papers_without_artifact_ids": [
      2809,
      2810
    ]
  },
  {
    "name": "Watson Ladd",
    "display_name": "Watson Ladd",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Portunus: Re-imagining Access Control in Distributed Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "let the right one in attestation as a usable captcha alternative",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 3269,
    "paper_ids": [
      2943
    ],
    "papers_without_artifact_ids": [
      2944
    ]
  },
  {
    "name": "Tanya Verma",
    "display_name": "Tanya Verma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Portunus: Re-imagining Access Control in Distributed Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oblivious dns over https odoh a practical privacy enhancement to dns",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 3270,
    "paper_ids": [
      2943
    ],
    "papers_without_artifact_ids": [
      2945
    ]
  },
  {
    "name": "Marloes Venema",
    "display_name": "Marloes Venema",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ATC": 1,
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "CHES": {
        "2022": 1,
        "2025": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Portunus: Re-imagining Access Control in Distributed Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pracy a practical compiler for attributebased encryption in python",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "abe cubed advanced benchmarking extensions for abe squared",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "abe squared accurately benchmarking efficiency of attributebased encryption",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 3271,
    "paper_ids": [
      2943
    ],
    "papers_without_artifact_ids": [
      1470,
      1471,
      5012
    ]
  },
  {
    "name": "Armando Faz-Hernández",
    "display_name": "Armando Faz-Hernández",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "CHES": 0,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "CHES": {},
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Portunus: Re-imagining Access Control in Distributed Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "let the right one in attestation as a usable captcha alternative",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 7996,
    "paper_ids": [
      2943
    ],
    "papers_without_artifact_ids": [
      2944
    ]
  },
  {
    "name": "Brendan McMillion",
    "display_name": "Brendan McMillion",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Portunus: Re-imagining Access Control in Distributed Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3273,
    "paper_ids": [
      2943
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Avani Wildani",
    "display_name": "Avani Wildani",
    "affiliation": "Emory University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SOSP": {
        "2023": 1,
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Portunus: Re-imagining Access Control in Distributed Systems",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "presight a vision for an instantaneous web",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "persistent memory research in the postoptane era",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 3274,
    "paper_ids": [
      2943
    ],
    "papers_without_artifact_ids": [
      5013,
      4869
    ]
  },
  {
    "name": "Guyue Huang",
    "display_name": "Guyue Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TC-GNN: Bridging Sparse GNN Computation and Dense Tensor Cores on GPUs",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oper optimalityguided embedding table parallelization for largescale recommendation model",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 3275,
    "paper_ids": [
      1676
    ],
    "papers_without_artifact_ids": [
      1678
    ]
  },
  {
    "name": "Bernhard Heinloth",
    "display_name": "Bernhard Heinloth",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SOSP": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Luci: Loader-based Dynamic Software Updates for Off-the-shelf Shared Objects",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3276,
    "paper_ids": [
      5014
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peter Wägemann",
    "display_name": "Peter Wägemann",
    "affiliation": "University of Erlangen-Nuremberg",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Luci: Loader-based Dynamic Software Updates for Off-the-shelf Shared Objects",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7997,
    "paper_ids": [
      5014
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wolfgang Schröder-Preikschat",
    "display_name": "Wolfgang Schröder-Preikschat",
    "affiliation": "University of Erlangen–Nuremberg",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 2,
      "SC": 1,
      "EUROSYS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SOSP": {
        "2023": 1,
        "2021": 1
      },
      "SC": {
        "2021": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Luci: Loader-based Dynamic Software Updates for Off-the-shelf Shared Objects",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards justintime compiling of operating systems",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "the price of meltdown and spectre energy overhead of mitigations at operating system level",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "no coherence no problem virtual shared memory for mpsocs",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "anycall fast and flexible systemcall aggregation",
        "conference": "SOSP",
        "year": 2021
      }
    ],
    "author_id": 7998,
    "paper_ids": [
      5014
    ],
    "papers_without_artifact_ids": [
      5015,
      5016,
      5017,
      5018
    ]
  },
  {
    "name": "Bo Peng 0043",
    "display_name": "Bo Peng",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LPNS: Scalable and Latency-Predictable Local Storage Virtualization for Unpredictable NVMe SSDs in Clouds",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3279,
    "paper_ids": [
      1683
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cheng Guo",
    "display_name": "Cheng Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LPNS: Scalable and Latency-Predictable Local Storage Virtualization for Unpredictable NVMe SSDs in Clouds",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3280,
    "paper_ids": [
      1683
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yutong Wu 0013",
    "display_name": "Yutong Wu",
    "affiliation": "Huazhong University of Science and Technology, Wuhan National Laboratory for Optoelectronics, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SOWalker: An I/O-Optimized Out-of-Core Graph Processing System for Second-Order Random Walks",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3281,
    "paper_ids": [
      3583
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhan Shi 0001",
    "display_name": "Zhan Shi",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SC": {},
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SOWalker: An I/O-Optimized Out-of-Core Graph Processing System for Second-Order Random Walks",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3282,
    "paper_ids": [
      3583
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shicai Huang",
    "display_name": "Shicai Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SOWalker: An I/O-Optimized Out-of-Core Graph Processing System for Second-Order Random Walks",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3283,
    "paper_ids": [
      3583
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhipeng Tian",
    "display_name": "Zhipeng Tian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SOWalker: An I/O-Optimized Out-of-Core Graph Processing System for Second-Order Random Walks",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3284,
    "paper_ids": [
      3583
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pengwei Zuo",
    "display_name": "Pengwei Zuo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SOWalker: An I/O-Optimized Out-of-Core Graph Processing System for Second-Order Random Walks",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3285,
    "paper_ids": [
      3583
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peng Fang 0002",
    "display_name": "Peng Fang",
    "affiliation": "HUST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SOWalker: An I/O-Optimized Out-of-Core Graph Processing System for Second-Order Random Walks",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3286,
    "paper_ids": [
      3583
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dominik Töllner",
    "display_name": "Dominik Töllner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MELF: Multivariant Executables for a Heterogeneous World",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7999,
    "paper_ids": [
      2808
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Illia Ostapyshyn",
    "display_name": "Illia Ostapyshyn",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MELF: Multivariant Executables for a Heterogeneous World",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the new costs of physical memory fragmentation",
        "conference": "SOSP",
        "year": 2024
      }
    ],
    "author_id": 3288,
    "paper_ids": [
      2808
    ],
    "papers_without_artifact_ids": [
      2809
    ]
  },
  {
    "name": "Myoungwon Oh",
    "display_name": "Myoungwon Oh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TiDedup: A New Distributed Deduplication Architecture for Ceph",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3289,
    "paper_ids": [
      5019
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sungmin Lee",
    "display_name": "Sungmin Lee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TiDedup: A New Distributed Deduplication Architecture for Ceph",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3290,
    "paper_ids": [
      5019
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Samuel Just",
    "display_name": "Samuel Just",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TiDedup: A New Distributed Deduplication Architecture for Ceph",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3291,
    "paper_ids": [
      5019
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Youngjin Yu",
    "display_name": "Youngjin Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TiDedup: A New Distributed Deduplication Architecture for Ceph",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3292,
    "paper_ids": [
      5019
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Duck-Ho Bae",
    "display_name": "Duck-Ho Bae",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TiDedup: A New Distributed Deduplication Architecture for Ceph",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3293,
    "paper_ids": [
      5019
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sage A. Weil",
    "display_name": "Sage A. Weil",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "SOSP": 0,
      "SC": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "SOSP": {},
      "SC": {},
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TiDedup: A New Distributed Deduplication Architecture for Ceph",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3294,
    "paper_ids": [
      5019
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sangyeun Cho",
    "display_name": "Sangyeun Cho",
    "affiliation": "Samsung",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ATC": 2,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "FAST": {
        "2015": 1,
        "2018": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TiDedup: A New Distributed Deduplication Architecture for Ceph",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "zms zone abstraction for mobile flash storage",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "fstream managing flash streams in the file system",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "barrierenabled io stack for flash storage",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "f2fs a new file system for flash storage",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 3295,
    "paper_ids": [
      5019
    ],
    "papers_without_artifact_ids": [
      4916,
      5020,
      4915,
      5021
    ]
  },
  {
    "name": "Heon Y. Yeom",
    "display_name": "Heon Y. Yeom",
    "affiliation": "Seoul National University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "EUROSYS": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2023": 1
      },
      "EUROSYS": {},
      "FAST": {
        "2018": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TiDedup: A New Distributed Deduplication Architecture for Ceph",
        "conference": "ATC",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "highperformance transaction processing in journaling file systems",
        "conference": "FAST",
        "year": 2018
      }
    ],
    "author_id": 3296,
    "paper_ids": [
      5019
    ],
    "papers_without_artifact_ids": [
      4972
    ]
  },
  {
    "name": "Hassan Ali 0001",
    "display_name": "Hassan Ali",
    "affiliation": "Boğaziçi University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3297,
    "paper_ids": [
      761
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sanjay K. Jha",
    "display_name": "Sanjay K. Jha",
    "affiliation": "UNSW",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3298,
    "paper_ids": [
      761
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jens Lindemann 0001",
    "display_name": "Jens Lindemann",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Faking deduplication to prevent timing side-channel attacks on memory deduplication",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3299,
    "paper_ids": [
      5022
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunbo Wang",
    "display_name": "Yunbo Wang",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3300,
    "paper_ids": [
      2163
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qiaosen Liu",
    "display_name": "Qiaosen Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3301,
    "paper_ids": [
      2163
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bingnan Su",
    "display_name": "Bingnan Su",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3302,
    "paper_ids": [
      2163
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zongxu Zhang",
    "display_name": "Zongxu Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3303,
    "paper_ids": [
      2163
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Norris",
    "display_name": "Michael Norris",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3304,
    "paper_ids": [
      2163
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianfeng Ma 0001",
    "display_name": "Jianfeng Ma",
    "affiliation": "Xidian University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lhawk a controllable physical adversarial patch against a longdistance target",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "attacks are forwarded breaking the isolation of microvmbased containers through operation forwarding",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 3305,
    "paper_ids": [
      2163
    ],
    "papers_without_artifact_ids": [
      5023,
      2143
    ]
  },
  {
    "name": "Yanduo Fu",
    "display_name": "Yanduo Fu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Leaky Autofill: An Empirical Study on the Privacy Threat of Password Managers' Autofill Functionality",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3306,
    "paper_ids": [
      3879
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shihua Sun",
    "display_name": "Shihua Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3307,
    "paper_ids": [
      5024
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kenechukwu Nwodo",
    "display_name": "Kenechukwu Nwodo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3308,
    "paper_ids": [
      5024
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shridatt Sugrim",
    "display_name": "Shridatt Sugrim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3309,
    "paper_ids": [
      5024
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Angelos Stavrou",
    "display_name": "Angelos Stavrou",
    "affiliation": "Virginia Tech, VA, USA",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SC": 0,
      "EUROSYS": 0,
      "ATC": 0,
      "USENIXSEC": 2,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "SC": {},
      "EUROSYS": {},
      "ATC": {},
      "USENIXSEC": {
        "2020": 1,
        "2021": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "definit an analysis of exposed android init routines",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "firmscope automatic uncovering of privilegeescalation vulnerabilities in preinstalled apps in android firmware",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3310,
    "paper_ids": [
      5024
    ],
    "papers_without_artifact_ids": [
      5025,
      399
    ]
  },
  {
    "name": "Haining Wang 0001",
    "display_name": "Haining Wang",
    "affiliation": "Boğaziçi University",
    "artifact_count": 1,
    "total_papers": 10,
    "total_papers_by_conf": {
      "ACSAC": 4,
      "SC": 0,
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 1,
      "USENIXSEC": 3,
      "WOOT": 0,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2021": 1,
        "2019": 1,
        "2020": 1
      },
      "SC": {},
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {},
      "FAST": {
        "2012": 1
      },
      "USENIXSEC": {
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "WOOT": {},
      "NSDI": {
        "2008": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 10.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "timetravel realtime timing drift attack on system time using acoustic waves",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "save the bruised striver a reliable live patching framework for protecting realworld plcs",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "exploring the unchartered space of container registry typosquatting",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "an exploration of arm systemlevel cache and gpu side channels",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "chargersurfing exploiting a power line sidechannel for smartphone information leakage",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "understanding promotionasaservice on github",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "casino royale a deep exploration of illegal online gambling",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "understanding performance implications of nested file systems in a virtualized environment",
        "conference": "FAST",
        "year": 2012
      },
      {
        "title": "swift a fast dynamic packet filter",
        "conference": "NSDI",
        "year": 2008
      }
    ],
    "author_id": 3311,
    "paper_ids": [
      5024
    ],
    "papers_without_artifact_ids": [
      5026,
      5027,
      1460,
      5028,
      5029,
      260,
      3059,
      5030,
      5031
    ]
  },
  {
    "name": "Youpeng Li",
    "display_name": "Youpeng Li",
    "affiliation": "University of Texas at Dallas",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FedCAP: Robust Federated Learning via Customized Aggregation and Personalization",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "when ai meets code analysis a study of adversarial attacks on deep learningbased code models via program transformation",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 3312,
    "paper_ids": [
      3887
    ],
    "papers_without_artifact_ids": [
      3888
    ]
  },
  {
    "name": "Fuxun Yu",
    "display_name": "Fuxun Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FedCAP: Robust Federated Learning via Customized Aggregation and Personalization",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3313,
    "paper_ids": [
      3887
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lichao Sun 0001",
    "display_name": "Lichao Sun",
    "affiliation": "Lehigh University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FedCAP: Robust Federated Learning via Customized Aggregation and Personalization",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unveiling the secrets without data can graph neural networks be exploited through datafree model extraction attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "doublestar longrange attack towards depth estimation based obstacle avoidance in autonomous systems",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 3314,
    "paper_ids": [
      3887
    ],
    "papers_without_artifact_ids": [
      5032,
      5033
    ]
  },
  {
    "name": "Wenbin Zhang 0002",
    "display_name": "Wenbin Zhang",
    "affiliation": "Florida International University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FedCAP: Robust Federated Learning via Customized Aggregation and Personalization",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3315,
    "paper_ids": [
      3887
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xuyu Wang",
    "display_name": "Xuyu Wang",
    "affiliation": "Florida International University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FedCAP: Robust Federated Learning via Customized Aggregation and Personalization",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3316,
    "paper_ids": [
      3887
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiamin Shen",
    "display_name": "Jiamin Shen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "T-Edge: Trusted Heterogeneous Edge Computing",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3317,
    "paper_ids": [
      2956
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yao Chen 0008",
    "display_name": "Yao Chen",
    "affiliation": "Nanjing University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "T-Edge: Trusted Heterogeneous Edge Computing",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3318,
    "paper_ids": [
      2956
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weng-Fai Wong",
    "display_name": "Weng-Fai Wong",
    "affiliation": "National University of Singapore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SOSP": 0,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "SOSP": {},
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "T-Edge: Trusted Heterogeneous Edge Computing",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3319,
    "paper_ids": [
      2956
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leonard Niemann",
    "display_name": "Leonard Niemann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3320,
    "paper_ids": [
      323
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jan Reineke 0001",
    "display_name": "Jan Reineke",
    "affiliation": "Saarland University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3321,
    "paper_ids": [
      323
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Giulio Pagnotta",
    "display_name": "Giulio Pagnotta",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3322,
    "paper_ids": [
      5034
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dorjan Hitaj",
    "display_name": "Dorjan Hitaj",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3323,
    "paper_ids": [
      5034
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Briland Hitaj",
    "display_name": "Briland Hitaj",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3324,
    "paper_ids": [
      5034
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fernando Pérez-Cruz",
    "display_name": "Fernando Pérez-Cruz",
    "affiliation": "ETH Zurich",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8000,
    "paper_ids": [
      5034
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Luigi V. Mancini",
    "display_name": "Luigi V. Mancini",
    "affiliation": "Sapienza University of Rome",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3326,
    "paper_ids": [
      5034
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Liam Tyler",
    "display_name": "Liam Tyler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SpecCFA: Enhancing Control Flow Attestation/Auditing via Application-Aware Sub-Path Speculation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3327,
    "paper_ids": [
      2170
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yeji Park",
    "display_name": "Yeji Park",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3328,
    "paper_ids": [
      5035
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hyunsu Cho",
    "display_name": "Hyunsu Cho",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3329,
    "paper_ids": [
      5035
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dong Hoon Lee 0001",
    "display_name": "Dong Hoon Lee",
    "affiliation": "Korea University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 0,
      "CHES": 0,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "ATC": {},
      "CHES": {},
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ridas realtime identification of attack sources on controller area networks",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 3330,
    "paper_ids": [
      5035
    ],
    "papers_without_artifact_ids": [
      5036
    ]
  },
  {
    "name": "Wonsuk Choi 0001",
    "display_name": "Wonsuk Choi",
    "affiliation": "City University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ridas realtime identification of attack sources on controller area networks",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 3331,
    "paper_ids": [
      5035
    ],
    "papers_without_artifact_ids": [
      5036
    ]
  },
  {
    "name": "Qiqing Deng",
    "display_name": "Qiqing Deng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ConProv: A Container-Aware Provenance System for Attack Investigation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3332,
    "paper_ids": [
      5037
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yanqiang Zhang",
    "display_name": "Yanqiang Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ConProv: A Container-Aware Provenance System for Attack Investigation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3333,
    "paper_ids": [
      5037
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhen Xu 0009",
    "display_name": "Zhen Xu",
    "affiliation": "University of Chinese Academy of Sciences",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ConProv: A Container-Aware Provenance System for Attack Investigation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3334,
    "paper_ids": [
      5037
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qian Tan",
    "display_name": "Qian Tan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ConProv: A Container-Aware Provenance System for Attack Investigation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3335,
    "paper_ids": [
      5037
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yan Zhang 0014",
    "display_name": "Yan Zhang",
    "affiliation": "Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ConProv: A Container-Aware Provenance System for Attack Investigation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3336,
    "paper_ids": [
      5037
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junmo Lee 0001",
    "display_name": "Junmo Lee",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RouTEE: Secure, Scalable, and Efficient Off-Chain Payments using Trusted Execution Environments",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ethanos efficient bootstrapping for full nodes on accountbased blockchain",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 3337,
    "paper_ids": [
      5038
    ],
    "papers_without_artifact_ids": [
      5039
    ]
  },
  {
    "name": "Seongjun Kim",
    "display_name": "Seongjun Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RouTEE: Secure, Scalable, and Efficient Off-Chain Payments using Trusted Execution Environments",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3338,
    "paper_ids": [
      5038
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sanghyeon Park",
    "display_name": "Sanghyeon Park",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RouTEE: Secure, Scalable, and Efficient Off-Chain Payments using Trusted Execution Environments",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3339,
    "paper_ids": [
      5038
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Soo-Mook Moon",
    "display_name": "Soo-Mook Moon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SC": 0,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "SC": {},
      "EUROSYS": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RouTEE: Secure, Scalable, and Efficient Off-Chain Payments using Trusted Execution Environments",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ethanos efficient bootstrapping for full nodes on accountbased blockchain",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 3340,
    "paper_ids": [
      5038
    ],
    "papers_without_artifact_ids": [
      5039
    ]
  },
  {
    "name": "Maximilian Westers",
    "display_name": "Maximilian Westers",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Single Sign-On Privacy: We Still Know What You Did Last Summer",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3341,
    "paper_ids": [
      5040
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andreas Mayer",
    "display_name": "Andreas Mayer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Single Sign-On Privacy: We Still Know What You Did Last Summer",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3342,
    "paper_ids": [
      5040
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Louis Jannett",
    "display_name": "Louis Jannett",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Single Sign-On Privacy: We Still Know What You Did Last Summer",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3343,
    "paper_ids": [
      5040
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiangxin Guo",
    "display_name": "Xiangxin Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3344,
    "paper_ids": [
      1693
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guangzheng Li",
    "display_name": "Guangzheng Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3345,
    "paper_ids": [
      1693
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kailiang Ji",
    "display_name": "Kailiang Ji",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3346,
    "paper_ids": [
      1693
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leon Kersten",
    "display_name": "Leon Kersten",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Security Alert Investigation Tool Supporting Tier 1 Analysts in Contextualizing and Understanding Network Security Events",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3347,
    "paper_ids": [
      2960
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Santiago Darré",
    "display_name": "Santiago Darré",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Security Alert Investigation Tool Supporting Tier 1 Analysts in Contextualizing and Understanding Network Security Events",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8001,
    "paper_ids": [
      2960
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tom Mulders",
    "display_name": "Tom Mulders",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Security Alert Investigation Tool Supporting Tier 1 Analysts in Contextualizing and Understanding Network Security Events",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3349,
    "paper_ids": [
      2960
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Emmanuele Zambon",
    "display_name": "Emmanuele Zambon",
    "affiliation": "University of Twente",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2017": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Security Alert Investigation Tool Supporting Tier 1 Analysts in Contextualizing and Understanding Network Security Events",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ecfi asynchronous control flow integrity for programmable logic controllers",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 3350,
    "paper_ids": [
      2960
    ],
    "papers_without_artifact_ids": [
      124
    ]
  },
  {
    "name": "Chris Snijders 0001",
    "display_name": "Chris Snijders",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Security Alert Investigation Tool Supporting Tier 1 Analysts in Contextualizing and Understanding Network Security Events",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3351,
    "paper_ids": [
      2960
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Reza Ebrahimi 0001",
    "display_name": "Reza Ebrahimi",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3352,
    "paper_ids": [
      1400
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Balaji Padmanabhan",
    "display_name": "Balaji Padmanabhan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3353,
    "paper_ids": [
      1400
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhaoxi Zhang 0001",
    "display_name": "Zhaoxi Zhang",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Stealing Watermarks of Large Language Models via Mixed Integer Programming",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3354,
    "paper_ids": [
      2964
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaomei Zhang 0001",
    "display_name": "Xiaomei Zhang",
    "affiliation": "University of South Carolina",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Stealing Watermarks of Large Language Models via Mixed Integer Programming",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3355,
    "paper_ids": [
      2964
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chao Chen 0015",
    "display_name": "Chao Chen",
    "affiliation": "Hunan University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Stealing Watermarks of Large Language Models via Mixed Integer Programming",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the audio auditor userlevel membership inference in internet of things voice services",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 3356,
    "paper_ids": [
      2964
    ],
    "papers_without_artifact_ids": [
      1580
    ]
  },
  {
    "name": "Shengshan Hu",
    "display_name": "Shengshan Hu",
    "affiliation": "HUST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Stealing Watermarks of Large Language Models via Mixed Integer Programming",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3357,
    "paper_ids": [
      2964
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Asif Gill",
    "display_name": "Asif Gill",
    "affiliation": "University of Technology Sydney",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Stealing Watermarks of Large Language Models via Mixed Integer Programming",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3358,
    "paper_ids": [
      2964
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Antonio Joia Neto",
    "display_name": "Antonio Joia Neto",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3359,
    "paper_ids": [
      2171
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Basanta Chaulagain",
    "display_name": "Basanta Chaulagain",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FA-SEAL: Forensically Analyzable Symmetric Encryption for Audit Logs",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3360,
    "paper_ids": [
      3894
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Felix Morsbach",
    "display_name": "Felix Morsbach",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "R+R: Understanding Hyperparameter Effects in DP-SGD",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3361,
    "paper_ids": [
      2173
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jan Reubold",
    "display_name": "Jan Reubold",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "R+R: Understanding Hyperparameter Effects in DP-SGD",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3362,
    "paper_ids": [
      2173
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sirui Shen",
    "display_name": "Sirui Shen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3363,
    "paper_ids": [
      3895
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yongming Fan",
    "display_name": "Yongming Fan",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3364,
    "paper_ids": [
      2183
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Priyam Biswas",
    "display_name": "Priyam Biswas",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3365,
    "paper_ids": [
      2183
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Geovani Benita",
    "display_name": "Geovani Benita",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VaktBLE: A Benevolent Man-in-the-Middle Bridge to Guard against Malevolent BLE Connections",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3366,
    "paper_ids": [
      2186
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leonardo Sestrem",
    "display_name": "Leonardo Sestrem",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VaktBLE: A Benevolent Man-in-the-Middle Bridge to Guard against Malevolent BLE Connections",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3367,
    "paper_ids": [
      2186
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhenzhi Lai",
    "display_name": "Zhenzhi Lai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "R+R: Demystifying ML-Assisted Side-Channel Analysis Framework: A Case of Image Reconstruction",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3368,
    "paper_ids": [
      3896
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Udaya Parampalli",
    "display_name": "Udaya Parampalli",
    "affiliation": "University of Melbourne",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "R+R: Demystifying ML-Assisted Side-Channel Analysis Framework: A Case of Image Reconstruction",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3369,
    "paper_ids": [
      3896
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dang Quang Nguyen",
    "display_name": "Dang Quang Nguyen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3370,
    "paper_ids": [
      2189
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Callum Lindquist",
    "display_name": "Callum Lindquist",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3371,
    "paper_ids": [
      2189
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Paul Montague",
    "display_name": "Paul Montague",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "eatvul chatgptbased evasion attack against software vulnerability detection",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3372,
    "paper_ids": [
      2189
    ],
    "papers_without_artifact_ids": [
      2191
    ]
  },
  {
    "name": "Tamas Abraham",
    "display_name": "Tamas Abraham",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "eatvul chatgptbased evasion attack against software vulnerability detection",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3373,
    "paper_ids": [
      2189
    ],
    "papers_without_artifact_ids": [
      2191
    ]
  },
  {
    "name": "Olivier Y. de Vel",
    "display_name": "Olivier Y. de Vel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3374,
    "paper_ids": [
      2189
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Oualid Zari",
    "display_name": "Oualid Zari",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Link Inference Attacks in Vertical Federated Graph Learning",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3375,
    "paper_ids": [
      3897
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Javier Parra-Arnau",
    "display_name": "Javier Parra-Arnau",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Link Inference Attacks in Vertical Federated Graph Learning",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok differentially private publication of trajectory data",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 3376,
    "paper_ids": [
      3897
    ],
    "papers_without_artifact_ids": [
      2180
    ]
  },
  {
    "name": "Ayse Ünsal",
    "display_name": "Ayse Ünsal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Link Inference Attacks in Vertical Federated Graph Learning",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8002,
    "paper_ids": [
      3897
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sima Arasteh",
    "display_name": "Sima Arasteh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BinHunter: A Fine-Grained Graph Representation for Localizing Vulnerabilities in Binary Executables",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3378,
    "paper_ids": [
      2192
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mukund Raghothaman",
    "display_name": "Mukund Raghothaman",
    "affiliation": "University of Southern California",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BinHunter: A Fine-Grained Graph Representation for Localizing Vulnerabilities in Binary Executables",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3379,
    "paper_ids": [
      2192
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Teh Beng Yen",
    "display_name": "Teh Beng Yen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SECvma: Virtualization-based Linux Kernel Protection for Arm",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3380,
    "paper_ids": [
      2695
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joey Li",
    "display_name": "Joey Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SECvma: Virtualization-based Linux Kernel Protection for Arm",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3381,
    "paper_ids": [
      2695
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Achyut Hegde",
    "display_name": "Achyut Hegde",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Model-Manipulation Attacks Against Black-Box Explanations",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3382,
    "paper_ids": [
      2202
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Md. Rayhanur Rahman",
    "display_name": "Md. Rayhanur Rahman",
    "affiliation": "University of Central Florida",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards a Taxonomy of Challenges in Security Control Implementation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3383,
    "paper_ids": [
      5041
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Brandon Wroblewski",
    "display_name": "Brandon Wroblewski",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards a Taxonomy of Challenges in Security Control Implementation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3384,
    "paper_ids": [
      5041
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mahzabin Tamanna",
    "display_name": "Mahzabin Tamanna",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards a Taxonomy of Challenges in Security Control Implementation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3385,
    "paper_ids": [
      5041
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Imranur Rahman",
    "display_name": "Imranur Rahman",
    "affiliation": "North Carolina State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards a Taxonomy of Challenges in Security Control Implementation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3386,
    "paper_ids": [
      5041
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrew Anufryienak",
    "display_name": "Andrew Anufryienak",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards a Taxonomy of Challenges in Security Control Implementation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3387,
    "paper_ids": [
      5041
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Laurie A. Williams",
    "display_name": "Laurie A. Williams",
    "affiliation": "North Carolina State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards a Taxonomy of Challenges in Security Control Implementation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3388,
    "paper_ids": [
      5041
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenxuan Bao",
    "display_name": "Wenxuan Bao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "R+R: Towards Reliable and Generalizable Differentially Private Machine Learning",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3389,
    "paper_ids": [
      3901
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ildi Alla",
    "display_name": "Ildi Alla",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Robust Device Authentication in Multi-Node Networks: ML-Assisted Hybrid PLA Exploiting Hardware Impairments",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3390,
    "paper_ids": [
      5042
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Selma Yahia",
    "display_name": "Selma Yahia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Robust Device Authentication in Multi-Node Networks: ML-Assisted Hybrid PLA Exploiting Hardware Impairments",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3391,
    "paper_ids": [
      5042
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Valeria Loscrì",
    "display_name": "Valeria Loscrì",
    "affiliation": "Inria",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Robust Device Authentication in Multi-Node Networks: ML-Assisted Hybrid PLA Exploiting Hardware Impairments",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8003,
    "paper_ids": [
      5042
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hossien B. Eldeeb",
    "display_name": "Hossien B. Eldeeb",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Robust Device Authentication in Multi-Node Networks: ML-Assisted Hybrid PLA Exploiting Hardware Impairments",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3393,
    "paper_ids": [
      5042
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anurag Swarnim Yadav",
    "display_name": "Anurag Swarnim Yadav",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "R+R: Security Vulnerability Dataset Quality Is Critical",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bigmac finegrained policy analysis of android firmware",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3394,
    "paper_ids": [
      5043
    ],
    "papers_without_artifact_ids": [
      2216
    ]
  },
  {
    "name": "Joseph N. Wilson",
    "display_name": "Joseph N. Wilson",
    "affiliation": "University of Florida",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "R+R: Security Vulnerability Dataset Quality Is Critical",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3395,
    "paper_ids": [
      5043
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Malcom Mohamed",
    "display_name": "Malcom Mohamed",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Light Clients for Committee-Based Blockchains",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3396,
    "paper_ids": [
      1709
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christiane Weis",
    "display_name": "Christiane Weis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "PETS": {
        "2024": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Light Clients for Committee-Based Blockchains",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "provable security for the onion routing and mix network packet format sphinx",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "a framework for provably secure onion routing against a global adversary",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 3397,
    "paper_ids": [
      1709
    ],
    "papers_without_artifact_ids": [
      2178,
      2177
    ]
  },
  {
    "name": "Konstantinos Kleftogiorgos",
    "display_name": "Konstantinos Kleftogiorgos",
    "affiliation": "Stevens Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sidecar: Leveraging Debugging Extensions in Commodity Processors to Secure Software",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3398,
    "paper_ids": [
      1753
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shan Huang",
    "display_name": "Shan Huang",
    "affiliation": "Stevens Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SC": 0,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "SC": {},
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sidecar: Leveraging Debugging Extensions in Commodity Processors to Secure Software",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3399,
    "paper_ids": [
      1753
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Changtian Song",
    "display_name": "Changtian Song",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Not All Tokens Are Equal: Membership Inference Attacks Against Fine-tuned Language Models",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3400,
    "paper_ids": [
      5044
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dongdong Zhao 0001",
    "display_name": "Dongdong Zhao",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Not All Tokens Are Equal: Membership Inference Attacks Against Fine-tuned Language Models",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3401,
    "paper_ids": [
      5044
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianwen Xiang",
    "display_name": "Jianwen Xiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Not All Tokens Are Equal: Membership Inference Attacks Against Fine-tuned Language Models",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3402,
    "paper_ids": [
      5044
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Konstantinos Solomos",
    "display_name": "Konstantinos Solomos",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Harnessing Multiplicity: Granular Browser Extension Fingerprinting through User Configurations",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the dangers of human touch fingerprinting browser extensions through user actions",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 3403,
    "paper_ids": [
      1111
    ],
    "papers_without_artifact_ids": [
      1120
    ]
  },
  {
    "name": "Guoqiang Hua",
    "display_name": "Guoqiang Hua",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AirBugCatcher: Automated Wireless Reproduction of IoT Bugs",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3404,
    "paper_ids": [
      2187
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Günther 0004",
    "display_name": "Daniel Günther",
    "affiliation": "TU Darmstadt",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gpuaccelerated pir with clientindependent preprocessing for largescale applications",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 8004,
    "paper_ids": [
      2968
    ],
    "papers_without_artifact_ids": [
      2971
    ]
  },
  {
    "name": "Joachim Schmidt 0006",
    "display_name": "Joachim Schmidt",
    "affiliation": "Technical University of Darmstadt, Germany",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3406,
    "paper_ids": [
      2968
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Si Liao",
    "display_name": "Si Liao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SecurityHub: Electromagnetic Fingerprinting USB Peripherals using Backscatter-assisted Commodity Hardware",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3407,
    "paper_ids": [
      2948
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Huangxun Chen",
    "display_name": "Huangxun Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SecurityHub: Electromagnetic Fingerprinting USB Peripherals using Backscatter-assisted Commodity Hardware",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "camshield securing smart cameras through physical replication and isolation",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 3408,
    "paper_ids": [
      2948
    ],
    "papers_without_artifact_ids": [
      2950
    ]
  },
  {
    "name": "Yijia Fang",
    "display_name": "Yijia Fang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FreeAuth: Privacy-Preserving Email Ownership Authentication with Verification-Email-Free",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3409,
    "paper_ids": [
      3919
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bingyu Li",
    "display_name": "Bingyu Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FreeAuth: Privacy-Preserving Email Ownership Authentication with Verification-Email-Free",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automatic insecurity exploring email autoconfiguration in the wild",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "certificate transparency revisited the public inspections on thirdparty monitors",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 3410,
    "paper_ids": [
      3919
    ],
    "papers_without_artifact_ids": [
      905,
      2986
    ]
  },
  {
    "name": "Jiale Xiao",
    "display_name": "Jiale Xiao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FreeAuth: Privacy-Preserving Email Ownership Authentication with Verification-Email-Free",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3411,
    "paper_ids": [
      3919
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhijintong Zhang",
    "display_name": "Zhijintong Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FreeAuth: Privacy-Preserving Email Ownership Authentication with Verification-Email-Free",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reproducible"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3412,
    "paper_ids": [
      3919
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simone Zerbini",
    "display_name": "Simone Zerbini",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3413,
    "paper_ids": [
      2217
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Primal Wijesekera",
    "display_name": "Primal Wijesekera",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2020": 1
      },
      "PETS": {
        "2020": 1,
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android",
        "conference": "ACSAC",
        "year": 2024,
        "badges": [
          "reviewed"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lessons in vcr repair compliance of android app developers with the california consumer privacy act ccpa",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "the price is not right comparing privacy in free and paid apps",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "youve got your nice list of bugs now what vulnerability discovery and management processes in the wild",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3414,
    "paper_ids": [
      2217
    ],
    "papers_without_artifact_ids": [
      3924,
      3928,
      3930
    ]
  },
  {
    "name": "Thai-Dien Pham",
    "display_name": "Thai-Dien Pham",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MAppGraph: Mobile-App Classification on Encrypted Network Traffic using Deep Graph Convolution Neural Networks",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3415,
    "paper_ids": [
      5045
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thien-Lac Ho",
    "display_name": "Thien-Lac Ho",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MAppGraph: Mobile-App Classification on Encrypted Network Traffic using Deep Graph Convolution Neural Networks",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3416,
    "paper_ids": [
      5045
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tram Truong Huu",
    "display_name": "Tram Truong Huu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MAppGraph: Mobile-App Classification on Encrypted Network Traffic using Deep Graph Convolution Neural Networks",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3417,
    "paper_ids": [
      5045
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tien-Dung Cao",
    "display_name": "Tien-Dung Cao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MAppGraph: Mobile-App Classification on Encrypted Network Traffic using Deep Graph Convolution Neural Networks",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3418,
    "paper_ids": [
      5045
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hong Linh Truong 0001",
    "display_name": "Hong Linh Truong",
    "affiliation": "Aalto University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MAppGraph: Mobile-App Classification on Encrypted Network Traffic using Deep Graph Convolution Neural Networks",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3419,
    "paper_ids": [
      5045
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Namgyu Park",
    "display_name": "Namgyu Park",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Detecting Audio Adversarial Examples with Logit Noising",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3420,
    "paper_ids": [
      5046
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sangwoo Ji",
    "display_name": "Sangwoo Ji",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Detecting Audio Adversarial Examples with Logit Noising",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3421,
    "paper_ids": [
      5046
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jong Kim 0001",
    "display_name": "Jong Kim",
    "affiliation": "POSTECH",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "SC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Detecting Audio Adversarial Examples with Logit Noising",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3422,
    "paper_ids": [
      5046
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ming Li 0006",
    "display_name": "Ming Li",
    "affiliation": "University of Texas at Arlington",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1,
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sipster: Settling IOU Privately and Quickly with Smart Meters",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "eavesdropping on blackbox mobile devices via audio amplifiers emr",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "continuous authentication using humaninduced electric potential",
        "conference": "ACSAC",
        "year": 2023
      }
    ],
    "author_id": 3423,
    "paper_ids": [
      1720
    ],
    "papers_without_artifact_ids": [
      3932,
      3934
    ]
  },
  {
    "name": "Yongjun Zhao 0001",
    "display_name": "Yongjun Zhao",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sipster: Settling IOU Privately and Quickly with Smart Meters",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3424,
    "paper_ids": [
      1720
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Duy-Phuc Pham",
    "display_name": "Duy-Phuc Pham",
    "affiliation": "INRIA, IRISA, France",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3425,
    "paper_ids": [
      5047
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Damien Marion 0001",
    "display_name": "Damien Marion",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "avengers assemble supervised learning meets lattice reduction a single power trace attack against crystalskyber key generation",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 3426,
    "paper_ids": [
      5047
    ],
    "papers_without_artifact_ids": [
      3069
    ]
  },
  {
    "name": "Matthieu Mastio",
    "display_name": "Matthieu Mastio",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3427,
    "paper_ids": [
      5047
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Annelie Heuser",
    "display_name": "Annelie Heuser",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "CHES": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "CHES": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3428,
    "paper_ids": [
      5047
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "William Blair",
    "display_name": "William Blair",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FlexFilt: Towards Flexible Instruction Filtering for Security",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3429,
    "paper_ids": [
      793
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shitong Zhu",
    "display_name": "Shitong Zhu",
    "affiliation": "University of California, Riverside",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Eluding ML-based Adblockers With Actionable Adversarial Examples",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3430,
    "paper_ids": [
      802
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhongjie Wang 0002",
    "display_name": "Zhongjie Wang",
    "affiliation": "University of California, Riverside",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Eluding ML-based Adblockers With Actionable Adversarial Examples",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3431,
    "paper_ids": [
      802
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shasha Li 0001",
    "display_name": "Shasha Li",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Eluding ML-based Adblockers With Actionable Adversarial Examples",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3432,
    "paper_ids": [
      802
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Keyu Man",
    "display_name": "Keyu Man",
    "affiliation": "University of California, Riverside",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Eluding ML-based Adblockers With Actionable Adversarial Examples",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "poison over troubled forwarders a cache poisoning attack targeting dns forwarding devices",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3433,
    "paper_ids": [
      802
    ],
    "papers_without_artifact_ids": [
      920
    ]
  },
  {
    "name": "Kevin S. Chan",
    "display_name": "Kevin S. Chan",
    "affiliation": "U.S. Army Research Laboratory, Adelphi, MD, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Eluding ML-based Adblockers With Actionable Adversarial Examples",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3434,
    "paper_ids": [
      802
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Srikanth V. Krishnamurthy",
    "display_name": "Srikanth V. Krishnamurthy",
    "affiliation": "Univ. of California - Riverside",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 2,
      "WOOT": 0,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2021": 1
      },
      "WOOT": {},
      "NSDI": {
        "2007": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Eluding ML-based Adblockers With Actionable Adversarial Examples",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dont waste my efforts pruning redundant sanitizer checks by developerimplemented type checks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "syzvegas beating kernel fuzzing odds with reinforcement learning",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "a systematic framework for unearthing the missing links measurements and impact",
        "conference": "NSDI",
        "year": 2007
      }
    ],
    "author_id": 3435,
    "paper_ids": [
      802
    ],
    "papers_without_artifact_ids": [
      2225,
      2228,
      5048
    ]
  },
  {
    "name": "Yu Hao 0006",
    "display_name": "Yu Hao",
    "affiliation": "Jilin University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Eluding ML-based Adblockers With Actionable Adversarial Examples",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "syzbridge bridging the gap in exploitability assessment of linux kernel bugs in the linux ecosystem",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "symbisect accurate bisection for fuzzerexposed vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3436,
    "paper_ids": [
      802
    ],
    "papers_without_artifact_ids": [
      2223,
      2224
    ]
  },
  {
    "name": "Simon Birnbach",
    "display_name": "Simon Birnbach",
    "affiliation": "University of Oxford",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3437,
    "paper_ids": [
      2204
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Richard Baker 0008",
    "display_name": "Richard Baker",
    "affiliation": "University of Oxford",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "glados locationaware denialofservice of cellular networks",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 3438,
    "paper_ids": [
      2204
    ],
    "papers_without_artifact_ids": [
      1228
    ]
  },
  {
    "name": "Pallavi Sivakumaran",
    "display_name": "Pallavi Sivakumaran",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3439,
    "paper_ids": [
      2975
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Niclas Kühnapfel",
    "display_name": "Niclas Kühnapfel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8005,
    "paper_ids": [
      535
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stefan Preußler",
    "display_name": "Stefan Preußler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8006,
    "paper_ids": [
      535
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas Schneider",
    "display_name": "Thomas Schneider",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3442,
    "paper_ids": [
      535
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Borce Stojkovski",
    "display_name": "Borce Stojkovski",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3443,
    "paper_ids": [
      3936
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vincent Koenig",
    "display_name": "Vincent Koenig",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "what motivates and discourages employees in phishing interventions an exploration of expectancyvalue theory",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3444,
    "paper_ids": [
      3936
    ],
    "papers_without_artifact_ids": [
      3938
    ]
  },
  {
    "name": "Salvador Rivas",
    "display_name": "Salvador Rivas",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3445,
    "paper_ids": [
      3936
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhaohe John Zhang",
    "display_name": "Zhaohe John Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast Speech",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3446,
    "paper_ids": [
      5049
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Edwin Yang",
    "display_name": "Edwin Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast Speech",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3447,
    "paper_ids": [
      5049
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Song Fang 0001",
    "display_name": "Song Fang",
    "affiliation": "University of Oklahoma",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast Speech",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3448,
    "paper_ids": [
      5049
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yumei Zhang",
    "display_name": "Yumei Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ReCFA: Resilient Control-Flow Attestation",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3449,
    "paper_ids": [
      2164
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xinzhi Liu",
    "display_name": "Xinzhi Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ReCFA: Resilient Control-Flow Attestation",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3450,
    "paper_ids": [
      2164
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dongrui Zeng",
    "display_name": "Dongrui Zeng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ReCFA: Resilient Control-Flow Attestation",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "libscan towards more precise thirdparty library identification for android applications",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 3451,
    "paper_ids": [
      2164
    ],
    "papers_without_artifact_ids": [
      2168
    ]
  },
  {
    "name": "Xiao Kan",
    "display_name": "Xiao Kan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ReCFA: Resilient Control-Flow Attestation",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3452,
    "paper_ids": [
      2164
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Siqi Ma",
    "display_name": "Siqi Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "ACSAC": 3,
      "ATC": 0,
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1,
        "2019": 1,
        "2020": 1
      },
      "ATC": {},
      "USENIXSEC": {
        "2023": 3
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ReCFA: Resilient Control-Flow Attestation",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enhancing security in thirdparty library reuse comprehensive detection of 1day vulnerability through code patch analysis",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "libscan towards more precise thirdparty library identification for android applications",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "medusa attack exploring security hazards of inapp qr code scanning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "pass2edit a multistep generative model for guessing edited passwords",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "certified copy understanding security risks of wifi hotspot based android data clone services",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "an empirical study of sms onetime password authentication in android apps",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 3453,
    "paper_ids": [
      2164
    ],
    "papers_without_artifact_ids": [
      5050,
      2168,
      1170,
      3885,
      768,
      769
    ]
  },
  {
    "name": "Martin Radev",
    "display_name": "Martin Radev",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VIA: Analyzing Device Interfaces of Protected Virtual Machines",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3454,
    "paper_ids": [
      3939
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Robert Buhren",
    "display_name": "Robert Buhren",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VIA: Analyzing Device Interfaces of Protected Virtual Machines",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3455,
    "paper_ids": [
      3939
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mathias Morbitzer",
    "display_name": "Mathias Morbitzer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VIA: Analyzing Device Interfaces of Protected Virtual Machines",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3456,
    "paper_ids": [
      3939
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christian Hemminghaus",
    "display_name": "Christian Hemminghaus",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3457,
    "paper_ids": [
      2981
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Philipp Schlipper",
    "display_name": "Philipp Schlipper",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3458,
    "paper_ids": [
      2981
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingyuan Gao",
    "display_name": "Mingyuan Gao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3459,
    "paper_ids": [
      2957
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hung Dang",
    "display_name": "Hung Dang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      },
      "PETS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3460,
    "paper_ids": [
      2957
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Antonio Ruggia",
    "display_name": "Antonio Ruggia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3461,
    "paper_ids": [
      1129
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Luca Verderame",
    "display_name": "Luca Verderame",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3462,
    "paper_ids": [
      1129
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Moukarzel",
    "display_name": "Michael Moukarzel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RingRAM: A Unified Hardware SecurityPrimitive for IoT Devices that Gets Better with Age",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3463,
    "paper_ids": [
      2232
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sohaib Kiani",
    "display_name": "Sohaib Kiani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3464,
    "paper_ids": [
      2238
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sana Awan",
    "display_name": "Sana Awan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3465,
    "paper_ids": [
      2238
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chao Lan",
    "display_name": "Chao Lan",
    "affiliation": "University of Oklahoma",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3466,
    "paper_ids": [
      2238
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stefan-Lukas Gazdag",
    "display_name": "Stefan-Lukas Gazdag",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A formal analysis of IKEv2's post-quantum extension",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3467,
    "paper_ids": [
      5051
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sophia Grundner-Culemann",
    "display_name": "Sophia Grundner-Culemann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A formal analysis of IKEv2's post-quantum extension",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3468,
    "paper_ids": [
      5051
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tobias Guggemos",
    "display_name": "Tobias Guggemos",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A formal analysis of IKEv2's post-quantum extension",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3469,
    "paper_ids": [
      5051
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tobias Heider",
    "display_name": "Tobias Heider",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A formal analysis of IKEv2's post-quantum extension",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3470,
    "paper_ids": [
      5051
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Loebenberger",
    "display_name": "Daniel Loebenberger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A formal analysis of IKEv2's post-quantum extension",
        "conference": "ACSAC",
        "year": 2021,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3471,
    "paper_ids": [
      5051
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joey Allen",
    "display_name": "Joey Allen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "webrr a forensic system for replaying and investigating webbased attacks in the modern web",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "trident towards detecting and mitigating webbased social engineering attacks",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 3472,
    "paper_ids": [
      1407
    ],
    "papers_without_artifact_ids": [
      1413,
      1415
    ]
  },
  {
    "name": "Matthew Landen",
    "display_name": "Matthew Landen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1,
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2023": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "comparing malware evasion theory with practice results from interviews with expert analysts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "webrr a forensic system for replaying and investigating webbased attacks in the modern web",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "trident towards detecting and mitigating webbased social engineering attacks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "dragon deep reinforcement learning for autonomous grid operation and attack detection",
        "conference": "ACSAC",
        "year": 2022
      }
    ],
    "author_id": 3473,
    "paper_ids": [
      1407
    ],
    "papers_without_artifact_ids": [
      3224,
      1413,
      1415,
      1417
    ]
  },
  {
    "name": "Sanya Chaba",
    "display_name": "Sanya Chaba",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3474,
    "paper_ids": [
      1407
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yang Ji 0002",
    "display_name": "Yang Ji",
    "affiliation": "Singapore Management University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3475,
    "paper_ids": [
      1407
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simon Pak Ho Chung",
    "display_name": "Simon Pak Ho Chung",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3476,
    "paper_ids": [
      1407
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Taddeus Kroes",
    "display_name": "Taddeus Kroes",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Type-After-Type: Practical and Complete Type-Safe Memory Reuse",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3477,
    "paper_ids": [
      77
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chris Ouwehand",
    "display_name": "Chris Ouwehand",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Type-After-Type: Practical and Complete Type-Safe Memory Reuse",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3478,
    "paper_ids": [
      77
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sivaramakrishnan Ramanathan",
    "display_name": "Sivaramakrishnan Ramanathan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "NSDI": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SENSS Against Volumetric DDoS Attacks",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "practical intentdriven routing configuration synthesis",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 3479,
    "paper_ids": [
      2193
    ],
    "papers_without_artifact_ids": [
      2196
    ]
  },
  {
    "name": "Minlan Yu",
    "display_name": "Minlan Yu",
    "affiliation": "Harvard University",
    "artifact_count": 1,
    "total_papers": 25,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SOSP": 0,
      "EUROSYS": 1,
      "ATC": 1,
      "USENIXSEC": 1,
      "NSDI": 19,
      "NDSS": 0,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "NSDI": {
        "2013": 2,
        "2014": 2,
        "2017": 2,
        "2024": 2,
        "2019": 1,
        "2025": 3,
        "2023": 4,
        "2016": 1,
        "2022": 1,
        "2011": 1
      },
      "NDSS": {},
      "OSDI": {
        "2022": 1,
        "2020": 1
      }
    },
    "artifact_rate": 4.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SENSS Against Volumetric DDoS Attacks",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "etran extensible kernel transport with ebpf",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "minder faulty machine detection for largescale distributed model training",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "preventing network bottlenecks accelerating datacenter services with hotspotaware placement for compute and storage",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "smartnic security isolation in the cloud with snic",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "thc accelerating distributed deep learning using tensor homomorphic compression",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "dint fast inkernel distributed transactions with ebpf",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "scalable distributed massive mimo baseband processing",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "practical intentdriven routing configuration synthesis",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "rearchitecting the tcp stack for iooffloaded content delivery",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "electrode accelerating distributed protocols with ebpf",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "hashing design in modern networks challenges and mitigation techniques",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "evolvable network telemetry at facebook",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "carbink faulttolerant far memory",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "jaqen a highperformance switchnative approach for detecting and mitigating volumetric ddos attacks with programmable switches",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "sundial faulttolerant clock synchronization for datacenters",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "deter deterministic tcp replay for performance diagnosis",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "cherrypick adaptively unearthing the best cloud configurations for big data analytics",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "enabling widespread communications on optical fabric with megaswitch",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "flowradar a better netflow for data centers",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "enforcing networkwide policies in the presence of dynamic middlebox actions using flowtags",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "grass trimming stragglers in approximation analytics",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "software defined traffic measurement with opensketch",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "scalable rule management for data centers",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "profiling network performance for multitier data center applications",
        "conference": "NSDI",
        "year": 2011
      }
    ],
    "author_id": 1145,
    "paper_ids": [
      2193
    ],
    "papers_without_artifact_ids": [
      3641,
      3668,
      5052,
      5053,
      4856,
      5054,
      5055,
      2196,
      356,
      5056,
      5057,
      5058,
      5059,
      1012,
      5060,
      3761,
      1314,
      2716,
      5061,
      4488,
      509,
      5062,
      5063,
      3182
    ]
  },
  {
    "name": "Ying Zhang 0022",
    "display_name": "Ying Zhang",
    "affiliation": "Facebook",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "EUROSYS": 1,
      "NSDI": 6,
      "NDSS": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "NSDI": {
        "2021": 1,
        "2024": 1,
        "2019": 1,
        "2023": 2,
        "2008": 1
      },
      "NDSS": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 11.1,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SENSS Against Volumetric DDoS Attacks",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "heimdall towards riskaware network management outsourcing",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "occam a programming system for reliable network management",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "netcastle network infrastructure testing at scale",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "topoopt cooptimizing network topology and parallelization strategy for distributed training jobs",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "practical intentdriven routing configuration synthesis",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "a social network under social distancing riskdriven backbone management during covid19 and beyond",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "alembic automated model inference for stateful network functions",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "effective diagnosis of routing disruptions from end systems",
        "conference": "NSDI",
        "year": 2008
      }
    ],
    "author_id": 1146,
    "paper_ids": [
      2193
    ],
    "papers_without_artifact_ids": [
      4479,
      702,
      3510,
      1622,
      2196,
      5064,
      4485,
      5065
    ]
  },
  {
    "name": "Sergej Proskurin",
    "display_name": "Sergej Proskurin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3480,
    "paper_ids": [
      5066
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tamas K. Lengyel",
    "display_name": "Tamas K. Lengyel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3481,
    "paper_ids": [
      5066
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marius Momeu",
    "display_name": "Marius Momeu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3482,
    "paper_ids": [
      5066
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Claudia Eckert 0001",
    "display_name": "Claudia Eckert",
    "affiliation": "TU Munich",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 3,
      "ATC": 0,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1,
        "2019": 1,
        "2020": 1
      },
      "ATC": {},
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ρfem efficient backwardedge protection using reversed forwardedge mappings",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "analyzing control flow integrity with llvmcfi",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 3483,
    "paper_ids": [
      5066
    ],
    "papers_without_artifact_ids": [
      395,
      400
    ]
  },
  {
    "name": "Apostolis Zarras",
    "display_name": "Apostolis Zarras",
    "affiliation": "TU Delft",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3484,
    "paper_ids": [
      5066
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Akshaya Mani",
    "display_name": "Akshaya Mani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "An Extensive Evaluation of the Internet's Open Proxies",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3485,
    "paper_ids": [
      1140
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Dworken",
    "display_name": "David Dworken",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "An Extensive Evaluation of the Internet's Open Proxies",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3486,
    "paper_ids": [
      1140
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jaejong Baek",
    "display_name": "Jaejong Baek",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3487,
    "paper_ids": [
      815
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sukwha Kyung",
    "display_name": "Sukwha Kyung",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3488,
    "paper_ids": [
      815
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gail-Joon Ahn",
    "display_name": "Gail-Joon Ahn",
    "affiliation": "Arizona State University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 2
      },
      "USENIXSEC": {
        "2020": 2,
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scammagnifier piercing the veil of fraudulent shopping website campaigns",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "having your cake and eating it an analysis of concessionabuseasaservice",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "exploiting uses of uninitialized stack variables in linux kernels to leak kernel pointers",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "sunrise to sunset analyzing the endtoend life cycle and effectiveness of phishing attacks at scale",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "primecount novel crossworld covert channels on arm trustzone",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 3489,
    "paper_ids": [
      815
    ],
    "papers_without_artifact_ids": [
      823,
      828,
      829,
      831,
      832
    ]
  },
  {
    "name": "Bo Lu",
    "display_name": "Bo Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3490,
    "paper_ids": [
      361
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ziman Ling",
    "display_name": "Ziman Ling",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3491,
    "paper_ids": [
      361
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ahmad Moghimi",
    "display_name": "Ahmad Moghimi",
    "affiliation": "Google",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "CHES": 0,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "CHES": {},
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MicroWalk: A Framework for Finding Side Channels in Binaries",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3492,
    "paper_ids": [
      1426
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Berk Sunar",
    "display_name": "Berk Sunar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "CHES": 0,
      "USENIXSEC": 3,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "CHES": {},
      "USENIXSEC": {
        "2020": 3
      },
      "PETS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MicroWalk: A Framework for Finding Side Channels in Binaries",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "medusa microarchitectural data leakage via automated attack synthesis",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "copycat controlled instructionlevel attacks on enclaves",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "tpmfail tpm meets timing and lattice attacks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3493,
    "paper_ids": [
      1426
    ],
    "papers_without_artifact_ids": [
      334,
      1447,
      1435
    ]
  },
  {
    "name": "Behrad Garmany",
    "display_name": "Behrad Garmany",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Automated Generation of Exploitation Primitives for Web Browsers",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3494,
    "paper_ids": [
      99
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Stoffel",
    "display_name": "Martin Stoffel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Automated Generation of Exploitation Primitives for Web Browsers",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3495,
    "paper_ids": [
      99
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Robert Gawlik",
    "display_name": "Robert Gawlik",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Automated Generation of Exploitation Primitives for Web Browsers",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3496,
    "paper_ids": [
      99
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Philipp Koppe",
    "display_name": "Philipp Koppe",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1,
        "2017": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Automated Generation of Exploitation Primitives for Web Browsers",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "breaking and fixing destructive code read defenses",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 3497,
    "paper_ids": [
      99
    ],
    "papers_without_artifact_ids": [
      125
    ]
  },
  {
    "name": "Anahit Hayrapetyan",
    "display_name": "Anahit Hayrapetyan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Integrity Protection with Oblivious Hashing",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3498,
    "paper_ids": [
      3944
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexander Pretschner",
    "display_name": "Alexander Pretschner",
    "affiliation": "TU Munich",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1,
        "2018": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Integrity Protection with Oblivious Hashing",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dynamic taint analysis versus obfuscated selfchecking",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 3499,
    "paper_ids": [
      3944
    ],
    "papers_without_artifact_ids": [
      3946
    ]
  },
  {
    "name": "Chuadhry Mujeeb Ahmed",
    "display_name": "Chuadhry Mujeeb Ahmed",
    "affiliation": "University of Strathclyde",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3500,
    "paper_ids": [
      833
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aditya P. Mathur",
    "display_name": "Aditya P. Mathur",
    "affiliation": "SUTD",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3501,
    "paper_ids": [
      833
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muoi Tran",
    "display_name": "Muoi Tran",
    "affiliation": "Chalmers/GU",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Obscuro: A Bitcoin Mixer using Trusted Execution Environments",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the routingaware peering against networkeclipse attacks in bitcoin",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 3502,
    "paper_ids": [
      1765
    ],
    "papers_without_artifact_ids": [
      5067
    ]
  },
  {
    "name": "Loi Luu",
    "display_name": "Loi Luu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Obscuro: A Bitcoin Mixer using Trusted Execution Environments",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3503,
    "paper_ids": [
      1765
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Min Suk Kang",
    "display_name": "Min Suk Kang",
    "affiliation": "KAIST",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 3,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "USENIXSEC": {
        "2025": 1,
        "2021": 2
      },
      "PETS": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Obscuro: A Bitcoin Mixer using Trusted Execution Environments",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding user privacy perceptions in video conferencing insights from a featurespecific user study",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "onions got puzzled on the challenges of mitigating denialofservice problems in tor onion services",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "a stealthy location identification attack exploiting carrier aggregation in cellular networks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "on the routingaware peering against networkeclipse attacks in bitcoin",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 3504,
    "paper_ids": [
      1765
    ],
    "papers_without_artifact_ids": [
      5068,
      5069,
      5070,
      5067
    ]
  },
  {
    "name": "Iddo Bentov",
    "display_name": "Iddo Bentov",
    "affiliation": "Technion, Haifa, Israel",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Obscuro: A Bitcoin Mixer using Trusted Execution Environments",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3505,
    "paper_ids": [
      1765
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohsin Junaid",
    "display_name": "Mohsin Junaid",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3506,
    "paper_ids": [
      2255
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Chenho Kung",
    "display_name": "David Chenho Kung",
    "affiliation": "University of Texas at Arlington",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3507,
    "paper_ids": [
      2255
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vivek Jain",
    "display_name": "Vivek Jain",
    "affiliation": "University of California, Riverside",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TIFF: Using Input Type Inference To Improve Fuzzing",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3508,
    "paper_ids": [
      78
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sanjay Rawat 0001",
    "display_name": "Sanjay Rawat",
    "affiliation": "University of Bristol",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TIFF: Using Input Type Inference To Improve Fuzzing",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "now you see me realtime dynamic function call detection",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 3509,
    "paper_ids": [
      78
    ],
    "papers_without_artifact_ids": [
      264
    ]
  },
  {
    "name": "Isaac Pedisich",
    "display_name": "Isaac Pedisich",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SOSP": 1,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "SOSP": {
        "2021": 1
      },
      "ATC": {},
      "NSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeDoS: Defusing DoS with Dispersion Oriented Software",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flightplan dataplane disaggregation and placement for p4 programs",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "when idling is ideal optimizing taillatency for heavytailed datacenter workloads with perséphone",
        "conference": "SOSP",
        "year": 2021
      }
    ],
    "author_id": 3510,
    "paper_ids": [
      696
    ],
    "papers_without_artifact_ids": [
      5071,
      3459
    ]
  },
  {
    "name": "Bob DiMaiolo",
    "display_name": "Bob DiMaiolo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeDoS: Defusing DoS with Dispersion Oriented Software",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3511,
    "paper_ids": [
      696
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jingyu Qian",
    "display_name": "Jingyu Qian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeDoS: Defusing DoS with Dispersion Oriented Software",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a tagging solution to discover iot devices in apartments",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "see no evil phishing for permissions with false transparency",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3512,
    "paper_ids": [
      696
    ],
    "papers_without_artifact_ids": [
      5072,
      5073
    ]
  },
  {
    "name": "Chirag Shah",
    "display_name": "Chirag Shah",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeDoS: Defusing DoS with Dispersion Oriented Software",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3513,
    "paper_ids": [
      696
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuankai Zhang 0001",
    "display_name": "Yuankai Zhang",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "USENIXSEC": {},
      "WOOT": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeDoS: Defusing DoS with Dispersion Oriented Software",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3514,
    "paper_ids": [
      696
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Boon Thau Loo",
    "display_name": "Boon Thau Loo",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "SOSP": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 5,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1,
        "2022": 1
      },
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2021": 1,
        "2017": 1,
        "2024": 1,
        "2025": 1,
        "2018": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 12.5,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeDoS: Defusing DoS with Dispersion Oriented Software",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bftbrain adaptive bft consensus with reinforcement learning",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "the bedrock of byzantine fault tolerance a unified platform for bft protocols analysis implementation and experimentation",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "towards practical applicationlevel support for privilege separation",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "flightplan dataplane disaggregation and placement for p4 programs",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "when idling is ideal optimizing taillatency for heavytailed datacenter workloads with perséphone",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "007 democratically finding the cause of packet drops",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "automated bug removal for softwaredefined networks",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 3515,
    "paper_ids": [
      696
    ],
    "papers_without_artifact_ids": [
      5074,
      3493,
      3529,
      5071,
      3459,
      2833,
      714
    ]
  },
  {
    "name": "Linh Thi Xuan Phan",
    "display_name": "Linh Thi Xuan Phan",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SOSP": 1,
      "EUROSYS": 2,
      "ATC": 0,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2021": 1
      },
      "ATC": {},
      "NSDI": {
        "2019": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeDoS: Defusing DoS with Dispersion Oriented Software",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "roborebound multirobot system defense with boundedtime interaction",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "rebound defending distributed systems against attacks with boundedtime recovery",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "when idling is ideal optimizing taillatency for heavytailed datacenter workloads with perséphone",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "zeno diagnosing performance problems with temporal provenance",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 3516,
    "paper_ids": [
      696
    ],
    "papers_without_artifact_ids": [
      2728,
      2730,
      3459,
      713
    ]
  },
  {
    "name": "Clay Shields",
    "display_name": "Clay Shields",
    "affiliation": "Georgetown University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 0,
      "USENIXSEC": 0,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "ATC": {},
      "USENIXSEC": {},
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeDoS: Defusing DoS with Dispersion Oriented Software",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3517,
    "paper_ids": [
      696
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenchao Zhou",
    "display_name": "Wenchao Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SOSP": 0,
      "EUROSYS": 0,
      "FAST": 1,
      "USENIXSEC": 0,
      "NSDI": 1,
      "PETS": 0,
      "NDSS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "FAST": {
        "2026": 1
      },
      "USENIXSEC": {},
      "NSDI": {
        "2017": 1
      },
      "PETS": {},
      "NDSS": {},
      "OSDI": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeDoS: Defusing DoS with Dispersion Oriented Software",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "polarstore highperformance data compression for largescale cloudnative databases",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "automated bug removal for softwaredefined networks",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 3518,
    "paper_ids": [
      696
    ],
    "papers_without_artifact_ids": [
      3810,
      714
    ]
  },
  {
    "name": "Dan S. Wallach",
    "display_name": "Dan S. Wallach",
    "affiliation": "Rice University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SOSP": 0,
      "USENIXSEC": 1,
      "PETS": 1,
      "NDSS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      },
      "SOSP": {},
      "USENIXSEC": {
        "2024": 1
      },
      "PETS": {
        "2020": 1
      },
      "NDSS": {},
      "OSDI": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "An Historical Analysis of the SEAndroid Policy Evolution",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "electionguard a cryptographic toolkit to enable verifiable elections",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "scaling up anonymous communication with efficient nanopayment channels",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 3519,
    "paper_ids": [
      697
    ],
    "papers_without_artifact_ids": [
      5075,
      5076
    ]
  },
  {
    "name": "Julian Schütte",
    "display_name": "Julian Schütte",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8007,
    "paper_ids": [
      2997
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ivica Nikolic",
    "display_name": "Ivica Nikolic",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Finding The Greedy, Prodigal, and Suicidal Contracts at Scale",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3521,
    "paper_ids": [
      1766
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aashish Kolluri",
    "display_name": "Aashish Kolluri",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2018
    ],
    "year_range": "2018-2018",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Finding The Greedy, Prodigal, and Suicidal Contracts at Scale",
        "conference": "ACSAC",
        "year": 2018,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3522,
    "paper_ids": [
      1766
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhechang Zhang",
    "display_name": "Zhechang Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "viper spotting syscallguard variables for dataonly attacks",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 3523,
    "paper_ids": [
      1094
    ],
    "papers_without_artifact_ids": [
      4126
    ]
  },
  {
    "name": "Kehan Yang",
    "display_name": "Kehan Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3524,
    "paper_ids": [
      1094
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sarbartha Banerjee",
    "display_name": "Sarbartha Banerjee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Spacelord: Private and Secure Smart Space Sharing",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rethinking system audit architectures for high event coverage and synchronous log availability",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 3525,
    "paper_ids": [
      3508
    ],
    "papers_without_artifact_ids": [
      3950
    ]
  },
  {
    "name": "Qian Ren",
    "display_name": "Qian Ren",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3526,
    "paper_ids": [
      3951
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yingjun Wu",
    "display_name": "Yingjun Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3527,
    "paper_ids": [
      3951
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Han Liu 0010",
    "display_name": "Han Liu",
    "affiliation": "Oxford-Hainan Blockchain Research Institute",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3528,
    "paper_ids": [
      3951
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anne Victor",
    "display_name": "Anne Victor",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3529,
    "paper_ids": [
      3951
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hong Lei 0001",
    "display_name": "Hong Lei",
    "affiliation": "Boğaziçi University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3530,
    "paper_ids": [
      3951
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lei Wang 0031",
    "display_name": "Lei Wang",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3531,
    "paper_ids": [
      3951
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bangdao Chen",
    "display_name": "Bangdao Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3532,
    "paper_ids": [
      3951
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Samin Yaseer Mahmud",
    "display_name": "Samin Yaseer Mahmud",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2020": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Analysis of Payment Service Provider SDKs in Android",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "actions speak louder than words entitysensitive privacy policy and data flow analysis with policheck",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "cardpliance pci dss compliance of android applications",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3533,
    "paper_ids": [
      2263
    ],
    "papers_without_artifact_ids": [
      2269,
      2270
    ]
  },
  {
    "name": "K. Virgil English",
    "display_name": "K. Virgil English",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Analysis of Payment Service Provider SDKs in Android",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3534,
    "paper_ids": [
      2263
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seaver Thorn",
    "display_name": "Seaver Thorn",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Analysis of Payment Service Provider SDKs in Android",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fred identifying file redelegation in android system services",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 3535,
    "paper_ids": [
      2263
    ],
    "papers_without_artifact_ids": [
      2266
    ]
  },
  {
    "name": "Markus Bauer 0004",
    "display_name": "Markus Bauer",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3536,
    "paper_ids": [
      845
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xutong Wang",
    "display_name": "Xutong Wang",
    "affiliation": "Western Sydney University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3537,
    "paper_ids": [
      3953
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chaoge Liu",
    "display_name": "Chaoge Liu",
    "affiliation": "Stanford University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3538,
    "paper_ids": [
      3953
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhi Wang 0018",
    "display_name": "Zhi Wang",
    "affiliation": "Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3539,
    "paper_ids": [
      3953
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jie Yin",
    "display_name": "Jie Yin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "ATC": {},
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "microkernel goes general performance and compatibility in the hongmeng production microkernel",
        "conference": "OSDI",
        "year": 2024
      }
    ],
    "author_id": 3540,
    "paper_ids": [
      3953
    ],
    "papers_without_artifact_ids": [
      58
    ]
  },
  {
    "name": "Xiang Cui",
    "display_name": "Xiang Cui",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3541,
    "paper_ids": [
      3953
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chandra Thapa",
    "display_name": "Chandra Thapa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Transformer-Based Language Models for Software Vulnerability Detection",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3542,
    "paper_ids": [
      762
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seung Ick Jang",
    "display_name": "Seung Ick Jang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Transformer-Based Language Models for Software Vulnerability Detection",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3543,
    "paper_ids": [
      762
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muhammad Ejaz Ahmed",
    "display_name": "Muhammad Ejaz Ahmed",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Transformer-Based Language Models for Software Vulnerability Detection",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "void a fast and light voice liveness detection system",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3544,
    "paper_ids": [
      762
    ],
    "papers_without_artifact_ids": [
      1128
    ]
  },
  {
    "name": "Josef Pieprzyk",
    "display_name": "Josef Pieprzyk",
    "affiliation": "Macquarie University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "CHES": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "CHES": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Transformer-Based Language Models for Software Vulnerability Detection",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3545,
    "paper_ids": [
      762
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Carmen Cheh",
    "display_name": "Carmen Cheh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From Hindsight to Foresight: Enhancing Design Artifacts for Business Logic Flaw Discovery",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "generating abuse stories and misuse cases using large language models",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 3546,
    "paper_ids": [
      3955
    ],
    "papers_without_artifact_ids": [
      3956
    ]
  },
  {
    "name": "Nicholas Tay",
    "display_name": "Nicholas Tay",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From Hindsight to Foresight: Enhancing Design Artifacts for Business Logic Flaw Discovery",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3547,
    "paper_ids": [
      3955
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaohai Dai",
    "display_name": "Xiaohai Dai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trebiz: Byzantine Fault Tolerance with Byzantine Merchants",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3548,
    "paper_ids": [
      1095
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Liping Huang",
    "display_name": "Liping Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trebiz: Byzantine Fault Tolerance with Byzantine Merchants",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3549,
    "paper_ids": [
      1095
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiang Xiao 0001",
    "display_name": "Jiang Xiao",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trebiz: Byzantine Fault Tolerance with Byzantine Merchants",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "all your tokens are belong to us demystifying address verification vulnerabilities in solidity smart contracts",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3550,
    "paper_ids": [
      1095
    ],
    "papers_without_artifact_ids": [
      781
    ]
  },
  {
    "name": "Zhaonan Zhang",
    "display_name": "Zhaonan Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trebiz: Byzantine Fault Tolerance with Byzantine Merchants",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3551,
    "paper_ids": [
      1095
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xia Xie 0003",
    "display_name": "Xia Xie",
    "affiliation": "Hainan University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trebiz: Byzantine Fault Tolerance with Byzantine Merchants",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3552,
    "paper_ids": [
      1095
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Salil Subhash Kanhere",
    "display_name": "Salil Subhash Kanhere",
    "affiliation": "UNSW",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Reconstruction Attack on Differential Private Trajectory Protection Mechanisms",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3553,
    "paper_ids": [
      763
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenqing Li",
    "display_name": "Wenqing Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CryptoGo: Automatic Detection of Go Cryptographic API Misuses",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3554,
    "paper_ids": [
      3889
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Limin Liu",
    "display_name": "Limin Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CryptoGo: Automatic Detection of Go Cryptographic API Misuses",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3555,
    "paper_ids": [
      3889
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anomadarshi Barua",
    "display_name": "Anomadarshi Barua",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "CHES": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2022": 1
      },
      "CHES": {
        "2022": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BayesImposter: Bayesian Estimation Based.bss Imposter Attack on Industrial Control Systems",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a fly on the wall exploiting acoustic sidechannels in differential pressure sensors",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "premsat preventing magnetic saturation attack on hall sensors",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "hall spoofing a noninvasive dos attack on gridtied solar inverter",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3556,
    "paper_ids": [
      5077
    ],
    "papers_without_artifact_ids": [
      5078,
      5079,
      5080
    ]
  },
  {
    "name": "Lelin Pan",
    "display_name": "Lelin Pan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BayesImposter: Bayesian Estimation Based.bss Imposter Attack on Industrial Control Systems",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3557,
    "paper_ids": [
      5077
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohammad Abdullah Al Faruque",
    "display_name": "Mohammad Abdullah Al Faruque",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "CHES": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2022": 1
      },
      "CHES": {
        "2022": 1
      },
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BayesImposter: Bayesian Estimation Based.bss Imposter Attack on Industrial Control Systems",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a fly on the wall exploiting acoustic sidechannels in differential pressure sensors",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "premsat preventing magnetic saturation attack on hall sensors",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "hall spoofing a noninvasive dos attack on gridtied solar inverter",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3558,
    "paper_ids": [
      5077
    ],
    "papers_without_artifact_ids": [
      5078,
      5079,
      5080
    ]
  },
  {
    "name": "Moe Sabry",
    "display_name": "Moe Sabry",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ArchiveSafe LT: Secure Long-term Archiving System",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3559,
    "paper_ids": [
      5081
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Reza Samavi",
    "display_name": "Reza Samavi",
    "affiliation": "McMaster University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ArchiveSafe LT: Secure Long-term Archiving System",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3560,
    "paper_ids": [
      5081
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xinshu Ma",
    "display_name": "Xinshu Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3561,
    "paper_ids": [
      5082
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Florentin Rochet",
    "display_name": "Florentin Rochet",
    "affiliation": "Université Catholique de Louvain",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scaling up anonymous communication with efficient nanopayment channels",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 3562,
    "paper_ids": [
      5082
    ],
    "papers_without_artifact_ids": [
      5076
    ]
  },
  {
    "name": "Tariq Elahi",
    "display_name": "Tariq Elahi",
    "affiliation": "University of Edinburgh",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {},
      "PETS": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacy preserving detection of path bias attacks in tor",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 3563,
    "paper_ids": [
      5082
    ],
    "papers_without_artifact_ids": [
      5083
    ]
  },
  {
    "name": "Giovanni Apruzzese",
    "display_name": "Giovanni Apruzzese",
    "affiliation": "University of Liechtenstein",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "it doesnt look like anything to me using diffusion model to subvert visual phishing detectors",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3564,
    "paper_ids": [
      1130
    ],
    "papers_without_artifact_ids": [
      1137
    ]
  },
  {
    "name": "Ying Yuan 0002",
    "display_name": "Ying Yuan",
    "affiliation": "University of Nebraska",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "it doesnt look like anything to me using diffusion model to subvert visual phishing detectors",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3565,
    "paper_ids": [
      1130
    ],
    "papers_without_artifact_ids": [
      1137
    ]
  },
  {
    "name": "Akul Goyal",
    "display_name": "Akul Goyal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3566,
    "paper_ids": [
      3957
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Noor Michael",
    "display_name": "Noor Michael",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1,
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the forensic validity of approximated audit logs",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 3567,
    "paper_ids": [
      3957
    ],
    "papers_without_artifact_ids": [
      3958
    ]
  },
  {
    "name": "Sneha Gaur",
    "display_name": "Sneha Gaur",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1,
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the forensic validity of approximated audit logs",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 3568,
    "paper_ids": [
      3957
    ],
    "papers_without_artifact_ids": [
      3958
    ]
  },
  {
    "name": "Yiru Zhao",
    "display_name": "Yiru Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3569,
    "paper_ids": [
      1694
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaoke Wang",
    "display_name": "Xiaoke Wang",
    "affiliation": "Western Sydney University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3570,
    "paper_ids": [
      1694
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lei Zhao 0012",
    "display_name": "Lei Zhao",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3571,
    "paper_ids": [
      1694
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yutian Yang",
    "display_name": "Yutian Yang",
    "affiliation": "Yale University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "demystifying pointer authentication on apple m1",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 3572,
    "paper_ids": [
      296
    ],
    "papers_without_artifact_ids": [
      320
    ]
  },
  {
    "name": "Xun Xie",
    "display_name": "Xun Xie",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3573,
    "paper_ids": [
      296
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingsen Wang",
    "display_name": "Mingsen Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3574,
    "paper_ids": [
      296
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tianyu Zhou",
    "display_name": "Tianyu Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3575,
    "paper_ids": [
      296
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chenggang Qin",
    "display_name": "Chenggang Qin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3576,
    "paper_ids": [
      296
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wang Yu",
    "display_name": "Wang Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3577,
    "paper_ids": [
      296
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Prashast Srivastava",
    "display_name": "Prashast Srivastava",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3578,
    "paper_ids": [
      2
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stefan Nagy",
    "display_name": "Stefan Nagy",
    "affiliation": "University of Utah",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 0,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "ATC": {},
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "no linux no problem fast and correct windows binary fuzzing via targetembedded snapshotting",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "breaking through binaries compilerquality instrumentation for better binaryonly fuzzing",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 3579,
    "paper_ids": [
      2
    ],
    "papers_without_artifact_ids": [
      2235,
      2237
    ]
  },
  {
    "name": "Liyue Shen",
    "display_name": "Liyue Shen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3580,
    "paper_ids": [
      2965
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jingwei Wang 0003",
    "display_name": "Jingwei Wang",
    "affiliation": "University of Queensland",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3581,
    "paper_ids": [
      2965
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jia Yan 0004",
    "display_name": "Jia Yan",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3582,
    "paper_ids": [
      5084
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ming Wan",
    "display_name": "Ming Wan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3583,
    "paper_ids": [
      5084
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiangkun Jia",
    "display_name": "Xiangkun Jia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3584,
    "paper_ids": [
      5084
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lingyun Ying",
    "display_name": "Lingyun Ying",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3585,
    "paper_ids": [
      5084
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Purui Su",
    "display_name": "Purui Su",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SOSP": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "SOSP": {
        "2023": 1
      },
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "one simple api can cause hundreds of bugs an analysis of refcounting bugs in all modern linux kernels",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "freewill automatically diagnosing useafterfree bugs via reference miscounting detection on binaries",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 3586,
    "paper_ids": [
      5084
    ],
    "papers_without_artifact_ids": [
      1893,
      2798
    ]
  },
  {
    "name": "Zhanyi Wang",
    "display_name": "Zhanyi Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3587,
    "paper_ids": [
      5084
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Madeline McLaughlin",
    "display_name": "Madeline McLaughlin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Qualitative Evaluation of Reverse Engineering Tool Usability",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "there are rabbit holes i want to go down that im not allowed to go down an investigation of security expert threat modeling practices for medical devices",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3588,
    "paper_ids": [
      2278
    ],
    "papers_without_artifact_ids": [
      2281
    ]
  },
  {
    "name": "Samantha Katcher",
    "display_name": "Samantha Katcher",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Qualitative Evaluation of Reverse Engineering Tool Usability",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a survey of cybersecurity professionals perceptions and experiences of safety and belonging in the community",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3589,
    "paper_ids": [
      2278
    ],
    "papers_without_artifact_ids": [
      1270
    ]
  },
  {
    "name": "Eddie Cosic",
    "display_name": "Eddie Cosic",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "User Perceptions of Five-Word Passwords",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3590,
    "paper_ids": [
      856
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Genevieve A. Flynn",
    "display_name": "Genevieve A. Flynn",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "User Perceptions of Five-Word Passwords",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3591,
    "paper_ids": [
      856
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Olivia Legault",
    "display_name": "Olivia Legault",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "User Perceptions of Five-Word Passwords",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3592,
    "paper_ids": [
      856
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yufeng Diao",
    "display_name": "Yufeng Diao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Drone Authentication via Acoustic Fingerprint",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3593,
    "paper_ids": [
      5085
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yichi Zhang",
    "display_name": "Yichi Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Drone Authentication via Acoustic Fingerprint",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ndd a decision diagram for network verification",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 3594,
    "paper_ids": [
      5085
    ],
    "papers_without_artifact_ids": [
      5086
    ]
  },
  {
    "name": "Guodong Zhao 0001",
    "display_name": "Guodong Zhao",
    "affiliation": "IIIT Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Drone Authentication via Acoustic Fingerprint",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3595,
    "paper_ids": [
      5085
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohamed Khamis",
    "display_name": "Mohamed Khamis",
    "affiliation": "University of Glasgow",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 2,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "PETS": {
        "2022": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Drone Authentication via Acoustic Fingerprint",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "in the quest to protect users from sidechannel attacks a usercentred design space to mitigate thermal attacks on public payment terminals",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "you offer privacy like you offer tea investigating mechanisms for improving guest privacy in iotequipped households",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "privacyscout assessing vulnerability to shoulder surfing on mobile devices",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "investigating stateoftheart practices for fostering subjective trust in online voting through interviews",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 3596,
    "paper_ids": [
      5085
    ],
    "papers_without_artifact_ids": [
      5087,
      4323,
      5088,
      4325
    ]
  },
  {
    "name": "Mohamad Mansouri",
    "display_name": "Mohamad Mansouri",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok secure aggregation based on cryptographic schemes for federated learning",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "how machine learning is solving the binary function similarity problem",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 3597,
    "paper_ids": [
      3899
    ],
    "papers_without_artifact_ids": [
      1138,
      4219
    ]
  },
  {
    "name": "Wafa Ben Jaballah",
    "display_name": "Wafa Ben Jaballah",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok secure aggregation based on cryptographic schemes for federated learning",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 3598,
    "paper_ids": [
      3899
    ],
    "papers_without_artifact_ids": [
      1138
    ]
  },
  {
    "name": "Zhou Yang 0003",
    "display_name": "Zhou Yang",
    "affiliation": "University of Alberta",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Curiosity-Driven and Victim-Aware Adversarial Policies",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3599,
    "paper_ids": [
      2282
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunpeng Bai",
    "display_name": "Yunpeng Bai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Curiosity-Driven and Victim-Aware Adversarial Policies",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3600,
    "paper_ids": [
      2282
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jieke Shi",
    "display_name": "Jieke Shi",
    "affiliation": "Singapore Management University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Curiosity-Driven and Victim-Aware Adversarial Policies",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3601,
    "paper_ids": [
      2282
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arunesh Sinha",
    "display_name": "Arunesh Sinha",
    "affiliation": "Rutgers University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Curiosity-Driven and Victim-Aware Adversarial Policies",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3602,
    "paper_ids": [
      2282
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Lo 0001",
    "display_name": "David Lo",
    "affiliation": "Singapore Management University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SOSP": 0,
      "ATC": 0,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "SOSP": {},
      "ATC": {},
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Curiosity-Driven and Victim-Aware Adversarial Policies",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a new hope contextual privacy policies for mobile applications and an approach toward automated generation",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3603,
    "paper_ids": [
      2282
    ],
    "papers_without_artifact_ids": [
      5089
    ]
  },
  {
    "name": "Guoliang Fan",
    "display_name": "Guoliang Fan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Curiosity-Driven and Victim-Aware Adversarial Policies",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3604,
    "paper_ids": [
      2282
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yinggang Guo",
    "display_name": "Yinggang Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SOSP": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "SOSP": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Formal Modeling and Security Analysis for Intra-level Privilege Separation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bulkhead secure scalable and efficient kernel compartmentalization with pks",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 3605,
    "paper_ids": [
      3013
    ],
    "papers_without_artifact_ids": [
      3014
    ]
  },
  {
    "name": "Bingnan Zhong",
    "display_name": "Bingnan Zhong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Formal Modeling and Security Analysis for Intra-level Privilege Separation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3606,
    "paper_ids": [
      3013
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sunwoo Ahn",
    "display_name": "Sunwoo Ahn",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "preventing artificially inflated sms attacks through largescale traffic inspection",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 3607,
    "paper_ids": [
      2283
    ],
    "papers_without_artifact_ids": [
      5090
    ]
  },
  {
    "name": "Seonggwan Ahn",
    "display_name": "Seonggwan Ahn",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3608,
    "paper_ids": [
      2283
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuki Koike",
    "display_name": "Yuki Koike",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SLOPT: Bandit Optimization Framework for Mutation-Based Fuzzing",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3609,
    "paper_ids": [
      5091
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hiroyuki Katsura",
    "display_name": "Hiroyuki Katsura",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SLOPT: Bandit Optimization Framework for Mutation-Based Fuzzing",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3610,
    "paper_ids": [
      5091
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hiromu Yakura",
    "display_name": "Hiromu Yakura",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SLOPT: Bandit Optimization Framework for Mutation-Based Fuzzing",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3611,
    "paper_ids": [
      5091
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuma Kurogome",
    "display_name": "Yuma Kurogome",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1,
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SLOPT: Bandit Optimization Framework for Mutation-Based Fuzzing",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "eiger automated ioc generation for accurate and interpretable endpoint malware detection",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 3612,
    "paper_ids": [
      5091
    ],
    "papers_without_artifact_ids": [
      4449
    ]
  },
  {
    "name": "ChangSeok Oh",
    "display_name": "ChangSeok Oh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeView: Confining Progressive Web Applications by Debloating Web APIs",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3613,
    "paper_ids": [
      1408
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Luca Morgese Zangrandi",
    "display_name": "Luca Morgese Zangrandi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3614,
    "paper_ids": [
      2961
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tim M. Booij",
    "display_name": "Tim M. Booij",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "catching phishers by their bait investigating the dutch phishing landscape through phishing kit detection",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 3615,
    "paper_ids": [
      2961
    ],
    "papers_without_artifact_ids": [
      5092
    ]
  },
  {
    "name": "Rajat Gupta",
    "display_name": "Rajat Gupta",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "POPKORN: Popping Windows Kernel Drivers At Scale",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3616,
    "paper_ids": [
      654
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lukas Patrick Dresel",
    "display_name": "Lukas Patrick Dresel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "POPKORN: Popping Windows Kernel Drivers At Scale",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3617,
    "paper_ids": [
      654
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jing Xu 0028",
    "display_name": "Jing Xu",
    "affiliation": "TU Delft",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3618,
    "paper_ids": [
      2286
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rui Wang 0070",
    "display_name": "Rui Wang",
    "affiliation": "TU Delft",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ladder multiobjective backdoor attack via evolutionary algorithm",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 3619,
    "paper_ids": [
      2286
    ],
    "papers_without_artifact_ids": [
      2288
    ]
  },
  {
    "name": "Stefanos Koffas",
    "display_name": "Stefanos Koffas",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3620,
    "paper_ids": [
      2286
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jieyu Zheng",
    "display_name": "Jieyu Zheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3621,
    "paper_ids": [
      3968
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shiyu Shen 0001",
    "display_name": "Shiyu Shen",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "velofhe gpu acceleration for fhew and tfhe bootstrapping",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 3622,
    "paper_ids": [
      3968
    ],
    "papers_without_artifact_ids": [
      4044
    ]
  },
  {
    "name": "Chenxi Xue",
    "display_name": "Chenxi Xue",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3623,
    "paper_ids": [
      3968
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunlei Zhao",
    "display_name": "Yunlei Zhao",
    "affiliation": "Fudan University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2022": 1
      },
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation",
        "conference": "ACSAC",
        "year": 2022,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "velofhe gpu acceleration for fhew and tfhe bootstrapping",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 3624,
    "paper_ids": [
      3968
    ],
    "papers_without_artifact_ids": [
      4044
    ]
  },
  {
    "name": "Fabrizio Cicala",
    "display_name": "Fabrizio Cicala",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3625,
    "paper_ids": [
      1165
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Omar Chowdhury",
    "display_name": "Omar Chowdhury",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "SOSP": 0,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1,
        "2019": 1
      },
      "SOSP": {},
      "PETS": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "protecting the 4g and 5g cellular paging protocols against security and privacy attacks",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "why johnny cant make money with his contents pitfalls of designing and implementing content delivery apps",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 3626,
    "paper_ids": [
      1165
    ],
    "papers_without_artifact_ids": [
      1172,
      2582
    ]
  },
  {
    "name": "Marten van Dijk",
    "display_name": "Marten van Dijk",
    "affiliation": "University of Connecticut",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "CHES": 0,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "CHES": {},
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Proof of aliveness",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3627,
    "paper_ids": [
      834
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pritam Dash",
    "display_name": "Pritam Dash",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Out of control: stealthy attacks against robotic vehicles protected by control-based techniques",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3628,
    "paper_ids": [
      3026
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mehdi Karimibiuki",
    "display_name": "Mehdi Karimibiuki",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Out of control: stealthy attacks against robotic vehicles protected by control-based techniques",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3629,
    "paper_ids": [
      3026
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hossein Pishro-Nik",
    "display_name": "Hossein Pishro-Nik",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Revisiting utility metrics for location privacy-preserving mechanisms",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3630,
    "paper_ids": [
      882
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dennis Goeckel",
    "display_name": "Dennis Goeckel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Revisiting utility metrics for location privacy-preserving mechanisms",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3631,
    "paper_ids": [
      882
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Samuel Marchal",
    "display_name": "Samuel Marchal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Detecting organized eCommerce fraud using scalable categorical clustering",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flame taming backdoors in federated learning",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 3632,
    "paper_ids": [
      3969
    ],
    "papers_without_artifact_ids": [
      2318
    ]
  },
  {
    "name": "Zecheng He",
    "display_name": "Zecheng He",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Model inversion attacks against collaborative inference",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3633,
    "paper_ids": [
      732
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dennis Fischer 0002",
    "display_name": "Dennis Fischer",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SIP shaker: software integrity protection composition",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3634,
    "paper_ids": [
      3945
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Saeid Mofrad",
    "display_name": "Saeid Mofrad",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3635,
    "paper_ids": [
      1659
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ishtiaq Ahmed",
    "display_name": "Ishtiaq Ahmed",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3636,
    "paper_ids": [
      1659
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shiyong Lu",
    "display_name": "Shiyong Lu",
    "affiliation": "Wayne State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3637,
    "paper_ids": [
      1659
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ping Yang 0002",
    "display_name": "Ping Yang",
    "affiliation": "Binghamton University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3638,
    "paper_ids": [
      1659
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jim Alves-Foss",
    "display_name": "Jim Alves-Foss",
    "affiliation": "University of Idaho",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Function boundary detection in stripped binaries",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3639,
    "paper_ids": [
      5093
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jia Song 0006",
    "display_name": "Jia Song",
    "affiliation": "University of Idaho",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Function boundary detection in stripped binaries",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3640,
    "paper_ids": [
      5093
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Ukrop",
    "display_name": "Martin Ukrop",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Will you trust this TLS certificate?: perceptions of people working in IT",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3641,
    "paper_ids": [
      3972
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lydia Kraus",
    "display_name": "Lydia Kraus",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Will you trust this TLS certificate?: perceptions of people working in IT",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3642,
    "paper_ids": [
      3972
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Heider Ahmad Mutleq Wahsheh",
    "display_name": "Heider Ahmad Mutleq Wahsheh",
    "affiliation": "Ca' Foscari University of Venice, Italy",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Will you trust this TLS certificate?: perceptions of people working in IT",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3643,
    "paper_ids": [
      3972
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ziya Alper Genç",
    "display_name": "Ziya Alper Genç",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A game of \"Cut and Mouse\": bypassing antivirus by simulating user inputs",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8008,
    "paper_ids": [
      3937
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniele Sgandurra",
    "display_name": "Daniele Sgandurra",
    "affiliation": "Royal Holloway Univ. of London",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A game of \"Cut and Mouse\": bypassing antivirus by simulating user inputs",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3645,
    "paper_ids": [
      3937
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Huangyi Ge",
    "display_name": "Huangyi Ge",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Koinonia: verifiable e-voting with long-term privacy",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3646,
    "paper_ids": [
      894
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Victor E. Gonsalves",
    "display_name": "Victor E. Gonsalves",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Koinonia: verifiable e-voting with long-term privacy",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3647,
    "paper_ids": [
      894
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Huian Li",
    "display_name": "Huian Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Koinonia: verifiable e-voting with long-term privacy",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3648,
    "paper_ids": [
      894
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xukai Zou",
    "display_name": "Xukai Zou",
    "affiliation": "IUPUI",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Koinonia: verifiable e-voting with long-term privacy",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3649,
    "paper_ids": [
      894
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aurore Fass",
    "display_name": "Aurore Fass",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "JStap: a static pre-filter for malicious JavaScript detection",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3650,
    "paper_ids": [
      401
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joonun Jang",
    "display_name": "Joonun Jang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FuzzBuilder: automated building greybox fuzzing environment for C/C++ library",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3651,
    "paper_ids": [
      5094
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Huy Kang Kim",
    "display_name": "Huy Kang Kim",
    "affiliation": "Korea University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FuzzBuilder: automated building greybox fuzzing environment for C/C++ library",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3652,
    "paper_ids": [
      5094
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nicholas Mainardi",
    "display_name": "Nicholas Mainardi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1,
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Privacy preserving substring search protocol with polylogarithmic communication cost",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "efficient oblivious substring search via architectural support",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 3653,
    "paper_ids": [
      5095
    ],
    "papers_without_artifact_ids": [
      5096
    ]
  },
  {
    "name": "Alessandro Barenghi",
    "display_name": "Alessandro Barenghi",
    "affiliation": "Politecnico di Milano",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1,
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Privacy preserving substring search protocol with polylogarithmic communication cost",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "efficient oblivious substring search via architectural support",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 3654,
    "paper_ids": [
      5095
    ],
    "papers_without_artifact_ids": [
      5096
    ]
  },
  {
    "name": "Gerardo Pelosi",
    "display_name": "Gerardo Pelosi",
    "affiliation": "Politecnico di Milano",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1,
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Privacy preserving substring search protocol with polylogarithmic communication cost",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "efficient oblivious substring search via architectural support",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 3655,
    "paper_ids": [
      5095
    ],
    "papers_without_artifact_ids": [
      5096
    ]
  },
  {
    "name": "Charalampos Stylianopoulos",
    "display_name": "Charalampos Stylianopoulos",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Co-evaluation of pattern matching algorithms on IoT devices with embedded GPUs",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3656,
    "paper_ids": [
      5097
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simon Kindström",
    "display_name": "Simon Kindström",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Co-evaluation of pattern matching algorithms on IoT devices with embedded GPUs",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8009,
    "paper_ids": [
      5097
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Magnus Almgren",
    "display_name": "Magnus Almgren",
    "affiliation": "Chalmers/GU",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Co-evaluation of pattern matching algorithms on IoT devices with embedded GPUs",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3658,
    "paper_ids": [
      5097
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Olaf Landsiedel",
    "display_name": "Olaf Landsiedel",
    "affiliation": "University of Kiel",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Co-evaluation of pattern matching algorithms on IoT devices with embedded GPUs",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3659,
    "paper_ids": [
      5097
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marina Papatriantafilou",
    "display_name": "Marina Papatriantafilou",
    "affiliation": "Chalmers/GU",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Co-evaluation of pattern matching algorithms on IoT devices with embedded GPUs",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3660,
    "paper_ids": [
      5097
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ryad Benadjila",
    "display_name": "Ryad Benadjila",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "CHES": 0,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "CHES": {},
      "WOOT": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "WooKey: designing a trusted and efficient USB device",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3661,
    "paper_ids": [
      5098
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arnauld Michelizza",
    "display_name": "Arnauld Michelizza",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "WooKey: designing a trusted and efficient USB device",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3662,
    "paper_ids": [
      5098
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mathieu Renard",
    "display_name": "Mathieu Renard",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "WooKey: designing a trusted and efficient USB device",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3663,
    "paper_ids": [
      5098
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Philippe Thierry",
    "display_name": "Philippe Thierry",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "WooKey: designing a trusted and efficient USB device",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3664,
    "paper_ids": [
      5098
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Philippe Trebuchet",
    "display_name": "Philippe Trebuchet",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "WooKey: designing a trusted and efficient USB device",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3665,
    "paper_ids": [
      5098
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrea Mambretti",
    "display_name": "Andrea Mambretti",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1,
      "WOOT": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "WOOT": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Speculator: a tool to analyze speculative execution attacks and mitigations",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok automating kernel vulnerability discovery and exploit generation",
        "conference": "WOOT",
        "year": 2025
      },
      {
        "title": "ghostrace exploiting and mitigating speculative race conditions",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3666,
    "paper_ids": [
      3036
    ],
    "papers_without_artifact_ids": [
      4110,
      92
    ]
  },
  {
    "name": "Matthias Neugschwandtner",
    "display_name": "Matthias Neugschwandtner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Speculator: a tool to analyze speculative execution attacks and mitigations",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3667,
    "paper_ids": [
      3036
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alessandro Sorniotti",
    "display_name": "Alessandro Sorniotti",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "EUROSYS": 0,
      "USENIXSEC": 1,
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "EUROSYS": {},
      "USENIXSEC": {
        "2023": 1
      },
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Speculator: a tool to analyze speculative execution attacks and mitigations",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok automating kernel vulnerability discovery and exploit generation",
        "conference": "WOOT",
        "year": 2025
      },
      {
        "title": "how to bind anonymous credentials to humans",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 3668,
    "paper_ids": [
      3036
    ],
    "papers_without_artifact_ids": [
      4110,
      5099
    ]
  },
  {
    "name": "William K. Robertson",
    "display_name": "William K. Robertson",
    "affiliation": "Northeastern University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ACSAC": 4,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2018": 1,
        "2019": 1,
        "2017": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Speculator: a tool to analyze speculative execution attacks and mitigations",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hypervisor dissociative execution programming guests for monitoring management and security",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "on the effectiveness of typebased control flow integrity",
        "conference": "ACSAC",
        "year": 2018
      },
      {
        "title": "exray detection of historyleaking browser extensions",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 3669,
    "paper_ids": [
      3036
    ],
    "papers_without_artifact_ids": [
      5100,
      3047,
      2426
    ]
  },
  {
    "name": "Anil Kurmus",
    "display_name": "Anil Kurmus",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1,
      "WOOT": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "WOOT": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Speculator: a tool to analyze speculative execution attacks and mitigations",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok automating kernel vulnerability discovery and exploit generation",
        "conference": "WOOT",
        "year": 2025
      },
      {
        "title": "ghostrace exploiting and mitigating speculative race conditions",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3670,
    "paper_ids": [
      3036
    ],
    "papers_without_artifact_ids": [
      4110,
      92
    ]
  },
  {
    "name": "Chang Xu 0002",
    "display_name": "Chang Xu",
    "affiliation": "University of Sydney",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STRIP: a defence against trojan attacks on deep neural networks",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3671,
    "paper_ids": [
      764
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shiping Chen 0001",
    "display_name": "Shiping Chen",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1,
        "2017": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STRIP: a defence against trojan attacks on deep neural networks",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "machinelearningguided typestate analysis for static useafterfree detection",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 3672,
    "paper_ids": [
      764
    ],
    "papers_without_artifact_ids": [
      5101
    ]
  },
  {
    "name": "Damith Chinthana Ranasinghe",
    "display_name": "Damith Chinthana Ranasinghe",
    "affiliation": "Adelaide University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STRIP: a defence against trojan attacks on deep neural networks",
        "conference": "ACSAC",
        "year": 2019,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3673,
    "paper_ids": [
      764
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Buse G. A. Tekgul",
    "display_name": "Buse G. A. Tekgul",
    "affiliation": "Nokia Bell Labs, Espoo, Finland",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3674,
    "paper_ids": [
      1190
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marina Moore",
    "display_name": "Marina Moore",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3675,
    "paper_ids": [
      3976
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Trishank Karthik Kuppusamy",
    "display_name": "Trishank Karthik Kuppusamy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 0,
      "USENIXSEC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "ATC": {},
      "USENIXSEC": {},
      "NSDI": {
        "2016": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diplomat using delegations to protect community repositories",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 3676,
    "paper_ids": [
      3976
    ],
    "papers_without_artifact_ids": [
      3978
    ]
  },
  {
    "name": "Jianli Bai",
    "display_name": "Jianli Bai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secretshared shuffle with malicious security",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 3677,
    "paper_ids": [
      2958
    ],
    "papers_without_artifact_ids": [
      2959
    ]
  },
  {
    "name": "Xiaowu Zhang",
    "display_name": "Xiaowu Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3678,
    "paper_ids": [
      2958
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qifan Wang 0003",
    "display_name": "Qifan Wang",
    "affiliation": "University of Auckland",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3679,
    "paper_ids": [
      2958
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Giovanni Russello",
    "display_name": "Giovanni Russello",
    "affiliation": "University of Auckland",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "resultpatternhiding conjunctive searchable symmetric encryption with forward and backward privacy",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 3680,
    "paper_ids": [
      2958
    ],
    "papers_without_artifact_ids": [
      3981
    ]
  },
  {
    "name": "Raluca-Georgia Diugan",
    "display_name": "Raluca-Georgia Diugan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Domain and Website Attribution beyond WHOIS",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3681,
    "paper_ids": [
      3982
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leyla Bilge",
    "display_name": "Leyla Bilge",
    "affiliation": "Gen Digital, France",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "ACSAC": 4,
      "USENIXSEC": 4,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 2,
        "2017": 1,
        "2020": 1
      },
      "USENIXSEC": {
        "2023": 2,
        "2022": 1,
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 11.1,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Domain and Website Attribution beyond WHOIS",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ctrlaltdeceive quantifying user exposure to online scams",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "scamdog millionaire detecting ecommerce scams in the wild",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "rods with laser beams understanding browser fingerprinting on phishing pages",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "one size does not fit all quantifying the risk of malicious app encounters for different android user profiles",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "when sally met trackers web tracking from the users perspective",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "when malware changed its mind an empirical study of variable program behaviors in the real world",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "the tangled genealogy of iot malware",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "lean on me mining internet service dependencies from largescale dns data",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 3682,
    "paper_ids": [
      3982
    ],
    "papers_without_artifact_ids": [
      3984,
      3987,
      3988,
      3986,
      3989,
      5102,
      4342,
      5103
    ]
  },
  {
    "name": "Son Seonghun",
    "display_name": "Son Seonghun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3683,
    "paper_ids": [
      3966
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tom Ganz",
    "display_name": "Tom Ganz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PAVUDI: Patch-based Vulnerability Discovery using Machine Learning",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3684,
    "paper_ids": [
      536
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Erik Imgrund",
    "display_name": "Erik Imgrund",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PAVUDI: Patch-based Vulnerability Discovery using Machine Learning",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3685,
    "paper_ids": [
      536
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Härterich",
    "display_name": "Martin Härterich",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "PETS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PAVUDI: Patch-based Vulnerability Discovery using Machine Learning",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8010,
    "paper_ids": [
      536
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Giorgio Severi",
    "display_name": "Giorgio Severi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Poisoning Network Flow Classifiers",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacy side channels in machine learning systems",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "explanationguided backdoor poisoning attacks against malware classifiers",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 3687,
    "paper_ids": [
      3991
    ],
    "papers_without_artifact_ids": [
      4312,
      3993
    ]
  },
  {
    "name": "Simona Boboila",
    "display_name": "Simona Boboila",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "FAST": {
        "2010": 1,
        "2013": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Poisoning Network Flow Classifiers",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "active flash towards energyefficient insitu data analytics on extremescale machines",
        "conference": "FAST",
        "year": 2013
      },
      {
        "title": "write endurance in flash drives measurements and analysis",
        "conference": "FAST",
        "year": 2010
      }
    ],
    "author_id": 3688,
    "paper_ids": [
      3991
    ],
    "papers_without_artifact_ids": [
      3575,
      4872
    ]
  },
  {
    "name": "John T. Holodnak",
    "display_name": "John T. Holodnak",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Poisoning Network Flow Classifiers",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3689,
    "paper_ids": [
      3991
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kendra Kratkiewicz",
    "display_name": "Kendra Kratkiewicz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Poisoning Network Flow Classifiers",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3690,
    "paper_ids": [
      3991
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jason Matterer",
    "display_name": "Jason Matterer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Poisoning Network Flow Classifiers",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3691,
    "paper_ids": [
      3991
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dazhi Zhan",
    "display_name": "Dazhi Zhan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3692,
    "paper_ids": [
      5104
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei Bai",
    "display_name": "Wei Bai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3693,
    "paper_ids": [
      5104
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xin Liu 0042",
    "display_name": "Xin Liu",
    "affiliation": "Army Engineering University of PLA, College of Command and Control Engineering, Nanjing, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3694,
    "paper_ids": [
      5104
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yue Hu 0016",
    "display_name": "Yue Hu",
    "affiliation": "University of Southern California",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3695,
    "paper_ids": [
      5104
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lei Zhang 0126",
    "display_name": "Lei Zhang",
    "affiliation": "Army Engineering University of PLA, Nanjing, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3696,
    "paper_ids": [
      5104
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shize Guo",
    "display_name": "Shize Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "efficient persistent fault analysis with small number of chosen plaintexts",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 3697,
    "paper_ids": [
      5104
    ],
    "papers_without_artifact_ids": [
      318
    ]
  },
  {
    "name": "Zhisong Pan 0003",
    "display_name": "Zhisong Pan",
    "affiliation": "Army Engineering University of PLA, Nanjing, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3698,
    "paper_ids": [
      5104
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Farabi Mahmud",
    "display_name": "Farabi Mahmud",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Attack of the Knights: Non Uniform Cache Side Channel Attack",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3699,
    "paper_ids": [
      3995
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sungkeun Kim",
    "display_name": "Sungkeun Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Attack of the Knights: Non Uniform Cache Side Channel Attack",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3700,
    "paper_ids": [
      3995
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Harpreet Singh Chawla",
    "display_name": "Harpreet Singh Chawla",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Attack of the Knights: Non Uniform Cache Side Channel Attack",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3701,
    "paper_ids": [
      3995
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eun Jung Kim 0001",
    "display_name": "Eun Jung Kim",
    "affiliation": "Texas A&M University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Attack of the Knights: Non Uniform Cache Side Channel Attack",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3702,
    "paper_ids": [
      3995
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abdullah Muzahid",
    "display_name": "Abdullah Muzahid",
    "affiliation": "Texas A&M University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Attack of the Knights: Non Uniform Cache Side Channel Attack",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3703,
    "paper_ids": [
      3995
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seonhye Park",
    "display_name": "Seonhye Park",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3704,
    "paper_ids": [
      765
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Claudio Soriente",
    "display_name": "Claudio Soriente",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0,
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "USENIXSEC": {},
      "PETS": {
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "No Forking Way: Detecting Cloning Attacks on Intel SGX Applications",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the forking way when tees meet consensus",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "controlled functional encryption revisited multiauthority extensions and efficient schemes for quadratic functions",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 3705,
    "paper_ids": [
      3904
    ],
    "papers_without_artifact_ids": [
      3905,
      5105
    ]
  },
  {
    "name": "Annika Wilde",
    "display_name": "Annika Wilde",
    "affiliation": "Ruhr University Bochum",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "No Forking Way: Detecting Cloning Attacks on Intel SGX Applications",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the forking way when tees meet consensus",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 3706,
    "paper_ids": [
      3904
    ],
    "papers_without_artifact_ids": [
      3905
    ]
  },
  {
    "name": "Jorge Castillo",
    "display_name": "Jorge Castillo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mindiot machine intelligence and datamining for iot threats",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 3707,
    "paper_ids": [
      2301
    ],
    "papers_without_artifact_ids": [
      5106
    ]
  },
  {
    "name": "Qian Chen 0019",
    "display_name": "Qian Chen",
    "affiliation": "University of Texas at San Antonio",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3708,
    "paper_ids": [
      2301
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pietro Tedeschi",
    "display_name": "Pietro Tedeschi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1,
        "2023": 1
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "selective authenticated pilot location disclosure for remote idenabled drones",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "arid anonymous remote identification of unmanned aerial vehicles",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 3709,
    "paper_ids": [
      3007
    ],
    "papers_without_artifact_ids": [
      3008,
      3010
    ]
  },
  {
    "name": "Roberto Di Pietro",
    "display_name": "Roberto Di Pietro",
    "affiliation": "KAUST",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "ATC": 0,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1,
        "2023": 1
      },
      "ATC": {},
      "PETS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "arid anonymous remote identification of unmanned aerial vehicles",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 3710,
    "paper_ids": [
      3007
    ],
    "papers_without_artifact_ids": [
      3010
    ]
  },
  {
    "name": "Giada Stivala",
    "display_name": "Giada Stivala",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3711,
    "paper_ids": [
      2323
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sahar Abdelnabi",
    "display_name": "Sahar Abdelnabi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "factsaboteurs a taxonomy of evidence manipulation attacks against factverification systems",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 3712,
    "paper_ids": [
      2323
    ],
    "papers_without_artifact_ids": [
      5107
    ]
  },
  {
    "name": "Andrea Mengascini",
    "display_name": "Andrea Mengascini",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3713,
    "paper_ids": [
      2323
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mariano Graziano",
    "display_name": "Mariano Graziano",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "USENIXSEC": {
        "2022": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how machine learning is solving the binary function similarity problem",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 3714,
    "paper_ids": [
      2323
    ],
    "papers_without_artifact_ids": [
      4219
    ]
  },
  {
    "name": "Mario Fritz",
    "display_name": "Mario Fritz",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 5,
      "PETS": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 2,
        "2022": 1
      },
      "PETS": {
        "2022": 1,
        "2024": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 11.1,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fedlapdp federated learning by sharing differentially private loss approximations",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "towards biologically plausible and private gene expression data generation",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "securitynet assessing machine learning vulnerabilities on public models",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "factsaboteurs a taxonomy of evidence manipulation attacks against factverification systems",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "unganable defending against ganbased face manipulation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "understanding utility and privacy of demographic data in education technology by causal analysis and adversarialcensoring",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "mldoctor holistic risk assessment of inference attacks against machine learning models",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "updatesleak data set inference and reconstruction attacks in online learning",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3715,
    "paper_ids": [
      2323
    ],
    "papers_without_artifact_ids": [
      5108,
      5109,
      199,
      5107,
      205,
      5110,
      206,
      212
    ]
  },
  {
    "name": "Xinyu Liu 0019",
    "display_name": "Xinyu Liu",
    "affiliation": "Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3716,
    "paper_ids": [
      5111
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ze Jin",
    "display_name": "Ze Jin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NSDI": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "NSDI": {
        "2019": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hidden and lost control on security design risks in iot userfacing matter controller",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "netbouncer active device and link failure localization in data center networks",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 3717,
    "paper_ids": [
      5111
    ],
    "papers_without_artifact_ids": [
      2453,
      2854
    ]
  },
  {
    "name": "Jiaxi Liu",
    "display_name": "Jiaxi Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3718,
    "paper_ids": [
      5111
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei Liu 0243",
    "display_name": "Wei Liu",
    "affiliation": "Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3719,
    "paper_ids": [
      5111
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaoxi Wang",
    "display_name": "Xiaoxi Wang",
    "affiliation": "Western Sydney University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3720,
    "paper_ids": [
      5111
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qixu Liu",
    "display_name": "Qixu Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hidden and lost control on security design risks in iot userfacing matter controller",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 3721,
    "paper_ids": [
      5111
    ],
    "papers_without_artifact_ids": [
      2453
    ]
  },
  {
    "name": "Fabian Franzen",
    "display_name": "Fabian Franzen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3722,
    "paper_ids": [
      3998
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andreas Chris Wilhelmer",
    "display_name": "Andreas Chris Wilhelmer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3723,
    "paper_ids": [
      3998
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yufan Chen",
    "display_name": "Yufan Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3724,
    "paper_ids": [
      1730
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ke Wang 0061",
    "display_name": "Ke Wang",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3725,
    "paper_ids": [
      3952
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianbo Gao 0003",
    "display_name": "Jianbo Gao",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3726,
    "paper_ids": [
      3952
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qiao Wang",
    "display_name": "Qiao Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3727,
    "paper_ids": [
      3952
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiashuo Zhang 0001",
    "display_name": "Jiashuo Zhang",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3728,
    "paper_ids": [
      3952
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhi Guan",
    "display_name": "Zhi Guan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3729,
    "paper_ids": [
      3952
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhong Chen 0001",
    "display_name": "Zhong Chen",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3730,
    "paper_ids": [
      3952
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Richard August See",
    "display_name": "Richard August See",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3731,
    "paper_ids": [
      5112
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maximilian Gehring",
    "display_name": "Maximilian Gehring",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3732,
    "paper_ids": [
      5112
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mathias Fischer 0001",
    "display_name": "Mathias Fischer",
    "affiliation": "University of Hamburg",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "EUROSYS": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "latencyaware scheduling for realtime application support in edge computing",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "enhanced performance and privacy for tls over tcp fast open",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "tracking users across the web via tls session resumption",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 3733,
    "paper_ids": [
      5112
    ],
    "papers_without_artifact_ids": [
      5113,
      5114,
      5115
    ]
  },
  {
    "name": "Shankar Karuppayah",
    "display_name": "Shankar Karuppayah",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3734,
    "paper_ids": [
      5112
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andreas Müller 0025",
    "display_name": "Andreas Müller",
    "affiliation": "Ruhr University Bochum",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Detection of Image-Scaling Attacks in Machine Learning",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8011,
    "paper_ids": [
      537
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrew Chi",
    "display_name": "Andrew Chi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 2
      },
      "NSDI": {
        "2017": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Detecting Weak Keys in Manufacturing Certificates: A Case Study",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "prioritizing remediation of enterprise hosts by malware execution risk",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "a system to verify network behavior of known cryptographic clients",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 3736,
    "paper_ids": [
      5116
    ],
    "papers_without_artifact_ids": [
      4170,
      4175
    ]
  },
  {
    "name": "Brandon Enright",
    "display_name": "Brandon Enright",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Detecting Weak Keys in Manufacturing Certificates: A Case Study",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3737,
    "paper_ids": [
      5116
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David A. McGrew",
    "display_name": "David A. McGrew",
    "affiliation": "Cisco Systems, Herndon, VA, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Detecting Weak Keys in Manufacturing Certificates: A Case Study",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3738,
    "paper_ids": [
      5116
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Julius Hohnerlein",
    "display_name": "Julius Hohnerlein",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Triereme: Speeding up hybrid fuzzing through efficient query scheduling",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3739,
    "paper_ids": [
      80
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cláudio Carvalho",
    "display_name": "Cláudio Carvalho",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Remote attestation of confidential VMs using ephemeral vTPMs",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8012,
    "paper_ids": [
      2835
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Angelo Ruocco",
    "display_name": "Angelo Ruocco",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Remote attestation of confidential VMs using ephemeral vTPMs",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3741,
    "paper_ids": [
      2835
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gheorghe Almási 0001",
    "display_name": "Gheorghe Almási",
    "affiliation": "IIIT Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Remote attestation of confidential VMs using ephemeral vTPMs",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8013,
    "paper_ids": [
      2835
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "James Bottomley",
    "display_name": "James Bottomley",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Remote attestation of confidential VMs using ephemeral vTPMs",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3743,
    "paper_ids": [
      2835
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mengmei Ye",
    "display_name": "Mengmei Ye",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Remote attestation of confidential VMs using ephemeral vTPMs",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3744,
    "paper_ids": [
      2835
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tobin Feldman-Fitzthum",
    "display_name": "Tobin Feldman-Fitzthum",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Remote attestation of confidential VMs using ephemeral vTPMs",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "serverless confidential containers challenges and opportunities",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 3745,
    "paper_ids": [
      2835
    ],
    "papers_without_artifact_ids": [
      1392
    ]
  },
  {
    "name": "Daniele Buono",
    "display_name": "Daniele Buono",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "SC": 0,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "SC": {},
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Remote attestation of confidential VMs using ephemeral vTPMs",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "serverless confidential containers challenges and opportunities",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 3746,
    "paper_ids": [
      2835
    ],
    "papers_without_artifact_ids": [
      1392
    ]
  },
  {
    "name": "Piergiorgio Ladisa",
    "display_name": "Piergiorgio Ladisa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3747,
    "paper_ids": [
      5117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Serena Elisa Ponta",
    "display_name": "Serena Elisa Ponta",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3748,
    "paper_ids": [
      5117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nicola Ronzoni",
    "display_name": "Nicola Ronzoni",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3749,
    "paper_ids": [
      5117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matias Martinez",
    "display_name": "Matias Martinez",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3750,
    "paper_ids": [
      5117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Olivier Barais",
    "display_name": "Olivier Barais",
    "affiliation": "IRISA Rennes",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "PETS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3751,
    "paper_ids": [
      5117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Eckel",
    "display_name": "Michael Eckel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Remote Attestation with Constrained Disclosure",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3752,
    "paper_ids": [
      3049
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Björn Grohmann",
    "display_name": "Björn Grohmann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Remote Attestation with Constrained Disclosure",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8014,
    "paper_ids": [
      3049
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fabing Li",
    "display_name": "Fabing Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3754,
    "paper_ids": [
      4010
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiang Li 0156",
    "display_name": "Xiang Li",
    "affiliation": "China Telecom, Beijing, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3755,
    "paper_ids": [
      4010
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zihao Liu",
    "display_name": "Zihao Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1,
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Protecting Your Voice from Speech Synthesis Attacks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "stegonet turn deep neural network into a stegomalware",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 3756,
    "paper_ids": [
      5118
    ],
    "papers_without_artifact_ids": [
      3909
    ]
  },
  {
    "name": "Yan Zhang 0133",
    "display_name": "Yan Zhang",
    "affiliation": "Iowa State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Protecting Your Voice from Speech Synthesis Attacks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3757,
    "paper_ids": [
      5118
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chenglin Miao",
    "display_name": "Chenglin Miao",
    "affiliation": "Iowa State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Protecting Your Voice from Speech Synthesis Attacks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3758,
    "paper_ids": [
      5118
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yizhe Zhang 0006",
    "display_name": "Yizhe Zhang",
    "affiliation": "University of Virginia",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3759,
    "paper_ids": [
      3051
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hongying Dong",
    "display_name": "Hongying Dong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3760,
    "paper_ids": [
      3051
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alastair Nottingham",
    "display_name": "Alastair Nottingham",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3761,
    "paper_ids": [
      3051
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Molly Buchanan",
    "display_name": "Molly Buchanan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3762,
    "paper_ids": [
      3051
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Donald E. Brown",
    "display_name": "Donald E. Brown",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3763,
    "paper_ids": [
      3051
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alberto Carboneri",
    "display_name": "Alberto Carboneri",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3764,
    "paper_ids": [
      3913
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohammad Ghasemisharif",
    "display_name": "Mohammad Ghasemisharif",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rise of inspectron automated blackbox auditing of crossplatform electron apps",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3765,
    "paper_ids": [
      3913
    ],
    "papers_without_artifact_ids": [
      3917
    ]
  },
  {
    "name": "Soroush Karami",
    "display_name": "Soroush Karami",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "USENIXSEC": {
        "2023": 1,
        "2022": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "poolparty exploiting browser resource pools for web tracking",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "unleash the simulacrum shifting browser realities for robust extensionfingerprinting prevention",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "the dangers of human touch fingerprinting browser extensions through user actions",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 3766,
    "paper_ids": [
      3913
    ],
    "papers_without_artifact_ids": [
      3319,
      827,
      1120
    ]
  },
  {
    "name": "Takashi Koide",
    "display_name": "Takashi Koide",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3767,
    "paper_ids": [
      5119
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Naoki Fukushi",
    "display_name": "Naoki Fukushi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3768,
    "paper_ids": [
      5119
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hiroki Nakano",
    "display_name": "Hiroki Nakano",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3769,
    "paper_ids": [
      5119
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daiki Chiba 0001",
    "display_name": "Daiki Chiba",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3770,
    "paper_ids": [
      5119
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu Zheng 0021",
    "display_name": "Yu Zheng",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Secure Softmax/Sigmoid for Machine-learning Computation",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3771,
    "paper_ids": [
      1721
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qizhi Zhang 0003",
    "display_name": "Qizhi Zhang",
    "affiliation": "Ant Group, Morse Team, Hangzhou, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Secure Softmax/Sigmoid for Machine-learning Computation",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3772,
    "paper_ids": [
      1721
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuxiang Peng",
    "display_name": "Yuxiang Peng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Secure Softmax/Sigmoid for Machine-learning Computation",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3773,
    "paper_ids": [
      1721
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lichun Li",
    "display_name": "Lichun Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Secure Softmax/Sigmoid for Machine-learning Computation",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3774,
    "paper_ids": [
      1721
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shan Yin",
    "display_name": "Shan Yin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Secure Softmax/Sigmoid for Machine-learning Computation",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3775,
    "paper_ids": [
      1721
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joann Qiongna Chen",
    "display_name": "Joann Qiongna Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      },
      "PETS": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Differentially Private Resource Allocation",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a comprehensive study of privacy risks in curriculum learning",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 3776,
    "paper_ids": [
      180
    ],
    "papers_without_artifact_ids": [
      194
    ]
  },
  {
    "name": "DaeGeun Yoon",
    "display_name": "DaeGeun Yoon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials",
        "conference": "ACSAC",
        "year": 2023,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3777,
    "paper_ids": [
      2156
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Riccardo Bortolameotti",
    "display_name": "Riccardo Bortolameotti",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3778,
    "paper_ids": [
      1436
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pieter H. Hartel",
    "display_name": "Pieter H. Hartel",
    "affiliation": "University of Twente",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      },
      "FAST": {
        "2008": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards tamperevident storage on patterned media",
        "conference": "FAST",
        "year": 2008
      }
    ],
    "author_id": 3779,
    "paper_ids": [
      1436
    ],
    "papers_without_artifact_ids": [
      5120
    ]
  },
  {
    "name": "Rick Hofstede",
    "display_name": "Rick Hofstede",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3780,
    "paper_ids": [
      1436
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Willem Jonker",
    "display_name": "Willem Jonker",
    "affiliation": "University of Twente",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3781,
    "paper_ids": [
      1436
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Richard Skowyra",
    "display_name": "Richard Skowyra",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "QUASAR: Quantitative Attack Space Analysis and Reasoning",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "causal analysis for softwaredefined networking attacks",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 3782,
    "paper_ids": [
      4014
    ],
    "papers_without_artifact_ids": [
      3959
    ]
  },
  {
    "name": "Steven R. Gomez",
    "display_name": "Steven R. Gomez",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "QUASAR: Quantitative Attack Space Analysis and Reasoning",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3783,
    "paper_ids": [
      4014
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Bigelow",
    "display_name": "David Bigelow",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "QUASAR: Quantitative Attack Space Analysis and Reasoning",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3784,
    "paper_ids": [
      4014
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "James Landry",
    "display_name": "James Landry",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "QUASAR: Quantitative Attack Space Analysis and Reasoning",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3785,
    "paper_ids": [
      4014
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matús Nemec",
    "display_name": "Matús Nemec",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8015,
    "paper_ids": [
      3061
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dusan Klinec",
    "display_name": "Dusan Klinec",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3787,
    "paper_ids": [
      3061
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peter Sekan",
    "display_name": "Peter Sekan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3788,
    "paper_ids": [
      3061
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jun Young Kim",
    "display_name": "Jun Young Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated Analysis of Secure Internet of Things Protocols",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3789,
    "paper_ids": [
      5121
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ralph Holz",
    "display_name": "Ralph Holz",
    "affiliation": "University of Twente",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated Analysis of Secure Internet of Things Protocols",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "landscape exploring ldap weaknesses and data leaks at internet scale",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3790,
    "paper_ids": [
      5121
    ],
    "papers_without_artifact_ids": [
      4431
    ]
  },
  {
    "name": "Wen Hu 0001",
    "display_name": "Wen Hu",
    "affiliation": "UNSW",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "EUROSYS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      },
      "EUROSYS": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated Analysis of Secure Internet of Things Protocols",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3791,
    "paper_ids": [
      5121
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sanjay Jha 0001",
    "display_name": "Sanjay Jha",
    "affiliation": "UNSW",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2019": 1,
        "2017": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated Analysis of Secure Internet of Things Protocols",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an empirical study of sms onetime password authentication in android apps",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 3792,
    "paper_ids": [
      5121
    ],
    "papers_without_artifact_ids": [
      769
    ]
  },
  {
    "name": "Xinshu Dong",
    "display_name": "Xinshu Dong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3793,
    "paper_ids": [
      1695
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sumeet Jauhar",
    "display_name": "Sumeet Jauhar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3794,
    "paper_ids": [
      1695
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Timothy Barron",
    "display_name": "Timothy Barron",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3795,
    "paper_ids": [
      1112
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anh Quach",
    "display_name": "Anh Quach",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Supplementing Modern Software Defenses with Stack-Pointer Sanity",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3796,
    "paper_ids": [
      5122
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matthew Cole",
    "display_name": "Matthew Cole",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Supplementing Modern Software Defenses with Stack-Pointer Sanity",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3797,
    "paper_ids": [
      5122
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aravind Prakash",
    "display_name": "Aravind Prakash",
    "affiliation": "Binghamton University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1,
        "2017": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Supplementing Modern Software Defenses with Stack-Pointer Sanity",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "program obfuscation via abi debiasing",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 3798,
    "paper_ids": [
      5122
    ],
    "papers_without_artifact_ids": [
      5123
    ]
  },
  {
    "name": "Danish Alsayed",
    "display_name": "Danish Alsayed",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3799,
    "paper_ids": [
      1660
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuexuan Wang",
    "display_name": "Yuexuan Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3800,
    "paper_ids": [
      1660
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Feng Liang 0004",
    "display_name": "Feng Liang",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3801,
    "paper_ids": [
      1660
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhaoquan Gu",
    "display_name": "Zhaoquan Gu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3802,
    "paper_ids": [
      1660
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mozhgan Azimpourkivi",
    "display_name": "Mozhgan Azimpourkivi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Secure Mobile Authentication Alternative to Biometrics",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "human distinguishable visual key fingerprints",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3803,
    "paper_ids": [
      5124
    ],
    "papers_without_artifact_ids": [
      5125
    ]
  },
  {
    "name": "Umut Topkara",
    "display_name": "Umut Topkara",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "ATC": 0,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      },
      "ATC": {},
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Secure Mobile Authentication Alternative to Biometrics",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "human distinguishable visual key fingerprints",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3804,
    "paper_ids": [
      5124
    ],
    "papers_without_artifact_ids": [
      5125
    ]
  },
  {
    "name": "Bogdan Carbunar",
    "display_name": "Bogdan Carbunar",
    "affiliation": "Florida International University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 3,
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2017": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2023": 2
      },
      "PETS": {
        "2022": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2017
    ],
    "year_range": "2017-2017",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Secure Mobile Authentication Alternative to Biometrics",
        "conference": "ACSAC",
        "year": 2017,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a study of chinas censorship and its evasion through the lens of online gaming",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "strategies and vulnerabilities of participants in venezuelan influence operations",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "toward uncensorable anonymous and private access over satoshi blockchains",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "sok plausibly deniable storage",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "human distinguishable visual key fingerprints",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3805,
    "paper_ids": [
      5124
    ],
    "papers_without_artifact_ids": [
      5126,
      5127,
      5128,
      5129,
      5125
    ]
  },
  {
    "name": "Gaganjeet Singh Reen",
    "display_name": "Gaganjeet Singh Reen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DPIFuzz: A Differential Fuzzing Framework to Detect DPI Elusion Strategies for QUIC",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3806,
    "paper_ids": [
      846
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Riccardo Taormina",
    "display_name": "Riccardo Taormina",
    "affiliation": "TU Delft",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3807,
    "paper_ids": [
      3000
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stefano Galelli",
    "display_name": "Stefano Galelli",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3808,
    "paper_ids": [
      3000
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marcello Pogliani",
    "display_name": "Marcello Pogliani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1,
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "theres a hole in that bucket a largescale analysis of misconfigured s3 buckets",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 3809,
    "paper_ids": [
      3000
    ],
    "papers_without_artifact_ids": [
      3068
    ]
  },
  {
    "name": "André Greubel",
    "display_name": "André Greubel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2018": 1,
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Quantifying measurement quality and load distribution in Tor",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "smartor smarter tor with smart contracts improving resilience of topology distribution in the tor network",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 8016,
    "paper_ids": [
      4018
    ],
    "papers_without_artifact_ids": [
      4019
    ]
  },
  {
    "name": "Steffen Pohl",
    "display_name": "Steffen Pohl",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Quantifying measurement quality and load distribution in Tor",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3811,
    "paper_ids": [
      4018
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yangguang Tian",
    "display_name": "Yangguang Tian",
    "affiliation": "University of Surrey",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fease fast and expressive asymmetric searchable encryption",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3812,
    "paper_ids": [
      835
    ],
    "papers_without_artifact_ids": [
      5130
    ]
  },
  {
    "name": "Nan Li 0007",
    "display_name": "Nan Li",
    "affiliation": "University of Newcastle",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3813,
    "paper_ids": [
      835
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pawel Szalachowski",
    "display_name": "Pawel Szalachowski",
    "affiliation": "SUTD",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3814,
    "paper_ids": [
      835
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Raj Vardhan",
    "display_name": "Raj Vardhan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Security Study of Service Worker Cross-Site Scripting",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3815,
    "paper_ids": [
      4020
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Duc Cuong Nguyen 0001",
    "display_name": "Duc Cuong Nguyen",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Up2Dep: Android Tool Support to Fix Insecure Code Dependencies",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3816,
    "paper_ids": [
      402
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Erik Derr",
    "display_name": "Erik Derr",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Up2Dep: Android Tool Support to Fix Insecure Code Dependencies",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3817,
    "paper_ids": [
      402
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Liang Niu",
    "display_name": "Liang Niu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "codexleaks privacy leaks from code generation language models in github copilot",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 3818,
    "paper_ids": [
      3073
    ],
    "papers_without_artifact_ids": [
      3079
    ]
  },
  {
    "name": "Xianbin Hong",
    "display_name": "Xianbin Hong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3819,
    "paper_ids": [
      3073
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhen Li 0047",
    "display_name": "Zhen Li",
    "affiliation": "Shanghai Grandhonor Information Technology Co. Ltd., Shanghai, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3820,
    "paper_ids": [
      3073
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Larissa Hoffaeller",
    "display_name": "Larissa Hoffaeller",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3821,
    "paper_ids": [
      3073
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Erkam Uzun",
    "display_name": "Erkam Uzun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Feasibility of Automating Stock Market Manipulation",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fuzzy labeled private set intersection with applications to private realtime biometric search",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 3822,
    "paper_ids": [
      1409
    ],
    "papers_without_artifact_ids": [
      1421
    ]
  },
  {
    "name": "Sai Ragam",
    "display_name": "Sai Ragam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Feasibility of Automating Stock Market Manipulation",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3823,
    "paper_ids": [
      1409
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Rosso",
    "display_name": "Martin Rosso",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3824,
    "paper_ids": [
      2962
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michele Campobasso",
    "display_name": "Michele Campobasso",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "know your cybercriminal evaluating attacker preferences by measuring profile sales on an active leading criminal market for user impersonation at scale",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 3825,
    "paper_ids": [
      2962
    ],
    "papers_without_artifact_ids": [
      2963
    ]
  },
  {
    "name": "Ganduulga Gankhuyag",
    "display_name": "Ganduulga Gankhuyag",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3826,
    "paper_ids": [
      2962
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christin Wilson",
    "display_name": "Christin Wilson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3827,
    "paper_ids": [
      1198
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simeon Krastnikov",
    "display_name": "Simeon Krastnikov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Over-Threshold Multi-Party Private Set Intersection",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3828,
    "paper_ids": [
      1208
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nils Lukas",
    "display_name": "Nils Lukas",
    "affiliation": "MBZUAI",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Over-Threshold Multi-Party Private Set Intersection",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fast and private inference of deep neural networks by codesigning activation functions",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "pepsi practically efficient private set intersection in the unbalanced setting",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "ptw pivotal tuning watermarking for pretrained image generators",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 3829,
    "paper_ids": [
      1208
    ],
    "papers_without_artifact_ids": [
      1215,
      1216,
      1218
    ]
  },
  {
    "name": "John A. Premkumar",
    "display_name": "John A. Premkumar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Over-Threshold Multi-Party Private Set Intersection",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pepsi practically efficient private set intersection in the unbalanced setting",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3830,
    "paper_ids": [
      1208
    ],
    "papers_without_artifact_ids": [
      1216
    ]
  },
  {
    "name": "Masoumeh Shafieinejad",
    "display_name": "Masoumeh Shafieinejad",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Over-Threshold Multi-Party Private Set Intersection",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3831,
    "paper_ids": [
      1208
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simon Oya",
    "display_name": "Simon Oya",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 4,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2022": 1,
        "2021": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Over-Threshold Multi-Party Private Set Intersection",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fast and private inference of deep neural networks by codesigning activation functions",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "pepsi practically efficient private set intersection in the unbalanced setting",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "ihop improved statistical query recovery against searchable symmetric encryption through quadratic optimization",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "hiding the access pattern is not enough exploiting search pattern leakage in searchable encryption",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 3832,
    "paper_ids": [
      1208
    ],
    "papers_without_artifact_ids": [
      1215,
      1216,
      1219,
      1220
    ]
  },
  {
    "name": "Erik-Oliver Blass",
    "display_name": "Erik-Oliver Blass",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "PETS": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Over-Threshold Multi-Party Private Set Intersection",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "blind my an improved cryptographic protocol to prevent stalking in apples find my network",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 3833,
    "paper_ids": [
      1208
    ],
    "papers_without_artifact_ids": [
      5131
    ]
  },
  {
    "name": "Timothy J. Forman",
    "display_name": "Timothy J. Forman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "using a blocklist to improve the security of user selection of android patterns",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 3834,
    "paper_ids": [
      858
    ],
    "papers_without_artifact_ids": [
      873
    ]
  },
  {
    "name": "Andrea Jemmett",
    "display_name": "Andrea Jemmett",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "EUROSYS": {
        "2021": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "nyxnet network fuzzing with incremental snapshots",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "collabfuzz a framework for collaborative fuzzing",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 3835,
    "paper_ids": [
      81
    ],
    "papers_without_artifact_ids": [
      117,
      94
    ]
  },
  {
    "name": "Sebastian Österlund",
    "display_name": "Sebastian Österlund",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "EUROSYS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "collabfuzz a framework for collaborative fuzzing",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "parmesan sanitizerguided greybox fuzzing",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 8017,
    "paper_ids": [
      81
    ],
    "papers_without_artifact_ids": [
      94,
      97
    ]
  },
  {
    "name": "Shengye Wan",
    "display_name": "Shengye Wan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RusTEE: Developing Memory-Safe ARM TrustZone Applications",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3837,
    "paper_ids": [
      166
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aman Luthra",
    "display_name": "Aman Luthra",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZeroAUDIT",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3838,
    "paper_ids": [
      5132
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "James Cavanaugh",
    "display_name": "James Cavanaugh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZeroAUDIT",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3839,
    "paper_ids": [
      5132
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hugo Renzzo Olcese",
    "display_name": "Hugo Renzzo Olcese",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZeroAUDIT",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3840,
    "paper_ids": [
      5132
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rina M. Hirsch",
    "display_name": "Rina M. Hirsch",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZeroAUDIT",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3841,
    "paper_ids": [
      5132
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiang Fu 0001",
    "display_name": "Xiang Fu",
    "affiliation": "Chinese Academy of Sciences",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZeroAUDIT",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3842,
    "paper_ids": [
      5132
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sean Oesch",
    "display_name": "Sean Oesch",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "ACSAC": 3,
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 2,
        "2020": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards a high fidelity training environment for autonomous cyber defense agents",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "toward the detection of polyglot files",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "systematization of password manageruse cases and design paradigms",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "the emperors new autofill framework a security analysis of autofill on ios and android",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "d2u data driven user emulation for the enhancement of cyber testing training and data set generation",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "that was then this is now a security evaluation of password generation storage and autofill in browserbased password managers",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3843,
    "paper_ids": [
      4027
    ],
    "papers_without_artifact_ids": [
      5133,
      5134,
      5135,
      5136,
      5137,
      5138
    ]
  },
  {
    "name": "Oumar Diallo",
    "display_name": "Oumar Diallo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1,
        "2020": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "systematization of password manageruse cases and design paradigms",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "d2u data driven user emulation for the enhancement of cyber testing training and data set generation",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 3844,
    "paper_ids": [
      4027
    ],
    "papers_without_artifact_ids": [
      5135,
      5137
    ]
  },
  {
    "name": "James Simmons",
    "display_name": "James Simmons",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 1,
        "2020": 1
      },
      "SC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "systematization of password manageruse cases and design paradigms",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 3845,
    "paper_ids": [
      4027
    ],
    "papers_without_artifact_ids": [
      5135
    ]
  },
  {
    "name": "Justin Wu",
    "display_name": "Justin Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3846,
    "paper_ids": [
      4027
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Scott Ruoti",
    "display_name": "Scott Ruoti",
    "affiliation": "University of Tennessee",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "ACSAC": 3,
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2021": 2,
        "2020": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "reusable"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "if i could do this i feel anyone could the design and evaluation of a secondary authentication factor manager",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "improving password generation through the design of a password composition policy description language",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "systematization of password manageruse cases and design paradigms",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "the emperors new autofill framework a security analysis of autofill on ios and android",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "that was then this is now a security evaluation of password generation storage and autofill in browserbased password managers",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3847,
    "paper_ids": [
      4027
    ],
    "papers_without_artifact_ids": [
      5139,
      5140,
      5135,
      5136,
      5138
    ]
  },
  {
    "name": "Yannik Lockner",
    "display_name": "Yannik Lockner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy-Preserving Production Process Parameter Exchange",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3848,
    "paper_ids": [
      3005
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Markus Dahlmanns",
    "display_name": "Markus Dahlmanns",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy-Preserving Production Process Parameter Exchange",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3849,
    "paper_ids": [
      3005
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tiandong Xi",
    "display_name": "Tiandong Xi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy-Preserving Production Process Parameter Exchange",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3850,
    "paper_ids": [
      3005
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marcel Fey",
    "display_name": "Marcel Fey",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy-Preserving Production Process Parameter Exchange",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3851,
    "paper_ids": [
      3005
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christian Brecher",
    "display_name": "Christian Brecher",
    "affiliation": "RWTH Aachen University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy-Preserving Production Process Parameter Exchange",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3852,
    "paper_ids": [
      3005
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christian Hopmann",
    "display_name": "Christian Hopmann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy-Preserving Production Process Parameter Exchange",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3853,
    "paper_ids": [
      3005
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aisha I. Ali-Gombe",
    "display_name": "Aisha I. Ali-Gombe",
    "affiliation": "Louisiana State University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2024": 1,
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploring large language models for semantic analysis and categorization of android malware",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 3854,
    "paper_ids": [
      5141
    ],
    "papers_without_artifact_ids": [
      5142
    ]
  },
  {
    "name": "Alexandra Tambaoan",
    "display_name": "Alexandra Tambaoan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3855,
    "paper_ids": [
      5141
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Angela Gurfolino",
    "display_name": "Angela Gurfolino",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3856,
    "paper_ids": [
      5141
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Golden G. Richard III",
    "display_name": "Golden G. Richard III",
    "affiliation": "Louisiana State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ACSAC": 1,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "ACSAC": {
        "2020": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "ACSAC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts",
        "conference": "ACSAC",
        "year": 2020,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3857,
    "paper_ids": [
      5141
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Colin O'Flynn",
    "display_name": "Colin O'Flynn",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Phase Modulation Side Channels: Jittery JTAG for On-Chip Voltage Measurements",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3967,
    "paper_ids": [
      5143
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hetian Shi",
    "display_name": "Hetian Shi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "demystifying the security implications in iot device rental services",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 3968,
    "paper_ids": [
      543
    ],
    "papers_without_artifact_ids": [
      561
    ]
  },
  {
    "name": "Qing Wang",
    "display_name": "Qing Wang",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3969,
    "paper_ids": [
      543
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xin Liu",
    "display_name": "Xin Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 1,
      "SOSP": 0,
      "SC": 0,
      "ATC": 0,
      "ACSAC": 0,
      "USENIXSEC": 0,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      },
      "SOSP": {},
      "SC": {},
      "ATC": {},
      "ACSAC": {},
      "USENIXSEC": {},
      "NSDI": {
        "2024": 1,
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bytecheckpoint a unified checkpointing system for large foundation model development",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "pudica toward nearzero queuing delay in congestion control for cloud gaming",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "empowering azure storage with rdma",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 3970,
    "paper_ids": [
      543
    ],
    "papers_without_artifact_ids": [
      2857,
      5144,
      4643
    ]
  },
  {
    "name": "Adrian Marotzke",
    "display_name": "Adrian Marotzke",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3971,
    "paper_ids": [
      1462
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anna Guinet",
    "display_name": "Anna Guinet",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3972,
    "paper_ids": [
      1463
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ioan Gabriel Bucur",
    "display_name": "Ioan Gabriel Bucur",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3973,
    "paper_ids": [
      1463
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wangchen Dai",
    "display_name": "Wangchen Dai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Revisiting Keccak and Dilithium Implementations on ARMv7-M",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "velofhe gpu acceleration for fhew and tfhe bootstrapping",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 3974,
    "paper_ids": [
      2336
    ],
    "papers_without_artifact_ids": [
      4044
    ]
  },
  {
    "name": "Yao Liu 0006",
    "display_name": "Yao Liu",
    "affiliation": "University of Central Florida",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Revisiting Keccak and Dilithium Implementations on ARMv7-M",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3975,
    "paper_ids": [
      2336
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonah Bosland",
    "display_name": "Jonah Bosland",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "High-Performance Design Patterns and File Formats for Side-Channel Analysis",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3976,
    "paper_ids": [
      5145
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stefan Ene",
    "display_name": "Stefan Ene",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "High-Performance Design Patterns and File Formats for Side-Channel Analysis",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3977,
    "paper_ids": [
      5145
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peter Baumgartner 0006",
    "display_name": "Peter Baumgartner",
    "affiliation": "Technical University of Munich",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "High-Performance Design Patterns and File Formats for Side-Channel Analysis",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3978,
    "paper_ids": [
      5145
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vincent Immler",
    "display_name": "Vincent Immler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "High-Performance Design Patterns and File Formats for Side-Channel Analysis",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3979,
    "paper_ids": [
      5145
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiangxue Liu",
    "display_name": "Jiangxue Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Low-Latency High-Order Arithmetic to Boolean Masking Conversion",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "breaking ground a new area record for lowlatency firstorder masked sha3 advancing from the 4x area era to the 3x area era",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 3980,
    "paper_ids": [
      3097
    ],
    "papers_without_artifact_ids": [
      3102
    ]
  },
  {
    "name": "Cankun Zhao",
    "display_name": "Cankun Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 2,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Low-Latency High-Order Arithmetic to Boolean Masking Conversion",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "breaking ground a new area record for lowlatency firstorder masked sha3 advancing from the 4x area era to the 3x area era",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "a compact and highperformance hardware architecture for crystalsdilithium",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 3981,
    "paper_ids": [
      3097
    ],
    "papers_without_artifact_ids": [
      3102,
      3105
    ]
  },
  {
    "name": "Shuohang Peng",
    "display_name": "Shuohang Peng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Low-Latency High-Order Arithmetic to Boolean Masking Conversion",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3982,
    "paper_ids": [
      3097
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hang Zhao",
    "display_name": "Hang Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Low-Latency High-Order Arithmetic to Boolean Masking Conversion",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "breaking ground a new area record for lowlatency firstorder masked sha3 advancing from the 4x area era to the 3x area era",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 3983,
    "paper_ids": [
      3097
    ],
    "papers_without_artifact_ids": [
      3102
    ]
  },
  {
    "name": "Xiangdong Han",
    "display_name": "Xiangdong Han",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Low-Latency High-Order Arithmetic to Boolean Masking Conversion",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3984,
    "paper_ids": [
      3097
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maik Ender",
    "display_name": "Maik Ender",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the unpatchable silicon a full break of the bitstream encryption of xilinx 7series fpgas",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3985,
    "paper_ids": [
      2341
    ],
    "papers_without_artifact_ids": [
      2370
    ]
  },
  {
    "name": "Felix Hahn",
    "display_name": "Felix Hahn",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3986,
    "paper_ids": [
      2341
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marc Fyrbiak",
    "display_name": "Marc Fyrbiak",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lifeline for fpga protection obfuscated cryptography for realworld security",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "on the design and misuse of microcoded embedded processors a cautionary note",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 3987,
    "paper_ids": [
      2341
    ],
    "papers_without_artifact_ids": [
      1481,
      5146
    ]
  },
  {
    "name": "Christof Paar",
    "display_name": "Christof Paar",
    "affiliation": "Max Planck Society",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "CHES": 3,
      "ACSAC": 1,
      "USENIXSEC": 3,
      "PETS": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2021": 2
      },
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2020": 2,
        "2021": 1
      },
      "PETS": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 12.5,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "spatialdomain wireless jamming with reconfigurable intelligent surfaces",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "evil from within machine learning backdoors through dormant hardware trojans",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "doppelganger obfuscation exploring thedefensive and offensive aspects of hardware camouflaging",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "lifeline for fpga protection obfuscated cryptography for realworld security",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "on the design and misuse of microcoded embedded processors a cautionary note",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "the unpatchable silicon a full break of the bitstream encryption of xilinx 7series fpgas",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "an exploratory study of hardware reverse engineering technical and cognitive processes",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 3988,
    "paper_ids": [
      2341
    ],
    "papers_without_artifact_ids": [
      3250,
      540,
      5147,
      1481,
      5146,
      2370,
      5148
    ]
  },
  {
    "name": "Tengfei Wang",
    "display_name": "Tengfei Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3989,
    "paper_ids": [
      4045
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chi Zhang 0061",
    "display_name": "Chi Zhang",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2021": 2,
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "trace copilot automatically locating cryptographic operations in sidechannel traces by firmware binary instrumenting",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "pay attention to raw traces a deep learning architecture for endtoend profiling attacks",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "crossdevice profiled sidechannel attack with unsupervised domain adaptation",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 3990,
    "paper_ids": [
      4045
    ],
    "papers_without_artifact_ids": [
      4047,
      4051,
      4052
    ]
  },
  {
    "name": "Xiaolin Zhang",
    "display_name": "Xiaolin Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3991,
    "paper_ids": [
      4045
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pei Cao 0002",
    "display_name": "Pei Cao",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2021": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pay attention to raw traces a deep learning architecture for endtoend profiling attacks",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "crossdevice profiled sidechannel attack with unsupervised domain adaptation",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 3992,
    "paper_ids": [
      4045
    ],
    "papers_without_artifact_ids": [
      4051,
      4052
    ]
  },
  {
    "name": "Yutian Chen",
    "display_name": "Yutian Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3993,
    "paper_ids": [
      4053
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu Dai",
    "display_name": "Yu Dai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3994,
    "paper_ids": [
      4053
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Elisabeth Krahmer",
    "display_name": "Elisabeth Krahmer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Correction Fault Attacks on Randomized CRYSTALS-Dilithium",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3995,
    "paper_ids": [
      1464
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peter Pessl",
    "display_name": "Peter Pessl",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 4,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 1,
        "2021": 1,
        "2023": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Correction Fault Attacks on Randomized CRYSTALS-Dilithium",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "belief propagation meets lattice reduction security estimates for errortolerant key recovery from decryption errors",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "higherorder masked ciphertext comparison for latticebased cryptography",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "fault attacks on ccasecure lattice kems",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 3996,
    "paper_ids": [
      1464
    ],
    "papers_without_artifact_ids": [
      5149,
      1802,
      5150
    ]
  },
  {
    "name": "Simon Tollec",
    "display_name": "Simon Tollec",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 3997,
    "paper_ids": [
      266
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vedad Hadzic",
    "display_name": "Vedad Hadzic",
    "affiliation": "Graz University of Technology",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "CHES": 4,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 3,
        "2025": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "efficient and composable masked aes sbox designs using optimized inverters",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "closing the gap leakage contracts for processors with transitions and glitches",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "quantile quantifying information leakage",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "coco codesign and coverification of masked software implementations on cpus",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 3998,
    "paper_ids": [
      266
    ],
    "papers_without_artifact_ids": [
      5151,
      5152,
      280,
      285
    ]
  },
  {
    "name": "Pascal Nasahl",
    "display_name": "Pascal Nasahl",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 1
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "synfi presilicon fault analysis of an opensource secure element",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "pointing in the right direction securing memory accesses in a faulty world",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 3999,
    "paper_ids": [
      266
    ],
    "papers_without_artifact_ids": [
      283,
      286
    ]
  },
  {
    "name": "Mihail Asavoae",
    "display_name": "Mihail Asavoae",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4000,
    "paper_ids": [
      266
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Roderick Bloem",
    "display_name": "Roderick Bloem",
    "affiliation": "Graz University of Technology",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "CHES": 4,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 3,
        "2025": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "efficient and composable masked aes sbox designs using optimized inverters",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "closing the gap leakage contracts for processors with transitions and glitches",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "quantile quantifying information leakage",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "coco codesign and coverification of masked software implementations on cpus",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4001,
    "paper_ids": [
      266
    ],
    "papers_without_artifact_ids": [
      5151,
      5152,
      280,
      285
    ]
  },
  {
    "name": "Damien Couroussé",
    "display_name": "Damien Couroussé",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8018,
    "paper_ids": [
      266
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mathieu Jan",
    "display_name": "Mathieu Jan",
    "affiliation": "CEA LIST, Gif-sur-Yvette, France",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4003,
    "paper_ids": [
      266
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Charles Momin",
    "display_name": "Charles Momin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "CHES": 5
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2021": 2,
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Compress: Generate Small and Fast Masked Pipelined Circuits",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "primitivelevel vs implementationlevel dpa security a certified case study pleading for standardized leakageresilient cryptography",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "primefield masking in hardware and its soundness against lownoise sca attacks",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "exploring cryptophysical dark matter and learning with physical rounding towards secure and efficient fresh rekeying",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "improved leakageresistant authenticated encryption based on hardware aes coprocessors",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4004,
    "paper_ids": [
      267
    ],
    "papers_without_artifact_ids": [
      2390,
      2376,
      2395,
      2397
    ]
  },
  {
    "name": "Rishub Nagpal",
    "display_name": "Rishub Nagpal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Compress: Generate Small and Fast Masked Pipelined Circuits",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "riding the waves towards generic singlecycle masking in hardware",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4005,
    "paper_ids": [
      267
    ],
    "papers_without_artifact_ids": [
      284
    ]
  },
  {
    "name": "Ziyu Wang",
    "display_name": "Ziyu Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4006,
    "paper_ids": [
      3106
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yaoling Ding",
    "display_name": "Yaoling Ding",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4007,
    "paper_ids": [
      3106
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "An Wang 0001",
    "display_name": "An Wang",
    "affiliation": "University of Kentucky",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4008,
    "paper_ids": [
      3106
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuwei Zhang",
    "display_name": "Yuwei Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4009,
    "paper_ids": [
      3106
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Congming Wei",
    "display_name": "Congming Wei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4010,
    "paper_ids": [
      3106
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shaofei Sun",
    "display_name": "Shaofei Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4011,
    "paper_ids": [
      3106
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vojtech Suchanek",
    "display_name": "Vojtech Suchanek",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ectester reverseengineering sidechannel countermeasures of ecc implementations",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 4012,
    "paper_ids": [
      3062
    ],
    "papers_without_artifact_ids": [
      3064
    ]
  },
  {
    "name": "Vladimir Sedlacek",
    "display_name": "Vladimir Sedlacek",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4013,
    "paper_ids": [
      3062
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fabien Klein",
    "display_name": "Fabien Klein",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fast and Clean: Auditable high-performance assembly via constraint solving",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4014,
    "paper_ids": [
      578
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Amund Askeland",
    "display_name": "Amund Askeland",
    "affiliation": "Nasjonal Sikkerhetsmyndighet",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Who Watches the Watchers: Attacking Glitch Detection Circuits",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4015,
    "paper_ids": [
      5153
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Svetla Nikova",
    "display_name": "Svetla Nikova",
    "affiliation": "KU Leuven",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Who Watches the Watchers: Attacking Glitch Detection Circuits",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "all you need is fault zerovalue attacks on aes and a new λdetection mm",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 4016,
    "paper_ids": [
      5153
    ],
    "papers_without_artifact_ids": [
      5154
    ]
  },
  {
    "name": "Ventzislav Nikov",
    "display_name": "Ventzislav Nikov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Who Watches the Watchers: Attacking Glitch Detection Circuits",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4017,
    "paper_ids": [
      5153
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arturo Mollinedo Garay",
    "display_name": "Arturo Mollinedo Garay",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Low Cost and Precise Jitter Measurement Method for TRNG Entropy Assessment",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4018,
    "paper_ids": [
      3109
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Patrick Haddad",
    "display_name": "Patrick Haddad",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Low Cost and Precise Jitter Measurement Method for TRNG Entropy Assessment",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4019,
    "paper_ids": [
      3109
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yufeng Tang",
    "display_name": "Yufeng Tang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2023": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "higherorder dca attacks on whitebox implementations with masking and shuffling countermeasures",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "revisiting the computation analysis against internal encodings in whitebox implementations",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 4020,
    "paper_ids": [
      4057
    ],
    "papers_without_artifact_ids": [
      5155,
      5156
    ]
  },
  {
    "name": "Zheng Gong",
    "display_name": "Zheng Gong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 3,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2023": 2
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rfid spatially controllable identification of uhf rfids via controlled magnetic fields",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "higherorder dca attacks on whitebox implementations with masking and shuffling countermeasures",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "revisiting the computation analysis against internal encodings in whitebox implementations",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 4021,
    "paper_ids": [
      4057
    ],
    "papers_without_artifact_ids": [
      5157,
      5155,
      5156
    ]
  },
  {
    "name": "Liangju Zhao",
    "display_name": "Liangju Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "revisiting the computation analysis against internal encodings in whitebox implementations",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 4022,
    "paper_ids": [
      4057
    ],
    "papers_without_artifact_ids": [
      5156
    ]
  },
  {
    "name": "Di Li",
    "display_name": "Di Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4023,
    "paper_ids": [
      4057
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kuheli Pratihar",
    "display_name": "Kuheli Pratihar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4024,
    "paper_ids": [
      2380
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Satota Mandal",
    "display_name": "Satota Mandal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4025,
    "paper_ids": [
      2380
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ulrich Rührmair",
    "display_name": "Ulrich Rührmair",
    "affiliation": "Ruhr University Bochum",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8019,
    "paper_ids": [
      2380
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Franz Klug",
    "display_name": "Franz Klug",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4027,
    "paper_ids": [
      268
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Florian Mendel",
    "display_name": "Florian Mendel",
    "affiliation": "Infineon Technologies AG, Munich, Germany",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4028,
    "paper_ids": [
      268
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Robert Primas",
    "display_name": "Robert Primas",
    "affiliation": "Graz University of Technology",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "CHES": 4,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 2,
        "2022": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "quantile quantifying information leakage",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "riding the waves towards generic singlecycle masking in hardware",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "chosen ciphertext ktrace attacks on masked cca2 secure kyber",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "coco codesign and coverification of masked software implementations on cpus",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4029,
    "paper_ids": [
      268
    ],
    "papers_without_artifact_ids": [
      280,
      284,
      5158,
      285
    ]
  },
  {
    "name": "Corentin Verhamme",
    "display_name": "Corentin Verhamme",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "primitivelevel vs implementationlevel dpa security a certified case study pleading for standardized leakageresilient cryptography",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "triplex an efficient and onepass leakageresistant mode of operation",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4030,
    "paper_ids": [
      2371
    ],
    "papers_without_artifact_ids": [
      2390,
      2377
    ]
  },
  {
    "name": "Kamil Kluczniak",
    "display_name": "Kamil Kluczniak",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improved Circuit Synthesis with Multi-Value Bootstrapping for FHEW-like Schemes",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fdfb full domain functional bootstrapping towards practical fully homomorphic encryption",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 4031,
    "paper_ids": [
      1465
    ],
    "papers_without_artifact_ids": [
      5159
    ]
  },
  {
    "name": "Basil Hess",
    "display_name": "Basil Hess",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4032,
    "paper_ids": [
      579
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Antonín Dufka",
    "display_name": "Antonín Dufka",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8020,
    "paper_ids": [
      3063
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Milan Broz",
    "display_name": "Milan Broz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4034,
    "paper_ids": [
      3063
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Roman Lacko",
    "display_name": "Roman Lacko",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4035,
    "paper_ids": [
      3063
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tomas Jaros",
    "display_name": "Tomas Jaros",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4036,
    "paper_ids": [
      3063
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Zatovic",
    "display_name": "Daniel Zatovic",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4037,
    "paper_ids": [
      3063
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Josef Pospisil",
    "display_name": "Josef Pospisil",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4038,
    "paper_ids": [
      3063
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Darius Mercadier",
    "display_name": "Darius Mercadier",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4039,
    "paper_ids": [
      5160
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Viet Sang Nguyen",
    "display_name": "Viet Sang Nguyen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4040,
    "paper_ids": [
      5160
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matthieu Rivain",
    "display_name": "Matthieu Rivain",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "CHES": 5
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 2,
        "2021": 1,
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "maskingfriendly postquantum signatures in the thresholdcomputationinthehead framework",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "optimized homomorphic evaluation of boolean functions",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "high order sidechannel security for ellipticcurve implementations",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "probing security through inputoutput separation and revisited quasilinear masking",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4041,
    "paper_ids": [
      5160
    ],
    "papers_without_artifact_ids": [
      5161,
      5162,
      5163,
      5164
    ]
  },
  {
    "name": "Aleksei Udovenko",
    "display_name": "Aleksei Udovenko",
    "affiliation": "University of Luxembourg",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 2,
        "2023": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "whitebox filtering attacks breaking sel masking from exponential to polynomial time",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "lpnbased attacks in the whitebox setting",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "cryptanalysis of arxbased whitebox implementations",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 4042,
    "paper_ids": [
      5160
    ],
    "papers_without_artifact_ids": [
      5165,
      5166,
      5167
    ]
  },
  {
    "name": "Licinius Benea",
    "display_name": "Licinius Benea",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Impact of the Flicker Noise on the Ring Oscillator-based TRNGs",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4043,
    "paper_ids": [
      3110
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mikael Carmona",
    "display_name": "Mikael Carmona",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Impact of the Flicker Noise on the Ring Oscillator-based TRNGs",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4044,
    "paper_ids": [
      3110
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Florian Pebay-Peyroula",
    "display_name": "Florian Pebay-Peyroula",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Impact of the Flicker Noise on the Ring Oscillator-based TRNGs",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4045,
    "paper_ids": [
      3110
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Romain Wacquez",
    "display_name": "Romain Wacquez",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Impact of the Flicker Noise on the Ring Oscillator-based TRNGs",
        "conference": "CHES",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4046,
    "paper_ids": [
      3110
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jeroen Delvaux",
    "display_name": "Jeroen Delvaux",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "breaking espressifs esp32 v3 program counter control with computed values using fault injection",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4047,
    "paper_ids": [
      5168
    ],
    "papers_without_artifact_ids": [
      5169
    ]
  },
  {
    "name": "Satyam Kumar 0002",
    "display_name": "Satyam Kumar",
    "affiliation": "Department of Mathematics, Indian Institute of Technology Madras, India",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4048,
    "paper_ids": [
      1482
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anubhab Baksi",
    "display_name": "Anubhab Baksi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "new quantum cryptanalysis of binary elliptic curves",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 4049,
    "paper_ids": [
      1482
    ],
    "papers_without_artifact_ids": [
      5170
    ]
  },
  {
    "name": "Santanu Sarkar 0001",
    "display_name": "Santanu Sarkar",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "new quantum cryptanalysis of binary elliptic curves",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 4050,
    "paper_ids": [
      1482
    ],
    "papers_without_artifact_ids": [
      5170
    ]
  },
  {
    "name": "Jakub Breier",
    "display_name": "Jakub Breier",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a finergrain analysis of the leakage non resilience of ocb",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4051,
    "paper_ids": [
      1482
    ],
    "papers_without_artifact_ids": [
      1492
    ]
  },
  {
    "name": "Xavier Bonnetain",
    "display_name": "Xavier Bonnetain",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Quantum Period Finding against Symmetric Primitives in Practice",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4052,
    "paper_ids": [
      5171
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Samuel Jaques",
    "display_name": "Samuel Jaques",
    "affiliation": "University of Oxford",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Quantum Period Finding against Symmetric Primitives in Practice",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4053,
    "paper_ids": [
      5171
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiun-Peng Chen",
    "display_name": "Jiun-Peng Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "masking floatingpoint number multiplication and addition of falcon first and higherorder implementations and evaluations",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 4054,
    "paper_ids": [
      428
    ],
    "papers_without_artifact_ids": [
      5172
    ]
  },
  {
    "name": "Yu-Jia Chen",
    "display_name": "Yu-Jia Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4055,
    "paper_ids": [
      428
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hadi Soleimany",
    "display_name": "Hadi Soleimany",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 3,
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 2,
        "2021": 1
      },
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Multiple Persistent Faults Analysis",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sipfa statistical ineffective persistent faults analysis on feistel ciphers",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "lowlatency keccak at any arbitrary order",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "evicttime attack on intel cpus without explicit knowledge of address offsets",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 4056,
    "paper_ids": [
      1483
    ],
    "papers_without_artifact_ids": [
      1493,
      2368,
      5173
    ]
  },
  {
    "name": "Nasour Bagheri",
    "display_name": "Nasour Bagheri",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 2
      },
      "SC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Multiple Persistent Faults Analysis",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sipfa statistical ineffective persistent faults analysis on feistel ciphers",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4057,
    "paper_ids": [
      1483
    ],
    "papers_without_artifact_ids": [
      1493
    ]
  },
  {
    "name": "Hosein Hadipour",
    "display_name": "Hosein Hadipour",
    "affiliation": "Graz University of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Multiple Persistent Faults Analysis",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4058,
    "paper_ids": [
      1483
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sara Mansouri",
    "display_name": "Sara Mansouri",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Multiple Persistent Faults Analysis",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4059,
    "paper_ids": [
      1483
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Santosh Ghosh",
    "display_name": "Santosh Ghosh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 2,
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2023": 1
      },
      "SOSP": {
        "2021": 1
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bipbip a lowlatency tweakable block cipher with small dimensions",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "logstructured protocols in delos",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "virtual consensus in delos",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 4060,
    "paper_ids": [
      1466
    ],
    "papers_without_artifact_ids": [
      5174,
      5175,
      5176
    ]
  },
  {
    "name": "Jens Trautmann 0001",
    "display_name": "Jens Trautmann",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4061,
    "paper_ids": [
      1788
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stefan Wildermann",
    "display_name": "Stefan Wildermann",
    "affiliation": "Friedrich Alexander University of Erlangen-Nuremberg, Erlangen, Germany",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 1,
      "SOSP": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      },
      "SOSP": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "to keep or not to keep the volatility of replacement policy metadata in hybrid caches",
        "conference": "SOSP",
        "year": 2024
      }
    ],
    "author_id": 4062,
    "paper_ids": [
      1788
    ],
    "papers_without_artifact_ids": [
      5177
    ]
  },
  {
    "name": "Jürgen Teich",
    "display_name": "Jürgen Teich",
    "affiliation": "University of Erlangen–Nuremberg",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 1,
      "SOSP": 1,
      "SC": 0,
      "EUROSYS": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      },
      "SOSP": {
        "2024": 1
      },
      "SC": {},
      "EUROSYS": {
        "2023": 1,
        "2022": 1
      },
      "ATC": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "to keep or not to keep the volatility of replacement policy metadata in hybrid caches",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "robust and tiny binary neural networks using gradientbased explainability methods",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "dyfip explainable aibased dynamic filter pruning of convolutional neural networks",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 8021,
    "paper_ids": [
      1788
    ],
    "papers_without_artifact_ids": [
      5177,
      5178,
      5179
    ]
  },
  {
    "name": "Rei Ueno",
    "display_name": "Rei Ueno",
    "affiliation": "Tohoku University",
    "artifact_count": 1,
    "total_papers": 10,
    "total_papers_by_conf": {
      "CHES": 9,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 4,
        "2025": 2,
        "2023": 2
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 10.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "perceived information revisited ii informationtheoretical analysis of deeplearning based sidechannel attacks",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "all you need is xorconvolution a generalized higherorder sidechannel attack with application to xexxebased encryptions",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "fallen sanctuary a higherorder and leakageresilient rekeying scheme",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "how secure is exponentblinded rsacrt with sliding window exponentiation",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "multiplevalued plaintextchecking sidechannel attacks on postquantum kems",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "scarf a lowlatency block cipher for secure cacherandomization",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "one truth prevails a deeplearning based singletrace power analysis on rsacrt with windowed exponentiation",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "bypassing isolated execution on riscv using sidechannelassisted faultinjection and its countermeasure",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "perceived information revisited new metrics to evaluate success rate of sidechannel attacks",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4064,
    "paper_ids": [
      5180
    ],
    "papers_without_artifact_ids": [
      5181,
      5182,
      5183,
      5184,
      5185,
      1475,
      5186,
      5187,
      5188
    ]
  },
  {
    "name": "Keita Xagawa",
    "display_name": "Keita Xagawa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "multiplevalued plaintextchecking sidechannel attacks on postquantum kems",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 4065,
    "paper_ids": [
      5180
    ],
    "papers_without_artifact_ids": [
      5185
    ]
  },
  {
    "name": "Yutaro Tanaka",
    "display_name": "Yutaro Tanaka",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "multiplevalued plaintextchecking sidechannel attacks on postquantum kems",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 4066,
    "paper_ids": [
      5180
    ],
    "papers_without_artifact_ids": [
      5185
    ]
  },
  {
    "name": "Akira Ito 0002",
    "display_name": "Akira Ito",
    "affiliation": "NTT Social Informatics Laboratories, Tokyo, Japan",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "CHES": 6
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 3,
        "2025": 2,
        "2023": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "perceived information revisited ii informationtheoretical analysis of deeplearning based sidechannel attacks",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "all you need is xorconvolution a generalized higherorder sidechannel attack with application to xexxebased encryptions",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "multiplevalued plaintextchecking sidechannel attacks on postquantum kems",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "one truth prevails a deeplearning based singletrace power analysis on rsacrt with windowed exponentiation",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "perceived information revisited new metrics to evaluate success rate of sidechannel attacks",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4067,
    "paper_ids": [
      5180
    ],
    "papers_without_artifact_ids": [
      5181,
      5182,
      5185,
      5186,
      5188
    ]
  },
  {
    "name": "Junko Takahashi",
    "display_name": "Junko Takahashi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "multiplevalued plaintextchecking sidechannel attacks on postquantum kems",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 4068,
    "paper_ids": [
      5180
    ],
    "papers_without_artifact_ids": [
      5185
    ]
  },
  {
    "name": "Naofumi Homma",
    "display_name": "Naofumi Homma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "CHES": 9
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 4,
        "2025": 2,
        "2023": 2
      }
    },
    "artifact_rate": 11.1,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "perceived information revisited ii informationtheoretical analysis of deeplearning based sidechannel attacks",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "all you need is xorconvolution a generalized higherorder sidechannel attack with application to xexxebased encryptions",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "fallen sanctuary a higherorder and leakageresilient rekeying scheme",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "how secure is exponentblinded rsacrt with sliding window exponentiation",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "multiplevalued plaintextchecking sidechannel attacks on postquantum kems",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "one truth prevails a deeplearning based singletrace power analysis on rsacrt with windowed exponentiation",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "bypassing isolated execution on riscv using sidechannelassisted faultinjection and its countermeasure",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "perceived information revisited new metrics to evaluate success rate of sidechannel attacks",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4069,
    "paper_ids": [
      5180
    ],
    "papers_without_artifact_ids": [
      5181,
      5182,
      5183,
      5184,
      5185,
      5186,
      5187,
      5188
    ]
  },
  {
    "name": "Wei Cheng 0003",
    "display_name": "Wei Cheng",
    "affiliation": "University of Massachusetts Boston",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 2,
        "2021": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On Efficient and Secure Code-based Masking: A Pragmatic Evaluation",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sidechannel expectationmaximization attacks",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "information leakages in codebased masking a unified quantification approach",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "revealing the weakness of addition chain based masked sbox implementations",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4070,
    "paper_ids": [
      3112
    ],
    "papers_without_artifact_ids": [
      5189,
      5190,
      5191
    ]
  },
  {
    "name": "Sylvain Guilley",
    "display_name": "Sylvain Guilley",
    "affiliation": "Tlcom Paris, Paris, France",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "CHES": 5,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 2,
        "2021": 2
      },
      "ACSAC": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On Efficient and Secure Code-based Masking: A Pragmatic Evaluation",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "quasilinear masking against sca and fia with cost amortization",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "sidechannel expectationmaximization attacks",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "structural attack and repair of diffusedinputblockedoutput whitebox cryptography",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "information leakages in codebased masking a unified quantification approach",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4071,
    "paper_ids": [
      3112
    ],
    "papers_without_artifact_ids": [
      5192,
      5189,
      5193,
      5190
    ]
  },
  {
    "name": "Wei Fu",
    "display_name": "Wei Fu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On Efficient and Secure Code-based Masking: A Pragmatic Evaluation",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4072,
    "paper_ids": [
      3112
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thales Bandiera Paiva",
    "display_name": "Thales Bandiera Paiva",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Faster Constant-Time Decoder for MDPC Codes and Applications to BIKE KEM",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4073,
    "paper_ids": [
      5194
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Routo Terada",
    "display_name": "Routo Terada",
    "affiliation": "USP",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Faster Constant-Time Decoder for MDPC Codes and Applications to BIKE KEM",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4074,
    "paper_ids": [
      5194
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martianus Frederic Ezerman",
    "display_name": "Martianus Frederic Ezerman",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Will You Cross the Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4075,
    "paper_ids": [
      1484
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jordi Ribes-González",
    "display_name": "Jordi Ribes-González",
    "affiliation": "Universitat Rovira i Virgili",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Security Model for Randomization-based Protected Caches",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8022,
    "paper_ids": [
      5195
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Oriol Farràs",
    "display_name": "Oriol Farràs",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Security Model for Randomization-based Protected Caches",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8023,
    "paper_ids": [
      5195
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Carles Hernández 0001",
    "display_name": "Carles Hernández",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Security Model for Randomization-based Protected Caches",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8024,
    "paper_ids": [
      5195
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vatistas Kostalabros",
    "display_name": "Vatistas Kostalabros",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Security Model for Randomization-based Protected Caches",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4079,
    "paper_ids": [
      5195
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Miquel Moretó",
    "display_name": "Miquel Moretó",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Security Model for Randomization-based Protected Caches",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8025,
    "paper_ids": [
      5195
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shang-Yi Yang",
    "display_name": "Shang-Yi Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4081,
    "paper_ids": [
      431
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kavya Sreedhar",
    "display_name": "Kavya Sreedhar",
    "affiliation": "Google",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Fast Large-Integer Extended GCD Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4082,
    "paper_ids": [
      5196
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mark Horowitz",
    "display_name": "Mark Horowitz",
    "affiliation": "Stanford University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1,
      "SOSP": 0,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      },
      "SOSP": {},
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Fast Large-Integer Extended GCD Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4083,
    "paper_ids": [
      5196
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christopher Torng",
    "display_name": "Christopher Torng",
    "affiliation": "University of Southern California",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Fast Large-Integer Extended GCD Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4084,
    "paper_ids": [
      5196
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haosong Zhao",
    "display_name": "Haosong Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improved Plantard Arithmetic for Lattice-based Cryptography",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4085,
    "paper_ids": [
      2337
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhe Liu 0001",
    "display_name": "Zhe Liu",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 3,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 2,
        "2025": 1
      },
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improved Plantard Arithmetic for Lattice-based Cryptography",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "velofhe gpu acceleration for fhew and tfhe bootstrapping",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "i can tell your secrets inferring privacy attributes from miniapp interaction history in superapps",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "singletrace sidechannel attacks on the toomcook the case study of saber",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4086,
    "paper_ids": [
      2337
    ],
    "papers_without_artifact_ids": [
      4044,
      4344,
      5197
    ]
  },
  {
    "name": "Clemens Hlauschek",
    "display_name": "Clemens Hlauschek",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4087,
    "paper_ids": [
      4068
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas Johansson 0001",
    "display_name": "Thomas Johansson",
    "affiliation": "Virginia Tech",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "CHES": 4,
      "ATC": 0,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 2,
        "2021": 1,
        "2023": 1
      },
      "ATC": {},
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "key recovery attacks on approximate homomorphic encryption with nonworstcase noise flooding countermeasures",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "cachetiming attack against hqc",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "a keyrecovery sidechannel attack on classic mceliece implementations",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "a sidechannel attack on a masked indcca secure saber kem implementation",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4088,
    "paper_ids": [
      4068
    ],
    "papers_without_artifact_ids": [
      4070,
      4071,
      4073,
      4074
    ]
  },
  {
    "name": "Norman Lahr",
    "display_name": "Norman Lahr",
    "affiliation": "Max Planck Institute for Security and Privacy",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "complete and improved fpga implementation of classic mceliece",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4089,
    "paper_ids": [
      4068
    ],
    "papers_without_artifact_ids": [
      3119
    ]
  },
  {
    "name": "Alexander Nilsson",
    "display_name": "Alexander Nilsson",
    "affiliation": "Advenica AB",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4090,
    "paper_ids": [
      4068
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marco Casagrande",
    "display_name": "Marco Casagrande",
    "affiliation": "KTH Royal Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem",
        "conference": "CHES",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4091,
    "paper_ids": [
      4
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ben Marshall",
    "display_name": "Ben Marshall",
    "affiliation": "PQShield",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2021": 2,
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The design of scalar AES Instruction Set Extensions for RISC-V",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "riscv instruction set extensions for lightweight symmetric cryptography",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "miracle microarchitectural leakage evaluation a study of microarchitectural power leakage across many devices",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "an instruction set extension to support softwarebased masking",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4092,
    "paper_ids": [
      5198
    ],
    "papers_without_artifact_ids": [
      5199,
      5200,
      5201
    ]
  },
  {
    "name": "G. Richard Newell",
    "display_name": "G. Richard Newell",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The design of scalar AES Instruction Set Extensions for RISC-V",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4093,
    "paper_ids": [
      5198
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dan Page",
    "display_name": "Dan Page",
    "affiliation": "University of Bristol",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2021": 2,
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The design of scalar AES Instruction Set Extensions for RISC-V",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "riscv instruction set extensions for lightweight symmetric cryptography",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "miracle microarchitectural leakage evaluation a study of microarchitectural power leakage across many devices",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "an instruction set extension to support softwarebased masking",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4094,
    "paper_ids": [
      5198
    ],
    "papers_without_artifact_ids": [
      5199,
      5200,
      5201
    ]
  },
  {
    "name": "Markku-Juhani O. Saarinen",
    "display_name": "Markku-Juhani O. Saarinen",
    "affiliation": "PQShield Ltd., Oxford, UK",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The design of scalar AES Instruction Set Extensions for RISC-V",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4095,
    "paper_ids": [
      5198
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Claire Wolf",
    "display_name": "Claire Wolf",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The design of scalar AES Instruction Set Extensions for RISC-V",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4096,
    "paper_ids": [
      5198
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abhrajit Sengupta",
    "display_name": "Abhrajit Sengupta",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Breaking CAS-Lock and Its Variants by Exploiting Structural Traces",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4097,
    "paper_ids": [
      3116
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nimisha Limaye",
    "display_name": "Nimisha Limaye",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Breaking CAS-Lock and Its Variants by Exploiting Structural Traces",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4098,
    "paper_ids": [
      3116
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Denisa O. C. Greconici",
    "display_name": "Denisa O. C. Greconici",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Compact Dilithium Implementations on Cortex-M3 and Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4099,
    "paper_ids": [
      580
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Amber Sprenkels",
    "display_name": "Amber Sprenkels",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Compact Dilithium Implementations on Cortex-M3 and Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4100,
    "paper_ids": [
      580
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Olivier Bronchain",
    "display_name": "Olivier Bronchain",
    "affiliation": "Catholic University of Louvain, Louvain-la-Neuve, Belgium",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "CHES": 8
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 2,
        "2021": 2,
        "2023": 3
      }
    },
    "artifact_rate": 12.5,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Security Order Does Not Matter",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploiting smallnorm polynomial multiplication with physical attacks application to crystalsdilithium",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "enabling frodokem on embedded devices",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "from mlwe to rlwe a differential fault attack on randomized deterministic dilithium",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "protecting dilithium against leakage revisited sensitivity analysis and improved implementations",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "bitslice masking and improved shuffling how and when to mix them in software",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "bitslicing arithmeticboolean masking conversions for fun and profit with application to latticebased kems",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "improved leakageresistant authenticated encryption based on hardware aes coprocessors",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4101,
    "paper_ids": [
      2388
    ],
    "papers_without_artifact_ids": [
      5202,
      5203,
      5204,
      2375,
      2393,
      2378,
      2397
    ]
  },
  {
    "name": "Thomas Peyrin",
    "display_name": "Thomas Peyrin",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "peek into the blackbox interpretable neural network using sat equations in sidechannel analysis",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "sha1 is a shambles first chosenprefix collision on sha1 and application to the pgp web of trust",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4102,
    "paper_ids": [
      4042
    ],
    "papers_without_artifact_ids": [
      1491,
      5205
    ]
  },
  {
    "name": "Markus Krausz",
    "display_name": "Markus Krausz",
    "affiliation": "Ruhr University Bochum",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Optimizing BIKE for the Intel Haswell and ARM Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "haetae shorter latticebased fiatshamir signatures",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 4103,
    "paper_ids": [
      2400
    ],
    "papers_without_artifact_ids": [
      1473
    ]
  },
  {
    "name": "Monika Trimoska",
    "display_name": "Monika Trimoska",
    "affiliation": "Eindhoven University of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Time-Memory Analysis of Parallel Collision Search Algorithms",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4104,
    "paper_ids": [
      5206
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sorina Ionica",
    "display_name": "Sorina Ionica",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Time-Memory Analysis of Parallel Collision Search Algorithms",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4105,
    "paper_ids": [
      5206
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gilles Dequen",
    "display_name": "Gilles Dequen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Time-Memory Analysis of Parallel Collision Search Algorithms",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4106,
    "paper_ids": [
      5206
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Diego F. Aranha",
    "display_name": "Diego F. Aranha",
    "affiliation": "Aarhus University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "CHES": 5
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 2,
        "2025": 3
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Side-Channel Protections for Picnic Signatures",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secure and efficient transciphering for fhebased mpc",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "optimized onedimensional sqisign verification on intel and cortexm4",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "abe cubed advanced benchmarking extensions for abe squared",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "revisiting the functional bootstrap in tfhe",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4107,
    "paper_ids": [
      1427
    ],
    "papers_without_artifact_ids": [
      5207,
      5208,
      1471,
      5209
    ]
  },
  {
    "name": "Okan Seker",
    "display_name": "Okan Seker",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 2,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Side-Channel Protections for Picnic Signatures",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "from mlwe to rlwe a differential fault attack on randomized deterministic dilithium",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "a whitebox masking scheme resisting computational and algebraic attacks",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4108,
    "paper_ids": [
      1427
    ],
    "papers_without_artifact_ids": [
      5204,
      1434
    ]
  },
  {
    "name": "Akira Takahashi 0002",
    "display_name": "Akira Takahashi",
    "affiliation": "J.P. Morgan",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Side-Channel Protections for Picnic Signatures",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4109,
    "paper_ids": [
      1427
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Greg Zaverucha",
    "display_name": "Greg Zaverucha",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Side-Channel Protections for Picnic Signatures",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4110,
    "paper_ids": [
      1427
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marc Gourjon",
    "display_name": "Marc Gourjon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "masking kyber first and higherorder implementations",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4111,
    "paper_ids": [
      2402
    ],
    "papers_without_artifact_ids": [
      5210
    ]
  },
  {
    "name": "Maximilian Orlt",
    "display_name": "Maximilian Orlt",
    "affiliation": "Technische Universität Darmstadt",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2021": 1,
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "allyoucancompute packed secret sharing for combined resilience",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "polynomial sharings on two secrets buy one get one free",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "provable secure parallel gadgets",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 4112,
    "paper_ids": [
      2402
    ],
    "papers_without_artifact_ids": [
      5211,
      1433,
      5212
    ]
  },
  {
    "name": "Clara Paglialonga",
    "display_name": "Clara Paglialonga",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4113,
    "paper_ids": [
      2402
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lars Porth",
    "display_name": "Lars Porth",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4114,
    "paper_ids": [
      2402
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fatih Balli",
    "display_name": "Fatih Balli",
    "affiliation": "EFPL, Lausanne, Switzerland",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4115,
    "paper_ids": [
      5213
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrea Caforio",
    "display_name": "Andrea Caforio",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2021": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aether an ultrahigh throughput and low energy authenticated encryption scheme",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "gleeok a family of lowlatency prfs and its applications to authenticated encryption",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 4116,
    "paper_ids": [
      5213
    ],
    "papers_without_artifact_ids": [
      5214,
      5215
    ]
  },
  {
    "name": "Subhadeep Banik",
    "display_name": "Subhadeep Banik",
    "affiliation": "Universita della Svizzera Italiana, Lugano, Switzerland",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 2,
        "2021": 1,
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aether an ultrahigh throughput and low energy authenticated encryption scheme",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "gleeok a family of lowlatency prfs and its applications to authenticated encryption",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "compact circuits for efficient möbius transform",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 4117,
    "paper_ids": [
      5213
    ],
    "papers_without_artifact_ids": [
      5214,
      5215,
      5216
    ]
  },
  {
    "name": "Jan Van den Herrewegen",
    "display_name": "Jan Van den Herrewegen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cutting through the complexity of reverse engineering embedded devices",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4118,
    "paper_ids": [
      3086
    ],
    "papers_without_artifact_ids": [
      5217
    ]
  },
  {
    "name": "Flavio D. Garcia",
    "display_name": "Flavio D. Garcia",
    "affiliation": "University of Birmingham",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "CHES": 2,
      "ACSAC": 1,
      "USENIXSEC": 1,
      "WOOT": 0,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 2
      },
      "ACSAC": {
        "2017": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "WOOT": {},
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "watching your call breaking volte privacy in lte5g networks",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "cutting through the complexity of reverse engineering embedded devices",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "voltpillager hardwarebased fault injection attacks against intel sgx enclaves using the svid voltage scaling interface",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "spinner semiautomatic detection of pinning without hostname verification",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 4119,
    "paper_ids": [
      3086
    ],
    "papers_without_artifact_ids": [
      5218,
      5217,
      3089,
      5219
    ]
  },
  {
    "name": "Qais Temeiza",
    "display_name": "Qais Temeiza",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4120,
    "paper_ids": [
      3086
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pedro Branco 0005",
    "display_name": "Pedro Branco",
    "affiliation": "IST-Universidade de Lisboa, Department of Mathematics, Lisbon, Portugal",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ROTed: Random Oblivious Transfer for embedded devices",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4121,
    "paper_ids": [
      5220
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Luís Fiolhais",
    "display_name": "Luís Fiolhais",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ROTed: Random Oblivious Transfer for embedded devices",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8026,
    "paper_ids": [
      5220
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Manuel Goulão",
    "display_name": "Manuel Goulão",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ROTed: Random Oblivious Transfer for embedded devices",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "accelerating ntt with riscv vector extension for fully homomorphic encryption",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 8027,
    "paper_ids": [
      5220
    ],
    "papers_without_artifact_ids": [
      5221
    ]
  },
  {
    "name": "Paulo Martins 0002",
    "display_name": "Paulo Martins",
    "affiliation": "University of Lisbon",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ROTed: Random Oblivious Transfer for embedded devices",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4124,
    "paper_ids": [
      5220
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Paulo Mateus",
    "display_name": "Paulo Mateus",
    "affiliation": "Universidade de Lisboa",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ROTed: Random Oblivious Transfer for embedded devices",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4125,
    "paper_ids": [
      5220
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leonel Sousa",
    "display_name": "Leonel Sousa",
    "affiliation": "Universidade de Lisboa",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1,
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ROTed: Random Oblivious Transfer for embedded devices",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "accelerating ntt with riscv vector extension for fully homomorphic encryption",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 4126,
    "paper_ids": [
      5220
    ],
    "papers_without_artifact_ids": [
      5221
    ]
  },
  {
    "name": "Dean Yun-Li Cheng",
    "display_name": "Dean Yun-Li Cheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4127,
    "paper_ids": [
      434
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hülya Evkan",
    "display_name": "Hülya Evkan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8028,
    "paper_ids": [
      434
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leo Wei-Lun Huang",
    "display_name": "Leo Wei-Lun Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4129,
    "paper_ids": [
      434
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ching-Lin Trista Li",
    "display_name": "Ching-Lin Trista Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4130,
    "paper_ids": [
      434
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ruben Niederhagen",
    "display_name": "Ruben Niederhagen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2021": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "complete and improved fpga implementation of classic mceliece",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4131,
    "paper_ids": [
      434
    ],
    "papers_without_artifact_ids": [
      3119
    ]
  },
  {
    "name": "Julian Wälde",
    "display_name": "Julian Wälde",
    "affiliation": "Fraunhofer SIT",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8029,
    "paper_ids": [
      434
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gustavo Banegas",
    "display_name": "Gustavo Banegas",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CTIDH: faster constant-time CSIDH",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "concrete quantum cryptanalysis of binary elliptic curves",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4133,
    "paper_ids": [
      1806
    ],
    "papers_without_artifact_ids": [
      1809
    ]
  },
  {
    "name": "Benjamin Smith 0003",
    "display_name": "Benjamin Smith",
    "affiliation": "cole Polytechnique, Paris, France",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CTIDH: faster constant-time CSIDH",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4134,
    "paper_ids": [
      1806
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jana Sotáková",
    "display_name": "Jana Sotáková",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CTIDH: faster constant-time CSIDH",
        "conference": "CHES",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8030,
    "paper_ids": [
      1806
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chun-Ming Chiu",
    "display_name": "Chun-Ming Chiu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a new trick for polynomial multiplication a verified crt polymul utilizing a monomial factor",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 4136,
    "paper_ids": [
      435
    ],
    "papers_without_artifact_ids": [
      438
    ]
  },
  {
    "name": "Andreas Hellenbrand",
    "display_name": "Andreas Hellenbrand",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "dCTIDH: Fast & Deterministic CTIDH",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4137,
    "paper_ids": [
      2398
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Krijn Reijnders",
    "display_name": "Krijn Reijnders",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "dCTIDH: Fast & Deterministic CTIDH",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "optimized onedimensional sqisign verification on intel and cortexm4",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 4138,
    "paper_ids": [
      2398
    ],
    "papers_without_artifact_ids": [
      5208
    ]
  },
  {
    "name": "YoungBeom Kim",
    "display_name": "YoungBeom Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Multiplying Polynomials without Powerful Multiplication Instructions",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4139,
    "paper_ids": [
      1223
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seog Chung Seo",
    "display_name": "Seog Chung Seo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Multiplying Polynomials without Powerful Multiplication Instructions",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4140,
    "paper_ids": [
      1223
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nathan Rousselot",
    "display_name": "Nathan Rousselot",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scoop: An Optimization Algorithm for Profiling Attacks against Higher-Order Masking",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4141,
    "paper_ids": [
      4055
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Loïc Masure",
    "display_name": "Loïc Masure",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "CHES": 5
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 2,
        "2023": 3
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scoop: An Optimization Algorithm for Profiling Attacks against Higher-Order Masking",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the average random probing model",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "primefield masking in hardware and its soundness against lownoise sca attacks",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "information bounds and convergence rates for sidechannel security evaluators",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "dont learn what you already know schemeaware modeling for profiling sidechannel analysis against masking",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 8031,
    "paper_ids": [
      4055
    ],
    "papers_without_artifact_ids": [
      5222,
      2376,
      2374,
      2392
    ]
  },
  {
    "name": "Vincent Migairou",
    "display_name": "Vincent Migairou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scoop: An Optimization Algorithm for Profiling Attacks against Higher-Order Masking",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4143,
    "paper_ids": [
      4055
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muhammad ElSheikh",
    "display_name": "Muhammad ElSheikh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Accelerating EdDSA Signature Verification with Faster Scalar Size Halving",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4144,
    "paper_ids": [
      5223
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Irem Keskinkurt Paksoy",
    "display_name": "Irem Keskinkurt Paksoy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Accelerating EdDSA Signature Verification with Faster Scalar Size Halving",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4145,
    "paper_ids": [
      5223
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Murat Cenk",
    "display_name": "Murat Cenk",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Accelerating EdDSA Signature Verification with Faster Scalar Size Halving",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4146,
    "paper_ids": [
      5223
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "M. Anwar Hasan",
    "display_name": "M. Anwar Hasan",
    "affiliation": "IUPUI",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1,
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Accelerating EdDSA Signature Verification with Faster Scalar Size Halving",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vectorized and parallel computation of large smoothdegree isogenies using precedenceconstrained scheduling",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 4147,
    "paper_ids": [
      5223
    ],
    "papers_without_artifact_ids": [
      5224
    ]
  },
  {
    "name": "Tee Kiah Chia",
    "display_name": "Tee Kiah Chia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "KyberSlash: Exploiting secret-dependent division timings in Kyber implementations",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4148,
    "paper_ids": [
      581
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Franziskus Kiefer",
    "display_name": "Franziskus Kiefer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "KyberSlash: Exploiting secret-dependent division timings in Kyber implementations",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "formal verification of the pqxdh postquantum key agreement protocol for endtoend secure messaging",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4149,
    "paper_ids": [
      581
    ],
    "papers_without_artifact_ids": [
      2522
    ]
  },
  {
    "name": "Goutam Tamvada",
    "display_name": "Goutam Tamvada",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "KyberSlash: Exploiting secret-dependent division timings in Kyber implementations",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4150,
    "paper_ids": [
      581
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marcos A. Simplício Jr.",
    "display_name": "Marcos A. Simplício Jr.",
    "affiliation": "University of Sao Paulo",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "faster amortized bootstrapping using the incomplete ntt for free",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 8032,
    "paper_ids": [
      4078
    ],
    "papers_without_artifact_ids": [
      4079
    ]
  },
  {
    "name": "Bahattin Yildiz",
    "display_name": "Bahattin Yildiz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "faster amortized bootstrapping using the incomplete ntt for free",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 4152,
    "paper_ids": [
      4078
    ],
    "papers_without_artifact_ids": [
      4079
    ]
  },
  {
    "name": "Eduardo Lopes Cominetti",
    "display_name": "Eduardo Lopes Cominetti",
    "affiliation": "Universidade de São Paulo",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4153,
    "paper_ids": [
      4078
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Henrique S. Ogawa",
    "display_name": "Henrique S. Ogawa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4154,
    "paper_ids": [
      4078
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Santiago Arranz-Olmos",
    "display_name": "Santiago Arranz-Olmos",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Let's DOIT: Using Intel's Extended HW/SW Contract for Secure Compilation of Crypto Code",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "highassurance zeroization",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 4155,
    "paper_ids": [
      1810
    ],
    "papers_without_artifact_ids": [
      1814
    ]
  },
  {
    "name": "Ottó Hanyecz",
    "display_name": "Ottó Hanyecz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Constant time lattice reduction in dimension 4 with application to SQIsign",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8033,
    "paper_ids": [
      5225
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexander Karenin",
    "display_name": "Alexander Karenin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Constant time lattice reduction in dimension 4 with application to SQIsign",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4157,
    "paper_ids": [
      5225
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Elena Kirshanova",
    "display_name": "Elena Kirshanova",
    "affiliation": "Technology Innovation Institute",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Constant time lattice reduction in dimension 4 with application to SQIsign",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4158,
    "paper_ids": [
      5225
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Péter Kutas",
    "display_name": "Péter Kutas",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Constant time lattice reduction in dimension 4 with application to SQIsign",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8034,
    "paper_ids": [
      5225
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sina Schaeffler",
    "display_name": "Sina Schaeffler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Constant time lattice reduction in dimension 4 with application to SQIsign",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4160,
    "paper_ids": [
      5225
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rui Jiang",
    "display_name": "Rui Jiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploring user perceptions of security auditing in the web3 ecosystem",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 4161,
    "paper_ids": [
      4054
    ],
    "papers_without_artifact_ids": [
      5226
    ]
  },
  {
    "name": "Rongmao Chen",
    "display_name": "Rongmao Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4162,
    "paper_ids": [
      4054
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aric Fowler",
    "display_name": "Aric Fowler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4163,
    "paper_ids": [
      5227
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohammed Shayan",
    "display_name": "Mohammed Shayan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "functeller how well does efpga hide functionality",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4164,
    "paper_ids": [
      5227
    ],
    "papers_without_artifact_ids": [
      5228
    ]
  },
  {
    "name": "Mustafa M. Shihab",
    "display_name": "Mustafa M. Shihab",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 1,
      "USENIXSEC": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "functeller how well does efpga hide functionality",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4165,
    "paper_ids": [
      5227
    ],
    "papers_without_artifact_ids": [
      5228
    ]
  },
  {
    "name": "Thomas Broadfoot",
    "display_name": "Thomas Broadfoot",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4166,
    "paper_ids": [
      5227
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peter Beerel",
    "display_name": "Peter Beerel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4167,
    "paper_ids": [
      5227
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Carl Sechen",
    "display_name": "Carl Sechen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4168,
    "paper_ids": [
      5227
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yiorgos Makris",
    "display_name": "Yiorgos Makris",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "functeller how well does efpga hide functionality",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4169,
    "paper_ids": [
      5227
    ],
    "papers_without_artifact_ids": [
      5228
    ]
  },
  {
    "name": "Mohammad Eslami",
    "display_name": "Mohammad Eslami",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4170,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peng Zou",
    "display_name": "Peng Zou",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4171,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Min Wei",
    "display_name": "Min Wei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 1,
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      },
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mining of highutility patterns in big iot databases",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 4172,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": [
      5229
    ]
  },
  {
    "name": "Xingyu Tong 0001",
    "display_name": "Xingyu Tong",
    "affiliation": "Fudan University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4173,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Binggang Qiu",
    "display_name": "Binggang Qiu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4174,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhijie Cai",
    "display_name": "Zhijie Cai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4175,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guohao Chen 0001",
    "display_name": "Guohao Chen",
    "affiliation": "IIIT Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4176,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benchao Zhu",
    "display_name": "Benchao Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4177,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiawei Li",
    "display_name": "Jiawei Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 1,
      "USENIXSEC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "uictx understanding ui behaviors with code contexts for mobile applications",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "provguard detecting sdn control policy manipulation via contextual semantics of provenance graphs",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "uihash detecting similar android uis through gridbased visual appearance representation",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4178,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": [
      2795,
      2796,
      2797
    ]
  },
  {
    "name": "Jun Yu 0010",
    "display_name": "Jun Yu",
    "affiliation": "CUHK (SZ)",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4179,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianli Chen",
    "display_name": "Jianli Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4180,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chun-Wei Chiu",
    "display_name": "Chun-Wei Chiu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4181,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Min-Feng Hsieh",
    "display_name": "Min-Feng Hsieh",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4182,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chia-Hsiu Ou",
    "display_name": "Chia-Hsiu Ou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4183,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ting-Chi Wang",
    "display_name": "Ting-Chi Wang",
    "affiliation": "National Tsing Hua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4184,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bangqi Fu",
    "display_name": "Bangqi Fu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4185,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qijing Wang",
    "display_name": "Qijing Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4186,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yang Sun",
    "display_name": "Yang Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4187,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qin Luo",
    "display_name": "Qin Luo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4188,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anthony W. H. Lau",
    "display_name": "Anthony W. H. Lau",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4189,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fangzhou Wang",
    "display_name": "Fangzhou Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4190,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Evangeline F. Y. Young",
    "display_name": "Evangeline F. Y. Young",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4191,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shunyang Bi",
    "display_name": "Shunyang Bi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4192,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guangxin Guo",
    "display_name": "Guangxin Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4193,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhengguang Tang",
    "display_name": "Zhengguang Tang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4194,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hailong You",
    "display_name": "Hailong You",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4195,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cong Li",
    "display_name": "Cong Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4196,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Samuel Pagliarini",
    "display_name": "Samuel Pagliarini",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4197,
    "paper_ids": [
      3117
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Najwa Aaraj",
    "display_name": "Najwa Aaraj",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4198,
    "paper_ids": [
      1467
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abdelrahaman Aly",
    "display_name": "Abdelrahaman Aly",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4199,
    "paper_ids": [
      1467
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chiara Marcolla",
    "display_name": "Chiara Marcolla",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4200,
    "paper_ids": [
      1467
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rogerio Paludo",
    "display_name": "Rogerio Paludo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4201,
    "paper_ids": [
      1467
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Iván Santos-González",
    "display_name": "Iván Santos-González",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8035,
    "paper_ids": [
      1467
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mireia Scholz",
    "display_name": "Mireia Scholz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4203,
    "paper_ids": [
      1467
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eduardo Soria-Vazquez",
    "display_name": "Eduardo Soria-Vazquez",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4204,
    "paper_ids": [
      1467
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Victor Sucasas",
    "display_name": "Victor Sucasas",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4205,
    "paper_ids": [
      1467
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vlad-Florin Dragoi",
    "display_name": "Vlad-Florin Dragoi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4206,
    "paper_ids": [
      5230
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Brice Colombier",
    "display_name": "Brice Colombier",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "switching off your device does not protect against fault attacks",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 4207,
    "paper_ids": [
      5230
    ],
    "papers_without_artifact_ids": [
      5231
    ]
  },
  {
    "name": "Nicolas Vallet",
    "display_name": "Nicolas Vallet",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4208,
    "paper_ids": [
      5230
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pierre-Louis Cayrel",
    "display_name": "Pierre-Louis Cayrel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4209,
    "paper_ids": [
      5230
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vincent Grosso",
    "display_name": "Vincent Grosso",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "switching off your device does not protect against fault attacks",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "bitslice masking and improved shuffling how and when to mix them in software",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4210,
    "paper_ids": [
      5230
    ],
    "papers_without_artifact_ids": [
      5231,
      2393
    ]
  },
  {
    "name": "Aurélien Hernandez",
    "display_name": "Aurélien Hernandez",
    "affiliation": "EURECOM",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8036,
    "paper_ids": [
      2953
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuxing Yan",
    "display_name": "Yuxing Yan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4212,
    "paper_ids": [
      2338
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sana Boussam",
    "display_name": "Sana Boussam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Optimal Dimensionality Reduction using Conditional Variational AutoEncoder",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4213,
    "paper_ids": [
      5232
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mathieu Carbone",
    "display_name": "Mathieu Carbone",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Optimal Dimensionality Reduction using Conditional Variational AutoEncoder",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "conditional variational autoencoder based on stochastic attacks",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 4214,
    "paper_ids": [
      5232
    ],
    "papers_without_artifact_ids": [
      5233
    ]
  },
  {
    "name": "Benoît Gérard",
    "display_name": "Benoît Gérard",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Optimal Dimensionality Reduction using Conditional Variational AutoEncoder",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8037,
    "paper_ids": [
      5232
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guénaël Renault",
    "display_name": "Guénaël Renault",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Optimal Dimensionality Reduction using Conditional Variational AutoEncoder",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8038,
    "paper_ids": [
      5232
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gabriel Zaid",
    "display_name": "Gabriel Zaid",
    "affiliation": "Thales ITSEF, Toulouse, France",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 2,
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Optimal Dimensionality Reduction using Conditional Variational AutoEncoder",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "conditional variational autoencoder based on stochastic attacks",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "ranking loss maximizing the success rate in deep learning sidechannel analysis",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "efficiency through diversity in ensemble models applied to sidechannel attacks a case study on publickey algorithms",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4217,
    "paper_ids": [
      5232
    ],
    "papers_without_artifact_ids": [
      5233,
      5234,
      5235
    ]
  },
  {
    "name": "Daphné Trama",
    "display_name": "Daphné Trama",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a General-Purpose 8-bit (T)FHE Processor Abstraction",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8039,
    "paper_ids": [
      4081
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pierre-Emmanuel Clet",
    "display_name": "Pierre-Emmanuel Clet",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a General-Purpose 8-bit (T)FHE Processor Abstraction",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4219,
    "paper_ids": [
      4081
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nicolas Ye",
    "display_name": "Nicolas Ye",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a General-Purpose 8-bit (T)FHE Processor Abstraction",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4220,
    "paper_ids": [
      4081
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anup Kumar Kundu",
    "display_name": "Anup Kumar Kundu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4221,
    "paper_ids": [
      5236
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shibam Ghosh",
    "display_name": "Shibam Ghosh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4222,
    "paper_ids": [
      5236
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aikata Aikata",
    "display_name": "Aikata Aikata",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reed chipletbased accelerator for fully homomorphic encryption",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 4223,
    "paper_ids": [
      5236
    ],
    "papers_without_artifact_ids": [
      4065
    ]
  },
  {
    "name": "Dhiman Saha",
    "display_name": "Dhiman Saha",
    "affiliation": "IIT Bhilai",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4224,
    "paper_ids": [
      5236
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jennifer Jackson",
    "display_name": "Jennifer Jackson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CHERI-Crypt: Transparent Memory Encryption on Capability Architectures",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4225,
    "paper_ids": [
      3087
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minmin Jiang",
    "display_name": "Minmin Jiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CHERI-Crypt: Transparent Memory Encryption on Capability Architectures",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4226,
    "paper_ids": [
      3087
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Loris Bergerat",
    "display_name": "Loris Bergerat",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sharing the mask tfhe bootstrapping on packed messages",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 4227,
    "paper_ids": [
      5237
    ],
    "papers_without_artifact_ids": [
      5238
    ]
  },
  {
    "name": "Ilaria Chillotti",
    "display_name": "Ilaria Chillotti",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sanns scaling up secure approximate knearest neighbors search",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4228,
    "paper_ids": [
      5237
    ],
    "papers_without_artifact_ids": [
      5239
    ]
  },
  {
    "name": "Damien Ligier",
    "display_name": "Damien Ligier",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      },
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "illuminating the dark or how to recover what should not be seen in febased classifiers",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 4229,
    "paper_ids": [
      5237
    ],
    "papers_without_artifact_ids": [
      4083
    ]
  },
  {
    "name": "Jean-Baptiste Orfila",
    "display_name": "Jean-Baptiste Orfila",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sharing the mask tfhe bootstrapping on packed messages",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 4230,
    "paper_ids": [
      5237
    ],
    "papers_without_artifact_ids": [
      5238
    ]
  },
  {
    "name": "Samuel Tap",
    "display_name": "Samuel Tap",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sharing the mask tfhe bootstrapping on packed messages",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 4231,
    "paper_ids": [
      5237
    ],
    "papers_without_artifact_ids": [
      5238
    ]
  },
  {
    "name": "Jonas Sander",
    "display_name": "Jonas Sander",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4232,
    "paper_ids": [
      1428
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ida Bruhns",
    "display_name": "Ida Bruhns",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4233,
    "paper_ids": [
      1428
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eric Chun-Yu Peng",
    "display_name": "Eric Chun-Yu Peng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Adaptive Template Attacks on the Kyber Binomial Sampler",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4234,
    "paper_ids": [
      5240
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Markus G. Kuhn",
    "display_name": "Markus G. Kuhn",
    "affiliation": "University of Cambridge",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2,
      "USENIXSEC": 0,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1,
        "2023": 1
      },
      "USENIXSEC": {},
      "PETS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Adaptive Template Attacks on the Kyber Binomial Sampler",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "low tracecount template attacks on 32bit implementations of ascon aead",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 4235,
    "paper_ids": [
      5240
    ],
    "papers_without_artifact_ids": [
      5241
    ]
  },
  {
    "name": "Davide Galli",
    "display_name": "Davide Galli",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chameleon: A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4236,
    "paper_ids": [
      5242
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Giuseppe Chiari",
    "display_name": "Giuseppe Chiari",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chameleon: A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4237,
    "paper_ids": [
      5242
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Davide Zoni",
    "display_name": "Davide Zoni",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chameleon: A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4238,
    "paper_ids": [
      5242
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ziheng Ma",
    "display_name": "Ziheng Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Characterization of Phase Noise for the Robust and Resilient PLL-TRNG Design",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4239,
    "paper_ids": [
      3098
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenping Zhu",
    "display_name": "Wenping Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "CHES": 6
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2022": 1,
        "2025": 4
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Characterization of Phase Noise for the Robust and Resilient PLL-TRNG Design",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a highperformance nttmsm accelerator for zeroknowledge proof using loadbalanced fullypipelined montgomery multiplier",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "falconsign an efficient and highthroughput hardware architecture for falcon signature generation",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "entropy extractor based highthroughput postprocessings for true random number generators",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "breaking ground a new area record for lowlatency firstorder masked sha3 advancing from the 4x area era to the 3x area era",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "a compact and highperformance hardware architecture for crystalsdilithium",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4240,
    "paper_ids": [
      3098
    ],
    "papers_without_artifact_ids": [
      3100,
      3101,
      1794,
      3102,
      3105
    ]
  },
  {
    "name": "Hanning Wang",
    "display_name": "Hanning Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "CHES": 5
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2025": 4
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Characterization of Phase Noise for the Robust and Resilient PLL-TRNG Design",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a highperformance nttmsm accelerator for zeroknowledge proof using loadbalanced fullypipelined montgomery multiplier",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "falconsign an efficient and highthroughput hardware architecture for falcon signature generation",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "entropy extractor based highthroughput postprocessings for true random number generators",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "a compact and highperformance hardware architecture for crystalsdilithium",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4241,
    "paper_ids": [
      3098
    ],
    "papers_without_artifact_ids": [
      3100,
      3101,
      1794,
      3105
    ]
  },
  {
    "name": "Yi Ouyang",
    "display_name": "Yi Ouyang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Characterization of Phase Noise for the Robust and Resilient PLL-TRNG Design",
        "conference": "CHES",
        "year": 2025,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "falconsign an efficient and highthroughput hardware architecture for falcon signature generation",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 4242,
    "paper_ids": [
      3098
    ],
    "papers_without_artifact_ids": [
      3101
    ]
  },
  {
    "name": "Gautam Botrel",
    "display_name": "Gautam Botrel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Faster Montgomery multiplication and Multi-Scalar-Multiplication for SNARKs",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4243,
    "paper_ids": [
      5243
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Youssef El Housni",
    "display_name": "Youssef El Housni",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Faster Montgomery multiplication and Multi-Scalar-Multiplication for SNARKs",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4244,
    "paper_ids": [
      5243
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexandre Berzati",
    "display_name": "Alexandre Berzati",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4245,
    "paper_ids": [
      5244
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andersson Calle Viera",
    "display_name": "Andersson Calle Viera",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4246,
    "paper_ids": [
      5244
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maya Chartouny",
    "display_name": "Maya Chartouny",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4247,
    "paper_ids": [
      5244
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Steven Madec",
    "display_name": "Steven Madec",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4248,
    "paper_ids": [
      5244
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Damien Vergnaud",
    "display_name": "Damien Vergnaud",
    "affiliation": "Ecole Normale Superieure",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "probing security through inputoutput separation and revisited quasilinear masking",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4249,
    "paper_ids": [
      5244
    ],
    "papers_without_artifact_ids": [
      5164
    ]
  },
  {
    "name": "David Vigilant",
    "display_name": "David Vigilant",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4250,
    "paper_ids": [
      5244
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anju Alexander",
    "display_name": "Anju Alexander",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Faster Third-Order Masking of Lookup Tables",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4251,
    "paper_ids": [
      4076
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Henri Devillez",
    "display_name": "Henri Devillez",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations Towards Analytical Attacks against 32-bit Implementations",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4252,
    "paper_ids": [
      2372
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Balazs Udvarhelyi",
    "display_name": "Balazs Udvarhelyi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations Towards Analytical Attacks against 32-bit Implementations",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a finergrain analysis of the leakage non resilience of ocb",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4253,
    "paper_ids": [
      2372
    ],
    "papers_without_artifact_ids": [
      1492
    ]
  },
  {
    "name": "Aymeric Genêt",
    "display_name": "Aymeric Genêt",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On Protecting SPHINCS+ Against Fault Attacks",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sike channels zerovalue sidechannel attacks on sike",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 8040,
    "paper_ids": [
      5245
    ],
    "papers_without_artifact_ids": [
      5246
    ]
  },
  {
    "name": "Matteo Dell'Amico",
    "display_name": "Matteo Dell'Amico",
    "affiliation": "University of Genoa",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 1,
      "ACSAC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      },
      "ACSAC": {
        "2017": 2,
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the tangled genealogy of iot malware",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "smoke detector crossproduct intrusion detection with weak indicators",
        "conference": "ACSAC",
        "year": 2017
      },
      {
        "title": "lean on me mining internet service dependencies from largescale dns data",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 4255,
    "paper_ids": [
      1815
    ],
    "papers_without_artifact_ids": [
      4342,
      5247,
      5103
    ]
  },
  {
    "name": "Quentin Dallison",
    "display_name": "Quentin Dallison",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Enhancing Quality and Security of the PLL-TRNG",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4256,
    "paper_ids": [
      3111
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maciej Skórski",
    "display_name": "Maciej Skórski",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Enhancing Quality and Security of the PLL-TRNG",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8041,
    "paper_ids": [
      3111
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shubhi Shukla 0001",
    "display_name": "Shubhi Shukla",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"Whispering MLaaS\" Exploiting Timing Channels to Compromise User Privacy in Deep Neural Networks",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4258,
    "paper_ids": [
      2381
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Manaar Alam",
    "display_name": "Manaar Alam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"Whispering MLaaS\" Exploiting Timing Channels to Compromise User Privacy in Deep Neural Networks",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rassle return address stack based sidechannel leakage",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4259,
    "paper_ids": [
      2381
    ],
    "papers_without_artifact_ids": [
      2387
    ]
  },
  {
    "name": "Sarani Bhattacharya",
    "display_name": "Sarani Bhattacharya",
    "affiliation": "IIT Kharagpur",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"Whispering MLaaS\" Exploiting Timing Channels to Compromise User Privacy in Deep Neural Networks",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "systematic evaluation of randomized cache designs against cache occupancy",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "rassle return address stack based sidechannel leakage",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4260,
    "paper_ids": [
      2381
    ],
    "papers_without_artifact_ids": [
      2384,
      2387
    ]
  },
  {
    "name": "Pabitra Mitra",
    "display_name": "Pabitra Mitra",
    "affiliation": "IIT Kharagpur",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"Whispering MLaaS\" Exploiting Timing Channels to Compromise User Privacy in Deep Neural Networks",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4261,
    "paper_ids": [
      2381
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Spielmann",
    "display_name": "David Spielmann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4262,
    "paper_ids": [
      5248
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ognjen Glamocanin",
    "display_name": "Ognjen Glamocanin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4263,
    "paper_ids": [
      5248
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mirjana Stojilovic",
    "display_name": "Mirjana Stojilovic",
    "affiliation": "EPFL",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4264,
    "paper_ids": [
      5248
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lejla Batina",
    "display_name": "Lejla Batina",
    "affiliation": "Radboud University",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "CHES": 5,
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2021": 1,
        "2025": 2,
        "2023": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: SCA-secure ECC in software - mission impossible?",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "probing secure composability without fresh randomness theory and application to ascon",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "a53 make or break a massively parallel fpga architecture for exhaustive key search",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "barracuda edge gpus do leak dnn weights",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "an algebraic approach for evaluating random probing security with application to aes",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "sok neural network extraction through physical side channels",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "keep it unsupervised horizontal attacks meet deep learning",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4265,
    "paper_ids": [
      1811
    ],
    "papers_without_artifact_ids": [
      5249,
      5250,
      1524,
      5251,
      5252,
      3024
    ]
  },
  {
    "name": "Björn Haase",
    "display_name": "Björn Haase",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: SCA-secure ECC in software - mission impossible?",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8042,
    "paper_ids": [
      1811
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Niels Samwel",
    "display_name": "Niels Samwel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: SCA-secure ECC in software - mission impossible?",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4267,
    "paper_ids": [
      1811
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jannik Zeitschner",
    "display_name": "Jannik Zeitschner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PROLEAD_SW Probing-Based Software Leakage Detection for ARM Binaries",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pommes prevention of microarchitectural leakages in masked embedded software",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 4268,
    "paper_ids": [
      2344
    ],
    "papers_without_artifact_ids": [
      2350
    ]
  },
  {
    "name": "Shih-Hao Hung",
    "display_name": "Shih-Hao Hung",
    "affiliation": "National Taiwan University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1,
        "2023": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Oil and Vinegar: Modern Parameters and Implementations",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gpu acceleration for fhewtfhe bootstrapping",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "optimizing encrypted neural networks model design quantization and finetuning using fhewtfhe",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 4269,
    "paper_ids": [
      436
    ],
    "papers_without_artifact_ids": [
      5253,
      5254
    ]
  },
  {
    "name": "Bo-Yuan Peng",
    "display_name": "Bo-Yuan Peng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Oil and Vinegar: Modern Parameters and Implementations",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4270,
    "paper_ids": [
      436
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas Aulbach",
    "display_name": "Thomas Aulbach",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Separating Oil and Vinegar with a Single Trace Side-Channel Assisted Kipnis-Shamir Attack on UOV",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4271,
    "paper_ids": [
      2399
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simona Samardjiska",
    "display_name": "Simona Samardjiska",
    "affiliation": "Radboud University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2021": 1,
        "2023": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Separating Oil and Vinegar with a Single Trace Side-Channel Assisted Kipnis-Shamir Attack on UOV",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "belief propagation meets lattice reduction security estimates for errortolerant key recovery from decryption errors",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "chosen ciphertext ktrace attacks on masked cca2 secure kyber",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 4272,
    "paper_ids": [
      2399
    ],
    "papers_without_artifact_ids": [
      5149,
      5158
    ]
  },
  {
    "name": "Marc Stöttinger",
    "display_name": "Marc Stöttinger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Separating Oil and Vinegar with a Single Trace Side-Channel Assisted Kipnis-Shamir Attack on UOV",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8043,
    "paper_ids": [
      2399
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christoph Dobraunig",
    "display_name": "Christoph Dobraunig",
    "affiliation": "Intel Labs, Hillsboro, USA",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pasta: A Case for Hybrid Homomorphic Encryption",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bipbip a lowlatency tweakable block cipher with small dimensions",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 4274,
    "paper_ids": [
      4084
    ],
    "papers_without_artifact_ids": [
      5174
    ]
  },
  {
    "name": "Lorenzo Grassi 0001",
    "display_name": "Lorenzo Grassi",
    "affiliation": "Univ. of Modena and Reggio Emilia",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 3,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 2,
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pasta: A Case for Hybrid Homomorphic Encryption",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "midpsquare leveraging the strong sidechannel security of primefield masking in software",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "skyscraper fast hashing on big primes",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "poseidon a new hash function for zeroknowledge proof systems",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4275,
    "paper_ids": [
      4084
    ],
    "papers_without_artifact_ids": [
      2389,
      4086,
      4089
    ]
  },
  {
    "name": "Markus Schofnegger",
    "display_name": "Markus Schofnegger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2025": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pasta: A Case for Hybrid Homomorphic Encryption",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "skyscraper fast hashing on big primes",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "poseidon a new hash function for zeroknowledge proof systems",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4276,
    "paper_ids": [
      4084
    ],
    "papers_without_artifact_ids": [
      4086,
      4089
    ]
  },
  {
    "name": "Yaacov Belenky",
    "display_name": "Yaacov Belenky",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "redundancy aes masking basis for attack mitigation rambam",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4277,
    "paper_ids": [
      5255
    ],
    "papers_without_artifact_ids": [
      5256
    ]
  },
  {
    "name": "Ira Dushar",
    "display_name": "Ira Dushar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "redundancy aes masking basis for attack mitigation rambam",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4278,
    "paper_ids": [
      5255
    ],
    "papers_without_artifact_ids": [
      5256
    ]
  },
  {
    "name": "Valery Teper",
    "display_name": "Valery Teper",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "redundancy aes masking basis for attack mitigation rambam",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4279,
    "paper_ids": [
      5255
    ],
    "papers_without_artifact_ids": [
      5256
    ]
  },
  {
    "name": "Vadim Bugaenko",
    "display_name": "Vadim Bugaenko",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "redundancy aes masking basis for attack mitigation rambam",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4280,
    "paper_ids": [
      5255
    ],
    "papers_without_artifact_ids": [
      5256
    ]
  },
  {
    "name": "Oleg Karavaev",
    "display_name": "Oleg Karavaev",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "redundancy aes masking basis for attack mitigation rambam",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4281,
    "paper_ids": [
      5255
    ],
    "papers_without_artifact_ids": [
      5256
    ]
  },
  {
    "name": "Leonid Azriel",
    "display_name": "Leonid Azriel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "redundancy aes masking basis for attack mitigation rambam",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4282,
    "paper_ids": [
      5255
    ],
    "papers_without_artifact_ids": [
      5256
    ]
  },
  {
    "name": "Yury Kreimer",
    "display_name": "Yury Kreimer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "redundancy aes masking basis for attack mitigation rambam",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 4283,
    "paper_ids": [
      5255
    ],
    "papers_without_artifact_ids": [
      5256
    ]
  },
  {
    "name": "Shuqin Su",
    "display_name": "Shuqin Su",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Closer Look at the Chaotic Ring Oscillators based TRNG Design",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4284,
    "paper_ids": [
      3099
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vladimir Rozic",
    "display_name": "Vladimir Rozic",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Closer Look at the Chaotic Ring Oscillators based TRNG Design",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4285,
    "paper_ids": [
      3099
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingyuan Yang",
    "display_name": "Mingyuan Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Closer Look at the Chaotic Ring Oscillators based TRNG Design",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4286,
    "paper_ids": [
      3099
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aikata",
    "display_name": "Aikata",
    "affiliation": "Graz University of Technology",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2023": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "modhe modular homomorphic encryption using module lattices potentials and limitations",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "medha microcoded hardware accelerator for computing on encrypted data",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 4287,
    "paper_ids": [
      2373
    ],
    "papers_without_artifact_ids": [
      4066,
      4067
    ]
  },
  {
    "name": "Andrea Basso 0002",
    "display_name": "Andrea Basso",
    "affiliation": "University of Bristol",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4288,
    "paper_ids": [
      2373
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ahmet Can Mert",
    "display_name": "Ahmet Can Mert",
    "affiliation": "Graz University of Technology",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "CHES": 4
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2025": 1,
        "2023": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reed chipletbased accelerator for fully homomorphic encryption",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "modhe modular homomorphic encryption using module lattices potentials and limitations",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "medha microcoded hardware accelerator for computing on encrypted data",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 4289,
    "paper_ids": [
      2373
    ],
    "papers_without_artifact_ids": [
      4065,
      4066,
      4067
    ]
  },
  {
    "name": "José Bacelar Almeida",
    "display_name": "José Bacelar Almeida",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Formally verifying Kyber Episode IV: Implementation correctness",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8044,
    "paper_ids": [
      1812
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Manuel Barbosa",
    "display_name": "Manuel Barbosa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 1,
      "USENIXSEC": 0,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      },
      "USENIXSEC": {},
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Formally verifying Kyber Episode IV: Implementation correctness",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacy and security of fido2 revisited",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 4291,
    "paper_ids": [
      1812
    ],
    "papers_without_artifact_ids": [
      5257
    ]
  },
  {
    "name": "Jean-Christophe Léchenet",
    "display_name": "Jean-Christophe Léchenet",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Formally verifying Kyber Episode IV: Implementation correctness",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "highassurance zeroization",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 8045,
    "paper_ids": [
      1812
    ],
    "papers_without_artifact_ids": [
      1814
    ]
  },
  {
    "name": "Hugo Pacheco 0001",
    "display_name": "Hugo Pacheco",
    "affiliation": "Boğaziçi University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Formally verifying Kyber Episode IV: Implementation correctness",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4293,
    "paper_ids": [
      1812
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Antoine Séré",
    "display_name": "Antoine Séré",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Formally verifying Kyber Episode IV: Implementation correctness",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8046,
    "paper_ids": [
      1812
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pierre-Yves Strub",
    "display_name": "Pierre-Yves Strub",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "CHES"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Formally verifying Kyber Episode IV: Implementation correctness",
        "conference": "CHES",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4295,
    "paper_ids": [
      1812
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joe Loughry",
    "display_name": "Joe Loughry",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Basilisk: Remote Code Execution by Laser Excitation of P-N Junctions Without Insider Assistance",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4296,
    "paper_ids": [
      4090
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Elias Valentin Boschung",
    "display_name": "Elias Valentin Boschung",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Exploiting Android's Hardened Memory Allocator",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4297,
    "paper_ids": [
      5
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Victor Goeman",
    "display_name": "Victor Goeman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Reverse Engineering the Eufy Ecosystem: A Deep Dive into Security Vulnerabilities and Proprietary Protocols",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4298,
    "paper_ids": [
      5258
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dairo de Ruck",
    "display_name": "Dairo de Ruck",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Reverse Engineering the Eufy Ecosystem: A Deep Dive into Security Vulnerabilities and Proprietary Protocols",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4299,
    "paper_ids": [
      5258
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tom Cordemans",
    "display_name": "Tom Cordemans",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Reverse Engineering the Eufy Ecosystem: A Deep Dive into Security Vulnerabilities and Proprietary Protocols",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4300,
    "paper_ids": [
      5258
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jorn Lapon",
    "display_name": "Jorn Lapon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Reverse Engineering the Eufy Ecosystem: A Deep Dive into Security Vulnerabilities and Proprietary Protocols",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4301,
    "paper_ids": [
      5258
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vincent Naessens",
    "display_name": "Vincent Naessens",
    "affiliation": "KU Leuven",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "ACSAC": 0,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "ACSAC": {},
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Reverse Engineering the Eufy Ecosystem: A Deep Dive into Security Vulnerabilities and Proprietary Protocols",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4302,
    "paper_ids": [
      5258
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Olivia Gruza",
    "display_name": "Olivia Gruza",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4303,
    "paper_ids": [
      4092
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Elias Heftrig",
    "display_name": "Elias Heftrig",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "downgrading dnssec how to exploit crypto agility for hijacking signed zones",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4304,
    "paper_ids": [
      4092
    ],
    "papers_without_artifact_ids": [
      4099
    ]
  },
  {
    "name": "Oliver Jacobsen",
    "display_name": "Oliver Jacobsen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4305,
    "paper_ids": [
      4092
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Niklas Vogel",
    "display_name": "Niklas Vogel",
    "affiliation": "Goethe University Frankfurt, Frankfurt am Main, Germany",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the cure to vulnerabilities in rpki validation",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "keep your friends close but your routeservers closer insights into rpki validation in the internet",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4306,
    "paper_ids": [
      4092
    ],
    "papers_without_artifact_ids": [
      4096,
      4098
    ]
  },
  {
    "name": "Michael Waidner",
    "display_name": "Michael Waidner",
    "affiliation": "TU Darmstadt",
    "artifact_count": 1,
    "total_papers": 11,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 7,
      "NSDI": 3,
      "PETS": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2022": 2,
        "2025": 1,
        "2021": 1
      },
      "NSDI": {
        "2017": 1,
        "2024": 1,
        "2025": 1
      },
      "PETS": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 9.1,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "validator domain validation over tor",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "sok an introspective analysis of rpki security",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "the cure to vulnerabilities in rpki validation",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "cloudy with a chance of cyberattacks dangling resources abuse on cloud platforms",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "keep your friends close but your routeservers closer insights into rpki validation in the internet",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "downgrading dnssec how to exploit crypto agility for hijacking signed zones",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "stalloris rpki downgrade attack",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "xdri attacks and how to enhance resilience of residential routers",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "the hijackers guide to the galaxy offpath taking over internet resources",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "one key to sign them all considered vulnerable evaluation of dnssec in the internet",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 4307,
    "paper_ids": [
      4092
    ],
    "papers_without_artifact_ids": [
      4094,
      4095,
      4096,
      4097,
      4098,
      4099,
      4100,
      4101,
      4103,
      4105
    ]
  },
  {
    "name": "Muhammad Haris Rais",
    "display_name": "Muhammad Haris Rais",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "WOOT": 1,
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SOK: 3D Printer Firmware Attacks on Fused Filament Fabrication",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "biosafe bioprinting security framework for detecting sabotage attacks on printability and cell viability",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 4308,
    "paper_ids": [
      4106
    ],
    "papers_without_artifact_ids": [
      4108
    ]
  },
  {
    "name": "Muhammad Ahsan",
    "display_name": "Muhammad Ahsan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "WOOT": 1,
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SOK: 3D Printer Firmware Attacks on Fused Filament Fabrication",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "biosafe bioprinting security framework for detecting sabotage attacks on printability and cell viability",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 4309,
    "paper_ids": [
      4106
    ],
    "papers_without_artifact_ids": [
      4108
    ]
  },
  {
    "name": "Xi Tan 0002",
    "display_name": "Xi Tan",
    "affiliation": "UCCS",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Where's the \"up\"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4310,
    "paper_ids": [
      167
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zheyuan Ma",
    "display_name": "Zheyuan Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Where's the \"up\"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4311,
    "paper_ids": [
      167
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sandro Pinto 0001",
    "display_name": "Sandro Pinto",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "WOOT": 1,
      "CHES": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "CHES": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Where's the \"up\"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tree bridging the gap between reconfigurable computing and secure execution",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "rezone disarming trustzone with tee privilege reduction",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4312,
    "paper_ids": [
      167
    ],
    "papers_without_artifact_ids": [
      5259,
      5260
    ]
  },
  {
    "name": "Pietro Liguori",
    "display_name": "Pietro Liguori",
    "affiliation": "University of Naples Federico II",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Power of Words: Generating PowerShell Attacks from Natural Language",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4313,
    "paper_ids": [
      5261
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christian Marescalco",
    "display_name": "Christian Marescalco",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Power of Words: Generating PowerShell Attacks from Natural Language",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4314,
    "paper_ids": [
      5261
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Roberto Natella",
    "display_name": "Roberto Natella",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Power of Words: Generating PowerShell Attacks from Natural Language",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4315,
    "paper_ids": [
      5261
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vittorio Orbinato",
    "display_name": "Vittorio Orbinato",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Power of Words: Generating PowerShell Attacks from Natural Language",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4316,
    "paper_ids": [
      5261
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Luciano Pianese",
    "display_name": "Luciano Pianese",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Power of Words: Generating PowerShell Attacks from Natural Language",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4317,
    "paper_ids": [
      5261
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Prakhar Sah",
    "display_name": "Prakhar Sah",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RIPencapsulation: Defeating IP Encapsulation on TI MSP Devices",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4318,
    "paper_ids": [
      2233
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonathan Brossard",
    "display_name": "Jonathan Brossard",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Introduction to Procedural Debugging through Binary Libification",
        "conference": "WOOT",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4319,
    "paper_ids": [
      5262
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kun Wang 0025",
    "display_name": "Kun Wang",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4320,
    "paper_ids": [
      297
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiangyu Xu 0001",
    "display_name": "Xiangyu Xu",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "devil in the room triggering audio backdoors in the physical world",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4321,
    "paper_ids": [
      297
    ],
    "papers_without_artifact_ids": [
      314
    ]
  },
  {
    "name": "Li Lu 0008",
    "display_name": "Li Lu",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "micguard a comprehensive detection system against outofband injection attacks for different level microphonebased devices",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "devil in the room triggering audio backdoors in the physical world",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4322,
    "paper_ids": [
      297
    ],
    "papers_without_artifact_ids": [
      315,
      314
    ]
  },
  {
    "name": "Feng Lin 0004",
    "display_name": "Feng Lin",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 4
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "micguard a comprehensive detection system against outofband injection attacks for different level microphonebased devices",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "vibspeech exploring practical wideband eavesdropping via bandlimited signal of vibrationbased side channel",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "devil in the room triggering audio backdoors in the physical world",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4323,
    "paper_ids": [
      297
    ],
    "papers_without_artifact_ids": [
      315,
      317,
      314
    ]
  },
  {
    "name": "Samir Jordan Menon",
    "display_name": "Samir Jordan Menon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "YPIR: High-Throughput Single-Server PIR with Silent Preprocessing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4324,
    "paper_ids": [
      4109
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pedro Bernardo",
    "display_name": "Pedro Bernardo",
    "affiliation": "TU Wien",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Web Platform Threats: Automated Detection of Web Security Issues With WPT",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4325,
    "paper_ids": [
      2406
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Valentino Dalla Valle",
    "display_name": "Valentino Dalla Valle",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Web Platform Threats: Automated Detection of Web Security Issues With WPT",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4326,
    "paper_ids": [
      2406
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eric Jedermann",
    "display_name": "Eric Jedermann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4327,
    "paper_ids": [
      1758
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jens B. Schmitt",
    "display_name": "Jens B. Schmitt",
    "affiliation": "TU Kaiserslautern",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4328,
    "paper_ids": [
      1758
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chenxin Sun",
    "display_name": "Chenxin Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Invisibility Cloak: Proactive Defense Against Visual Game Cheating",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automatic library fuzzing through api relation evolvement",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 4329,
    "paper_ids": [
      2820
    ],
    "papers_without_artifact_ids": [
      2821
    ]
  },
  {
    "name": "Liangcai Su",
    "display_name": "Liangcai Su",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Invisibility Cloak: Proactive Defense Against Visual Game Cheating",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4330,
    "paper_ids": [
      2820
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiayi Zhang",
    "display_name": "Jiayi Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Invisibility Cloak: Proactive Defense Against Visual Game Cheating",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4331,
    "paper_ids": [
      2820
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexander J. Gaidis",
    "display_name": "Alexander J. Gaidis",
    "affiliation": "Brown University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BeeBox: Hardening BPF against Transient Execution Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4332,
    "paper_ids": [
      4112
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pranav Dahiya",
    "display_name": "Pranav Dahiya",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4333,
    "paper_ids": [
      4114
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ilia Shumailov",
    "display_name": "Ilia Shumailov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1,
        "2022": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gradients look alike sensitivity is often overestimated in dpsgd",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "tubes among us analog attack on automatic speaker identification",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "on the necessity of auditable algorithmic definitions for machine unlearning",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "towards more robust keyword spotting for voice assistants",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4334,
    "paper_ids": [
      4114
    ],
    "papers_without_artifact_ids": [
      5263,
      3392,
      5264,
      3395
    ]
  },
  {
    "name": "Fengrun Liu",
    "display_name": "Fengrun Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4335,
    "paper_ids": [
      4116
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiang Xie",
    "display_name": "Xiang Xie",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lightweight authentication of web data via garblethenprove",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "mystique efficient conversions for zeroknowledge proofs with applications to machine learning",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4336,
    "paper_ids": [
      4116
    ],
    "papers_without_artifact_ids": [
      3231,
      3233
    ]
  },
  {
    "name": "Gelei Deng",
    "display_name": "Gelei Deng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 0,
      "FAST": 1,
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "ACSAC": {},
      "FAST": {
        "2025": 1
      },
      "PETS": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "maat analyzing and optimizing overcharge on blockchain storage",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "mission impossible imagebased geolocation with large vision language models",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "masterkey automated jailbreaking of large language model chatbots",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "nautilus automated restful api vulnerability detection",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4337,
    "paper_ids": [
      733
    ],
    "papers_without_artifact_ids": [
      775,
      736,
      739,
      745
    ]
  },
  {
    "name": "Yi Liu 0069",
    "display_name": "Yi Liu",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "PETS": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mission impossible imagebased geolocation with large vision language models",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "masterkey automated jailbreaking of large language model chatbots",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "nautilus automated restful api vulnerability detection",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4338,
    "paper_ids": [
      733
    ],
    "papers_without_artifact_ids": [
      736,
      739,
      745
    ]
  },
  {
    "name": "Víctor Mayoral Vilches",
    "display_name": "Víctor Mayoral Vilches",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8047,
    "paper_ids": [
      733
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peng Liu",
    "display_name": "Peng Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {},
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4340,
    "paper_ids": [
      733
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuan Xu",
    "display_name": "Yuan Xu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "SOSP": {},
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4341,
    "paper_ids": [
      733
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Pinzger 0001",
    "display_name": "Martin Pinzger",
    "affiliation": "University of Klagenfurt",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4342,
    "paper_ids": [
      733
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stefan Rass",
    "display_name": "Stefan Rass",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4343,
    "paper_ids": [
      733
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haojie He",
    "display_name": "Haojie He",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4344,
    "paper_ids": [
      4121
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ziang Weng",
    "display_name": "Ziang Weng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4345,
    "paper_ids": [
      4121
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ruijie Zhao 0001",
    "display_name": "Ruijie Zhao",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vulnerabilityoriented testing for restful apis",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4346,
    "paper_ids": [
      4121
    ],
    "papers_without_artifact_ids": [
      5265
    ]
  },
  {
    "name": "Shuitao Gan",
    "display_name": "Shuitao Gan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "eagleye exposing hidden web interfaces in iot devices via routing analysis",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "greyone data flow sensitive fuzzing",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4347,
    "paper_ids": [
      4121
    ],
    "papers_without_artifact_ids": [
      1888,
      1900
    ]
  },
  {
    "name": "Libo Chen 0001",
    "display_name": "Libo Chen",
    "affiliation": "University of Melbourne",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vulnerabilityoriented testing for restful apis",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "sharing more and checking less leveraging common input keywords to detect bugs in embedded systems",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4348,
    "paper_ids": [
      4121
    ],
    "papers_without_artifact_ids": [
      5265,
      919
    ]
  },
  {
    "name": "Yuede Ji",
    "display_name": "Yuede Ji",
    "affiliation": "University of Texas at Arlington",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "SC": 0,
      "EUROSYS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2021": 1
      },
      "SC": {},
      "EUROSYS": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bingo radixbased bias factorization for random walk on dynamic graphs",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "cloudcover enforcement of multihop network connections in microservice deployments",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "definit an analysis of exposed android init routines",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4349,
    "paper_ids": [
      4121
    ],
    "papers_without_artifact_ids": [
      3587,
      5266,
      5025
    ]
  },
  {
    "name": "Jiashui Wang",
    "display_name": "Jiashui Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "apicraft fuzz driver generation for closedsource sdk libraries",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4350,
    "paper_ids": [
      4121
    ],
    "papers_without_artifact_ids": [
      3130
    ]
  },
  {
    "name": "Zhi Xue",
    "display_name": "Zhi Xue",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ATC": 0,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2021": 1
      },
      "ATC": {},
      "ACSAC": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vulnerabilityoriented testing for restful apis",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "sharing more and checking less leveraging common input keywords to detect bugs in embedded systems",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4351,
    "paper_ids": [
      4121
    ],
    "papers_without_artifact_ids": [
      5265,
      919
    ]
  },
  {
    "name": "Tianrou Xia",
    "display_name": "Tianrou Xia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type Analysis",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4352,
    "paper_ids": [
      4123
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dinghao Wu",
    "display_name": "Dinghao Wu",
    "affiliation": "Pennsylvania State University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type Analysis",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "µfuzz redesign of parallel fuzzing using microservice architecture",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4353,
    "paper_ids": [
      4123
    ],
    "papers_without_artifact_ids": [
      1416
    ]
  },
  {
    "name": "Qifan Zhang 0002",
    "display_name": "Qifan Zhang",
    "affiliation": "Palo Alto Networks, Santa Clara, CA, USA",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the maginot line attacking the boundary of dns caching protection",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "play the imitation game model extraction attack against autonomous driving localization",
        "conference": "ACSAC",
        "year": 2022
      }
    ],
    "author_id": 4354,
    "paper_ids": [
      544
    ],
    "papers_without_artifact_ids": [
      569,
      3055
    ]
  },
  {
    "name": "Xuesong Bai",
    "display_name": "Xuesong Bai",
    "affiliation": "University of California, Irvine",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4355,
    "paper_ids": [
      544
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiang Li 0108",
    "display_name": "Xiang Li",
    "affiliation": "Nankai University",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 2
      },
      "NDSS": {
        "2024": 3
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reqsminer automated discovery of cdn forwarding request inconsistencies and dos attacks with grammarbased fuzzing",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "understanding the implementation and security implications of protective dns services",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "breakspf how shared infrastructures magnify spf vulnerabilities across the internet",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "rethinking the security threats of stale dns glue records",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "the maginot line attacking the boundary of dns caching protection",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "temporal cdnconvex lens a cdnassisted practical pulsing ddos attack",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4356,
    "paper_ids": [
      544
    ],
    "papers_without_artifact_ids": [
      908,
      909,
      910,
      912,
      569,
      916
    ]
  },
  {
    "name": "Jiajun Xin",
    "display_name": "Jiajun Xin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4357,
    "paper_ids": [
      2414
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arman Haghighi",
    "display_name": "Arman Haghighi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4358,
    "paper_ids": [
      2414
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiangan Tian",
    "display_name": "Xiangan Tian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4359,
    "paper_ids": [
      2414
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yibo Wang 0006",
    "display_name": "Yibo Wang",
    "affiliation": "Syracuse University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4360,
    "paper_ids": [
      5267
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuzhe Tang",
    "display_name": "Yuzhe Tang",
    "affiliation": "Syracuse University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4361,
    "paper_ids": [
      5267
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kai Li 0017",
    "display_name": "Kai Li",
    "affiliation": "Stevens Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4362,
    "paper_ids": [
      5267
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wanning Ding",
    "display_name": "Wanning Ding",
    "affiliation": "Syracuse University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4363,
    "paper_ids": [
      5267
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhihua Yang",
    "display_name": "Zhihua Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4364,
    "paper_ids": [
      5267
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Md. Ishtiaq Ashiq",
    "display_name": "Md. Ishtiaq Ashiq",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SPF Beyond the Standard: Management and Operational Challenges in Practice and Practical Recommendations",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "youve got report measurement and security implications of dmarc reporting",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "under the hood of dane mismanagement in smtp",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4365,
    "paper_ids": [
      2157
    ],
    "papers_without_artifact_ids": [
      2161,
      2162
    ]
  },
  {
    "name": "Weitong Li",
    "display_name": "Weitong Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SPF Beyond the Standard: Management and Operational Challenges in Practice and Practical Recommendations",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improv measurement and practical mitigation of collateral damage in rpki route origin validation",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "irredicator pruning irr with rpkivalid bgp insights",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "youve got report measurement and security implications of dmarc reporting",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4366,
    "paper_ids": [
      2157
    ],
    "papers_without_artifact_ids": [
      2159,
      2160,
      2161
    ]
  },
  {
    "name": "Mohammad Hammas Saeed",
    "display_name": "Mohammad Hammas Saeed",
    "affiliation": "George Washington University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Contextual Soft Moderation on Social Media through Contrastive Textual Deviation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4367,
    "paper_ids": [
      2421
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rebecca Auger",
    "display_name": "Rebecca Auger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Contextual Soft Moderation on Social Media through Contrastive Textual Deviation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4368,
    "paper_ids": [
      2421
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chris Wells",
    "display_name": "Chris Wells",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Contextual Soft Moderation on Social Media through Contrastive Textual Deviation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4369,
    "paper_ids": [
      2421
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hao Nie",
    "display_name": "Hao Nie",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Query Recovery from Easy to Hard: Jigsaw Attack against SSE",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flowcheck decoupling checkpointing and training of largescale models",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 4370,
    "paper_ids": [
      2287
    ],
    "papers_without_artifact_ids": [
      5268
    ]
  },
  {
    "name": "Xianglong Zhang",
    "display_name": "Xianglong Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Query Recovery from Easy to Hard: Jigsaw Attack against SSE",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "high recovery with fewer injections practical binary volumetric injection attacks against dynamic searchable encryption",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4371,
    "paper_ids": [
      2287
    ],
    "papers_without_artifact_ids": [
      2289
    ]
  },
  {
    "name": "Chengfeng Ye",
    "display_name": "Chengfeng Ye",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "When Threads Meet Interrupts: Effective Static Detection of Interrupt-Based Deadlocks in Linux",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "place your locks well understanding and detecting lock misuse bugs",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4372,
    "paper_ids": [
      3874
    ],
    "papers_without_artifact_ids": [
      3877
    ]
  },
  {
    "name": "Yuandao Cai",
    "display_name": "Yuandao Cai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "When Threads Meet Interrupts: Effective Static Detection of Interrupt-Based Deadlocks in Linux",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unleashing the power of typebased call graph construction by using regional pointer information",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "place your locks well understanding and detecting lock misuse bugs",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4373,
    "paper_ids": [
      3874
    ],
    "papers_without_artifact_ids": [
      3876,
      3877
    ]
  },
  {
    "name": "Giacomo Longo",
    "display_name": "Giacomo Longo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS)",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4374,
    "paper_ids": [
      1759
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Enrico Russo 0001",
    "display_name": "Enrico Russo",
    "affiliation": "University of Genoa",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS)",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4375,
    "paper_ids": [
      1759
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Boru Chen",
    "display_name": "Boru Chen",
    "affiliation": "University of California, Berkeley",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4376,
    "paper_ids": [
      1497
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pradyumna Shome",
    "display_name": "Pradyumna Shome",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4377,
    "paper_ids": [
      1497
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jannik Dreier",
    "display_name": "Jannik Dreier",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4378,
    "paper_ids": [
      3137
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zirui Huang",
    "display_name": "Zirui Huang",
    "affiliation": "Nanjing University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven Camouflage",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4379,
    "paper_ids": [
      3872
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunlong Mao",
    "display_name": "Yunlong Mao",
    "affiliation": "Nanjing University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven Camouflage",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4380,
    "paper_ids": [
      3872
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ping-Lun Wang",
    "display_name": "Ping-Lun Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bending microarchitectural weird machines towards practicality",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4381,
    "paper_ids": [
      1816
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fraser Brown",
    "display_name": "Fraser Brown",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "SOSP": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1
      },
      "SOSP": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bending microarchitectural weird machines towards practicality",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "icarus trustworthy justintime compilers with symbolic metaexecution",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "sys a staticsymbolic tool for finding good bugs in good browser code",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4382,
    "paper_ids": [
      1816
    ],
    "papers_without_artifact_ids": [
      3199,
      3202
    ]
  },
  {
    "name": "Brian Johannesmeyer",
    "display_name": "Brian Johannesmeyer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Data-Only Attack Generation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4383,
    "paper_ids": [
      82
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Asia Slowinska",
    "display_name": "Asia Slowinska",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Data-Only Attack Generation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4384,
    "paper_ids": [
      82
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lorenz Hetterich",
    "display_name": "Lorenz Hetterich",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CacheWarp: Software-based Fault Injection using Selective State Reset",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4385,
    "paper_ids": [
      324
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Samiha Shimmi",
    "display_name": "Samiha Shimmi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VulSim: Leveraging Similarity of Multi-Dimensional Neighbor Embeddings for Vulnerability Detection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "software vulnerability detection using llm does additional information help",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 4386,
    "paper_ids": [
      4015
    ],
    "papers_without_artifact_ids": [
      4016
    ]
  },
  {
    "name": "Ashiqur Rahman",
    "display_name": "Ashiqur Rahman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VulSim: Leveraging Similarity of Multi-Dimensional Neighbor Embeddings for Vulnerability Detection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4387,
    "paper_ids": [
      4015
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohan Gadde",
    "display_name": "Mohan Gadde",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VulSim: Leveraging Similarity of Multi-Dimensional Neighbor Embeddings for Vulnerability Detection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4388,
    "paper_ids": [
      4015
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mona Rahimi",
    "display_name": "Mona Rahimi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VulSim: Leveraging Similarity of Multi-Dimensional Neighbor Embeddings for Vulnerability Detection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "software vulnerability detection using llm does additional information help",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 4389,
    "paper_ids": [
      4015
    ],
    "papers_without_artifact_ids": [
      4016
    ]
  },
  {
    "name": "Huanyao Rong",
    "display_name": "Huanyao Rong",
    "affiliation": "Indiana University Bloomington",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Toward Unbiased Multiple-Target Fuzzing with Path Diversity",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4390,
    "paper_ids": [
      5269
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei You 0001",
    "display_name": "Wei You",
    "affiliation": "Renmin University of China",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Toward Unbiased Multiple-Target Fuzzing with Path Diversity",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aifore smart fuzzing based on automatic input format reverse engineering",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "android smarttvs vulnerability discovery via logguided fuzzing",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4391,
    "paper_ids": [
      5269
    ],
    "papers_without_artifact_ids": [
      23,
      2277
    ]
  },
  {
    "name": "Xiaofeng Wang 0006",
    "display_name": "Xiaofeng Wang",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2018": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Toward Unbiased Multiple-Target Fuzzing with Path Diversity",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "beware of your screen anonymous fingerprinting of device screens for offline payment protection",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 4392,
    "paper_ids": [
      5269
    ],
    "papers_without_artifact_ids": [
      2930
    ]
  },
  {
    "name": "Tianhao Mao",
    "display_name": "Tianhao Mao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Toward Unbiased Multiple-Target Fuzzing with Path Diversity",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4393,
    "paper_ids": [
      5269
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sina Kamali",
    "display_name": "Sina Kamali",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SpotProxy: Rediscovering the Cloud for Censorship Circumvention",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4394,
    "paper_ids": [
      698
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinyu Pei",
    "display_name": "Jinyu Pei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SpotProxy: Rediscovering the Cloud for Censorship Circumvention",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4395,
    "paper_ids": [
      698
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ayush Utkarsh",
    "display_name": "Ayush Utkarsh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4396,
    "paper_ids": [
      1199
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenbo Ding 0003",
    "display_name": "Wenbo Ding",
    "affiliation": "University at Buffalo",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4397,
    "paper_ids": [
      1199
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Isabelle Ondracek",
    "display_name": "Isabelle Ondracek",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4398,
    "paper_ids": [
      1199
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guo Freeman",
    "display_name": "Guo Freeman",
    "affiliation": "Clemson University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4399,
    "paper_ids": [
      1199
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shoham Danino",
    "display_name": "Shoham Danino",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Flushing Attack on the DNS Cache",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4400,
    "paper_ids": [
      3149
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuval Shavitt",
    "display_name": "Yuval Shavitt",
    "affiliation": "Tel Aviv University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Flushing Attack on the DNS Cache",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4401,
    "paper_ids": [
      3149
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhixiang Li",
    "display_name": "Zhixiang Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware Pretraining",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4402,
    "paper_ids": [
      895
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuzhong Zhao",
    "display_name": "Yuzhong Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware Pretraining",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4403,
    "paper_ids": [
      895
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fangfei Yang",
    "display_name": "Fangfei Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4404,
    "paper_ids": [
      3609
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weijie Huang",
    "display_name": "Weijie Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4405,
    "paper_ids": [
      3609
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kelly Kaoudis",
    "display_name": "Kelly Kaoudis",
    "affiliation": "Trail of Bits",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "civscope analyzing potential memory corruption bugs in compartment interfaces",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 4406,
    "paper_ids": [
      3609
    ],
    "papers_without_artifact_ids": [
      4792
    ]
  },
  {
    "name": "Nathan Dautenhahn",
    "display_name": "Nathan Dautenhahn",
    "affiliation": "Rice University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 1,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "SOSP": {
        "2023": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "civscope analyzing potential memory corruption bugs in compartment interfaces",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 4407,
    "paper_ids": [
      3609
    ],
    "papers_without_artifact_ids": [
      4792
    ]
  },
  {
    "name": "Tushar Nayan",
    "display_name": "Tushar Nayan",
    "affiliation": "Florida International University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4408,
    "paper_ids": [
      4134
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qiming Guo",
    "display_name": "Qiming Guo",
    "affiliation": "Texas A&M University Corpus Christi",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4409,
    "paper_ids": [
      4134
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohammed Alduniawi",
    "display_name": "Mohammed Alduniawi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4410,
    "paper_ids": [
      4134
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ruimin Sun",
    "display_name": "Ruimin Sun",
    "affiliation": "Florida International University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shift semihosted fuzz testing for embedded applications",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "mind your weights a largescale study on insufficient machine learning model protection in mobile apps",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4411,
    "paper_ids": [
      4134
    ],
    "papers_without_artifact_ids": [
      3040,
      5270
    ]
  },
  {
    "name": "Christian Lindenmeier",
    "display_name": "Christian Lindenmeier",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "EL3XIR: Fuzzing COTS Secure Monitors",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4412,
    "paper_ids": [
      6
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Kayondo",
    "display_name": "Martin Kayondo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust Integrity",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "trust a compilation framework for inprocess isolation to protect safe rust against untrusted code",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4413,
    "paper_ids": [
      3015
    ],
    "papers_without_artifact_ids": [
      3018
    ]
  },
  {
    "name": "Inyoung Bang",
    "display_name": "Inyoung Bang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust Integrity",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "trust a compilation framework for inprocess isolation to protect safe rust against untrusted code",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4414,
    "paper_ids": [
      3015
    ],
    "papers_without_artifact_ids": [
      3018
    ]
  },
  {
    "name": "Yeongjun Kwak",
    "display_name": "Yeongjun Kwak",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust Integrity",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4415,
    "paper_ids": [
      3015
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hyungon Moon",
    "display_name": "Hyungon Moon",
    "affiliation": "UNIST",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ATC": 0,
      "FAST": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "ATC": {},
      "FAST": {
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust Integrity",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "selective ondevice execution of datadependent read ios",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "lohen layerwise optimizations for neural network inferences over encrypted data with high performance or accuracy",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "efficient useafterfree prevention with opportunistic pagelevel sweeping",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "trust a compilation framework for inprocess isolation to protect safe rust against untrusted code",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "a logstructured merge treeaware message authentication scheme for persistent keyvalue stores",
        "conference": "FAST",
        "year": 2022
      }
    ],
    "author_id": 1251,
    "paper_ids": [
      3015
    ],
    "papers_without_artifact_ids": [
      5271,
      3017,
      5272,
      3018,
      3651
    ]
  },
  {
    "name": "Victor Duta",
    "display_name": "Victor Duta",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4416,
    "paper_ids": [
      83
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mitchel Aloserij",
    "display_name": "Mitchel Aloserij",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4417,
    "paper_ids": [
      83
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nicolas Nino",
    "display_name": "Nicolas Nino",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unveiling IoT Security in Reality: A Firmware-Centric Journey",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4418,
    "paper_ids": [
      1423
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ruibo Lu",
    "display_name": "Ruibo Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unveiling IoT Security in Reality: A Firmware-Centric Journey",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4419,
    "paper_ids": [
      1423
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei Zhou 0026",
    "display_name": "Wei Zhou",
    "affiliation": "University of Chinese Academy of Sciences",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unveiling IoT Security in Reality: A Firmware-Centric Journey",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automatic firmware emulation through invalidityguided knowledge inference",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4420,
    "paper_ids": [
      1423
    ],
    "papers_without_artifact_ids": [
      2405
    ]
  },
  {
    "name": "Xiaogeng Liu",
    "display_name": "Xiaogeng Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4421,
    "paper_ids": [
      168
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shunning Liang",
    "display_name": "Shunning Liang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4422,
    "paper_ids": [
      168
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zach Cameron",
    "display_name": "Zach Cameron",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4423,
    "paper_ids": [
      168
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ataberk Olgun",
    "display_name": "Ataberk Olgun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4424,
    "paper_ids": [
      5273
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yahya Can Tugrul",
    "display_name": "Yahya Can Tugrul",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4425,
    "paper_ids": [
      5273
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nisa Bostanci",
    "display_name": "Nisa Bostanci",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4426,
    "paper_ids": [
      5273
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ismail Emir Yuksel",
    "display_name": "Ismail Emir Yuksel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4427,
    "paper_ids": [
      5273
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haocong Luo",
    "display_name": "Haocong Luo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4428,
    "paper_ids": [
      5273
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Steve Rhyner",
    "display_name": "Steve Rhyner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4429,
    "paper_ids": [
      5273
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abdullah Giray Yaglikçi",
    "display_name": "Abdullah Giray Yaglikçi",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8048,
    "paper_ids": [
      5273
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Geraldo F. Oliveira",
    "display_name": "Geraldo F. Oliveira",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "SC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "benchmarking memorycentric computing systems analysis of real processinginmemory hardware",
        "conference": "SC",
        "year": 2021
      }
    ],
    "author_id": 4431,
    "paper_ids": [
      5273
    ],
    "papers_without_artifact_ids": [
      3636
    ]
  },
  {
    "name": "Onur Mutlu",
    "display_name": "Onur Mutlu",
    "affiliation": "ETH Zurich",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 1,
      "FAST": 2,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "SC": {
        "2021": 1
      },
      "FAST": {
        "2018": 1,
        "2022": 1
      },
      "NSDI": {
        "2017": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deepsketch a new machine learningbased reference search technique for postdeduplication delta compression",
        "conference": "FAST",
        "year": 2022
      },
      {
        "title": "benchmarking memorycentric computing systems analysis of real processinginmemory hardware",
        "conference": "SC",
        "year": 2021
      },
      {
        "title": "mqsim a framework for enabling realistic studies of modern multiqueue ssd devices",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "gaia geodistributed machine learning approaching lan speeds",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 4432,
    "paper_ids": [
      5273
    ],
    "papers_without_artifact_ids": [
      2079,
      3636,
      4766,
      1334
    ]
  },
  {
    "name": "Fabian Bäumer 0001",
    "display_name": "Fabian Bäumer",
    "affiliation": "Ruhr University Bochum",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8049,
    "paper_ids": [
      582
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sanjoy K. Baruah",
    "display_name": "Sanjoy K. Baruah",
    "affiliation": "Washington University in St. Louis",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1353,
    "paper_ids": [
      169
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ganxiang Yang",
    "display_name": "Ganxiang Yang",
    "affiliation": "Columbia University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a formal approach to multilayered privileges for enclaves",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 4434,
    "paper_ids": [
      932
    ],
    "papers_without_artifact_ids": [
      3301
    ]
  },
  {
    "name": "Tomasz Piotr Lisowski",
    "display_name": "Tomasz Piotr Lisowski",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SIMurai: Slicing Through the Complexity of SIM Card Security Research",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4435,
    "paper_ids": [
      1518
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Merlin Chlosta",
    "display_name": "Merlin Chlosta",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SIMurai: Slicing Through the Complexity of SIM Card Security Research",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4436,
    "paper_ids": [
      1518
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michal Shagam",
    "display_name": "Michal Shagam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Windows into the Past: Exploiting Legacy Crypto in Modern OS's Kerberos Implementation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4437,
    "paper_ids": [
      3155
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Phillip Gajland",
    "display_name": "Phillip Gajland",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the challenges of bringing cryptography from research papers to products results from an interview study with experts",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4438,
    "paper_ids": [
      1813
    ],
    "papers_without_artifact_ids": [
      1250
    ]
  },
  {
    "name": "Bor de Kock",
    "display_name": "Bor de Kock",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4439,
    "paper_ids": [
      1813
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Giulio Malavolta",
    "display_name": "Giulio Malavolta",
    "affiliation": "Bocconi University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4440,
    "paper_ids": [
      1813
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rui Zhang 0118",
    "display_name": "Rui Zhang",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "False Claims against Model Ownership Resolution",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4441,
    "paper_ids": [
      298
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leo de Castro",
    "display_name": "Leo de Castro",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4442,
    "paper_ids": [
      5274
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Keewoo Lee",
    "display_name": "Keewoo Lee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4443,
    "paper_ids": [
      5274
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lukas Lamster",
    "display_name": "Lukas Lamster",
    "affiliation": "Graz University of Technology",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tmebox scalable inprocess isolation through intel tmemk memory encryption",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "voodoo memory tagging authenticated encryption and error correction through magic",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "hashtag hashbased integrity protection for tagged architectures",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4444,
    "paper_ids": [
      269
    ],
    "papers_without_artifact_ids": [
      278,
      281,
      282
    ]
  },
  {
    "name": "Abhinaya S. B.",
    "display_name": "Abhinaya S. B.",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "what are they gonna do with my data privacy expectations concerns and behaviors in virtual reality",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 4445,
    "paper_ids": [
      1820
    ],
    "papers_without_artifact_ids": [
      1825
    ]
  },
  {
    "name": "Tung Le 0005",
    "display_name": "Tung Le",
    "affiliation": "Virginia Polytechnic Institute and State University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "PETS": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MUSES: Efficient Multi-User Searchable Encrypted Database",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "maple a metadatahiding policycontrollable encrypted search platform with minimal trust",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 4446,
    "paper_ids": [
      1401
    ],
    "papers_without_artifact_ids": [
      1406
    ]
  },
  {
    "name": "Dongli Liu",
    "display_name": "Dongli Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4447,
    "paper_ids": [
      2239
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qingzhao Zhang 0001",
    "display_name": "Qingzhao Zhang",
    "affiliation": "University of Arizona",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4448,
    "paper_ids": [
      5275
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuowei Jin",
    "display_name": "Shuowei Jin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4449,
    "paper_ids": [
      5275
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ruiyang Zhu",
    "display_name": "Ruiyang Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4450,
    "paper_ids": [
      5275
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiachen Sun",
    "display_name": "Jiachen Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automated discovery of denialofservice vulnerabilities in connected vehicle protocols",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "towards robust lidarbased perception in autonomous driving general blackbox adversarial sensor attack and countermeasures",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4451,
    "paper_ids": [
      5275
    ],
    "papers_without_artifact_ids": [
      5276,
      5277
    ]
  },
  {
    "name": "Xumiao Zhang",
    "display_name": "Xumiao Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ATC": {},
      "NSDI": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "learning productionoptimized congestion control selection for alibaba cloud cdn",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "vulcan automatic query planning for live ml analytics",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 4452,
    "paper_ids": [
      5275
    ],
    "papers_without_artifact_ids": [
      2880,
      1948
    ]
  },
  {
    "name": "Qi Alfred Chen",
    "display_name": "Qi Alfred Chen",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 12,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "EUROSYS": 0,
      "ACSAC": 1,
      "NDSS": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 3,
        "2021": 2
      },
      "EUROSYS": {},
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {
        "2024": 2,
        "2025": 2
      }
    },
    "artifact_rate": 8.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "revisiting physicalworld adversarial attack on traffic sign recognition a commercial systems perspective",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "on the realism of lidar spoofing attacks against autonomous driving vehicle at high speed and long distance",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "lidar spoofing meets the newgen capability improvements broken assumptions and new attack strategies",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "invisible reflections leveraging infrared laser reflections to target traffic sign perception",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "dnngp diagnosing and mitigating models faults using latent concepts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "play the imitation game model extraction attack against autonomous driving localization",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "dirty road can attack security of deep learning based automated lane centering under physicalworld attack",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "automated discovery of denialofservice vulnerabilities in connected vehicle protocols",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "plugnpwned comprehensive vulnerability analysis of obdii dongles as a new overtheair attack surface in automotive iot",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "towards robust lidarbased perception in autonomous driving general blackbox adversarial sensor attack and countermeasures",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "drift with devil security of multisensor fusion based localization in highlevel autonomous driving under gps spoofing",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4453,
    "paper_ids": [
      5275
    ],
    "papers_without_artifact_ids": [
      5278,
      5279,
      5280,
      4243,
      1579,
      3055,
      5281,
      5276,
      396,
      5277,
      5282
    ]
  },
  {
    "name": "Z. Morley Mao",
    "display_name": "Z. Morley Mao",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2021": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2024": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 14.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "learnings from deploying network qos alignment to application priorities for storage services",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "vulcan automatic query planning for live ml analytics",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "you cant see me physical removal attacks on lidarbased autonomous vehicles driving frameworks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "security analysis of cameralidar fusion against blackbox attacks on autonomous vehicles",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "automated discovery of denialofservice vulnerabilities in connected vehicle protocols",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "towards robust lidarbased perception in autonomous driving general blackbox adversarial sensor attack and countermeasures",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4454,
    "paper_ids": [
      5275
    ],
    "papers_without_artifact_ids": [
      5283,
      1948,
      4244,
      5284,
      5276,
      5277
    ]
  },
  {
    "name": "Stéphanie Delaune",
    "display_name": "Stéphanie Delaune",
    "affiliation": "Ecole Normale Superieure de Cachan",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Formal Security Analysis of Widevine through the W3C EME Standard",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8050,
    "paper_ids": [
      1783
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joseph Lallemand",
    "display_name": "Joseph Lallemand",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Formal Security Analysis of Widevine through the W3C EME Standard",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4456,
    "paper_ids": [
      1783
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Priyanka Mondal",
    "display_name": "Priyanka Mondal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4457,
    "paper_ids": [
      2415
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Javad Ghareh Chamani",
    "display_name": "Javad Ghareh Chamani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "SC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      },
      "SC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dynamic searchable encryption with optimal search in the presence of deletions",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4458,
    "paper_ids": [
      2415
    ],
    "papers_without_artifact_ids": [
      2418
    ]
  },
  {
    "name": "Nikolaos Pantelaios",
    "display_name": "Nikolaos Pantelaios",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FV8: A Forced Execution JavaScript Engine for Detecting Evasive Techniques",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4459,
    "paper_ids": [
      2428
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eric Olsson 0001",
    "display_name": "Eric Olsson",
    "affiliation": "University of Wisconsin - Madison",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4460,
    "paper_ids": [
      816
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benjamin Eriksson",
    "display_name": "Benjamin Eriksson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "no signal left to chance driving browser extension analysis by download patterns",
        "conference": "ACSAC",
        "year": 2022
      }
    ],
    "author_id": 4461,
    "paper_ids": [
      816
    ],
    "papers_without_artifact_ids": [
      4144
    ]
  },
  {
    "name": "Weixuan Wang",
    "display_name": "Weixuan Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hermes unlocking security analysis of cellular network protocols by synthesizing finite state machines from natural language specifications",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4462,
    "paper_ids": [
      2294
    ],
    "papers_without_artifact_ids": [
      2298
    ]
  },
  {
    "name": "Philipp Baus",
    "display_name": "Philipp Baus",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trust Me If You Can - How Usable Is Trusted Types In Practice?",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4463,
    "paper_ids": [
      1183
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Justin Miller",
    "display_name": "Justin Miller",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4464,
    "paper_ids": [
      817
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Akshay Ajayan",
    "display_name": "Akshay Ajayan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4465,
    "paper_ids": [
      817
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xavier J. Maso",
    "display_name": "Xavier J. Maso",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unleash the simulacrum shifting browser realities for robust extensionfingerprinting prevention",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4466,
    "paper_ids": [
      817
    ],
    "papers_without_artifact_ids": [
      827
    ]
  },
  {
    "name": "Yuhao Wu 0006",
    "display_name": "Yuhao Wu",
    "affiliation": "Washington University in St Louis, St Louis, MO, USA",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "isolategpt an execution isolation architecture for llmbased agentic systems",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 4467,
    "paper_ids": [
      170
    ],
    "papers_without_artifact_ids": [
      177
    ]
  },
  {
    "name": "Zihan Li",
    "display_name": "Zihan Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1374,
    "paper_ids": [
      170
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Unterguggenberger",
    "display_name": "Martin Unterguggenberger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "powerrelated sidechannel attacks using the android sensor framework",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "tmebox scalable inprocess isolation through intel tmemk memory encryption",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "voodoo memory tagging authenticated encryption and error correction through magic",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "hashtag hashbased integrity protection for tagged architectures",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4468,
    "paper_ids": [
      270
    ],
    "papers_without_artifact_ids": [
      277,
      278,
      281,
      282
    ]
  },
  {
    "name": "Kaiming Cheng",
    "display_name": "Kaiming Cheng",
    "affiliation": "HKUST",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploring user reactions and mental models towards perceptual manipulation attacks in mixed reality",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4469,
    "paper_ids": [
      4147
    ],
    "papers_without_artifact_ids": [
      4151
    ]
  },
  {
    "name": "Arkaprabha Bhattacharya",
    "display_name": "Arkaprabha Bhattacharya",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a framework for abusability analysis the case of passkeys in interpersonal threat models",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 4470,
    "paper_ids": [
      4147
    ],
    "papers_without_artifact_ids": [
      2546
    ]
  },
  {
    "name": "Michelle Lin",
    "display_name": "Michelle Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4471,
    "paper_ids": [
      4147
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jaewook Lee 0005",
    "display_name": "Jaewook Lee",
    "affiliation": "University of Washington",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4472,
    "paper_ids": [
      4147
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aroosh Kumar",
    "display_name": "Aroosh Kumar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4473,
    "paper_ids": [
      4147
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jeffery F. Tian",
    "display_name": "Jeffery F. Tian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploring user reactions and mental models towards perceptual manipulation attacks in mixed reality",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4474,
    "paper_ids": [
      4147
    ],
    "papers_without_artifact_ids": [
      4151
    ]
  },
  {
    "name": "Franziska Roesner",
    "display_name": "Franziska Roesner",
    "affiliation": "University of Washington",
    "artifact_count": 1,
    "total_papers": 13,
    "total_papers_by_conf": {
      "USENIXSEC": 9,
      "NSDI": 1,
      "PETS": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2020": 1,
        "2023": 1,
        "2022": 3,
        "2021": 1
      },
      "NSDI": {
        "2012": 1
      },
      "PETS": {
        "2020": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 7.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "isolategpt an execution isolation architecture for llmbased agentic systems",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "to reveal or conceal privacy and marginalization in avatars",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "understanding helpseeking and helpgiving on social media for imagebased sexual abuse",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "sok or solk on the quantitative study of sociodemographic factors and computer security behaviors",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "exploring user reactions and mental models towards perceptual manipulation attacks in mixed reality",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "electronic monitoring smartphone apps an analysis of risks from technical humancentered and legal perspectives",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "like lesbians walking the perimeter experiences of us lgbtq folks with online security safety and privacy advice",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "antiprivacy and antisecurity advice on tiktok case studies of technologyenabled surveillance and control in intimate partner and parentchild relationships",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "understanding privacy attitudes and concerns towards remote communications during the covid19 pandemic",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "smart devices in airbnbs considering privacy and security for both guests and hosts",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "usable sexurity studying peoples concerns and strategies when sexting",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "detecting and defending against thirdparty tracking on the web",
        "conference": "NSDI",
        "year": 2012
      }
    ],
    "author_id": 4475,
    "paper_ids": [
      4147
    ],
    "papers_without_artifact_ids": [
      177,
      4148,
      4150,
      3212,
      4151,
      4153,
      3217,
      4154,
      3265,
      4158,
      5285,
      4160
    ]
  },
  {
    "name": "Zilong Lin 0001",
    "display_name": "Zilong Lin",
    "affiliation": "Univ. of Missouri - Kansas City",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Malla: Demystifying Real-world Large Language Model Integrated Malicious Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4476,
    "paper_ids": [
      595
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jian Cui",
    "display_name": "Jian Cui",
    "affiliation": "University of Illinois Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Malla: Demystifying Real-world Large Language Model Integrated Malicious Services",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tweezers a framework for security event detection via event attributioncentric tweet embedding",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "drainclog detecting rogue accounts with illegallyobtained nfts using classifiers learned on graphs",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 4477,
    "paper_ids": [
      595
    ],
    "papers_without_artifact_ids": [
      3158,
      4337
    ]
  },
  {
    "name": "Amir Sabzi",
    "display_name": "Amir Sabzi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "NetShaper: A Differentially Private Network Side-Channel Mitigation System",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4478,
    "paper_ids": [
      1982
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rut Vora",
    "display_name": "Rut Vora",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "NetShaper: A Differentially Private Network Side-Channel Mitigation System",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4479,
    "paper_ids": [
      1982
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Swati Goswami",
    "display_name": "Swati Goswami",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "NetShaper: A Differentially Private Network Side-Channel Mitigation System",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4480,
    "paper_ids": [
      1982
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Margo I. Seltzer",
    "display_name": "Margo I. Seltzer",
    "affiliation": "University of British Columbia",
    "artifact_count": 1,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "SOSP": 2,
      "ATC": 1,
      "FAST": 4,
      "NSDI": 1,
      "NDSS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2021": 1
      },
      "SOSP": {
        "2023": 2
      },
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2010": 2,
        "2003": 2
      },
      "NSDI": {
        "2007": 1
      },
      "NDSS": {},
      "OSDI": {}
    },
    "artifact_rate": 10.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "NetShaper: A Differentially Private Network Side-Channel Mitigation System",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "extmem enabling applicationaware virtual memory management for dataintensive applications",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "cheripicking leveraging capability hardware for prefetching",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "synthesizing device drivers with ghost writer",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "sigl securing software installations through deep graph learning",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "tracking back references in a writeanywhere file system",
        "conference": "FAST",
        "year": 2010
      },
      {
        "title": "provenance for the cloud",
        "conference": "FAST",
        "year": 2010
      },
      {
        "title": "network coordinates in the wild",
        "conference": "NSDI",
        "year": 2007
      },
      {
        "title": "passive nfs tracing of email and research workloads",
        "conference": "FAST",
        "year": 2003
      },
      {
        "title": "making the most out of directaccess network attached storage",
        "conference": "FAST",
        "year": 2003
      }
    ],
    "author_id": 4481,
    "paper_ids": [
      1982
    ],
    "papers_without_artifact_ids": [
      5286,
      5287,
      2784,
      5288,
      5289,
      5290,
      5291,
      5292,
      5293
    ]
  },
  {
    "name": "Rohit Raj",
    "display_name": "Rohit Raj",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I just hated it and I want my money back\": Data-driven Understanding of Mobile VPN Service Switching Preferences in The Wild",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4482,
    "paper_ids": [
      4162
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mridul Newar",
    "display_name": "Mridul Newar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I just hated it and I want my money back\": Data-driven Understanding of Mobile VPN Service Switching Preferences in The Wild",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4483,
    "paper_ids": [
      4162
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weihao Su",
    "display_name": "Weihao Su",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards an Effective Method of ReDoS Detection for Non-backtracking Engines",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4484,
    "paper_ids": [
      4165
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hong Huang 0004",
    "display_name": "Hong Huang",
    "affiliation": "Pennsylvania State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards an Effective Method of ReDoS Detection for Non-backtracking Engines",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4485,
    "paper_ids": [
      4165
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rongchen Li",
    "display_name": "Rongchen Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards an Effective Method of ReDoS Detection for Non-backtracking Engines",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "regexscalpel regular expression denial of service redos defense by localizeandfix",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4486,
    "paper_ids": [
      4165
    ],
    "papers_without_artifact_ids": [
      3129
    ]
  },
  {
    "name": "Tingjian Ge",
    "display_name": "Tingjian Ge",
    "affiliation": "University of Massachusetts Lowell",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards an Effective Method of ReDoS Detection for Non-backtracking Engines",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4487,
    "paper_ids": [
      4165
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minxue Tang",
    "display_name": "Minxue Tang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4488,
    "paper_ids": [
      3162
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anna Dai",
    "display_name": "Anna Dai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4489,
    "paper_ids": [
      3162
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Louis DiValentin",
    "display_name": "Louis DiValentin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4490,
    "paper_ids": [
      3162
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aolin Ding",
    "display_name": "Aolin Ding",
    "affiliation": "Accenture Labs",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4491,
    "paper_ids": [
      3162
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Amin Hass",
    "display_name": "Amin Hass",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4492,
    "paper_ids": [
      3162
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yiran Chen 0001",
    "display_name": "Yiran Chen",
    "affiliation": "Duke University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4493,
    "paper_ids": [
      3162
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hai (Helen) Li",
    "display_name": "Hai (Helen) Li",
    "affiliation": "Duke University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4494,
    "paper_ids": [
      3162
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sihui Dai",
    "display_name": "Sihui Dai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4495,
    "paper_ids": [
      126
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Chesser",
    "display_name": "Michael Chesser",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4496,
    "paper_ids": [
      766
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Giulio De Pasquale",
    "display_name": "Giulio De Pasquale",
    "affiliation": "King's College London",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4497,
    "paper_ids": [
      1150
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Riccardo Iesari",
    "display_name": "Riccardo Iesari",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4498,
    "paper_ids": [
      1150
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gabriel Pizarro",
    "display_name": "Gabriel Pizarro",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4499,
    "paper_ids": [
      1150
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sander Wiebing",
    "display_name": "Sander Wiebing",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4500,
    "paper_ids": [
      84
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hongyi Lu",
    "display_name": "Hongyi Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MOAT: Towards Safe BPF Kernel Extension",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4501,
    "paper_ids": [
      944
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yechang Wu",
    "display_name": "Yechang Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MOAT: Towards Safe BPF Kernel Extension",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4502,
    "paper_ids": [
      944
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wanning He",
    "display_name": "Wanning He",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MOAT: Towards Safe BPF Kernel Extension",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4503,
    "paper_ids": [
      944
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pranay Jain",
    "display_name": "Pranay Jain",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Near-Optimal Constrained Padding for Object Retrievals with Dependencies",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4504,
    "paper_ids": [
      4168
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrew C. Reed",
    "display_name": "Andrew C. Reed",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Near-Optimal Constrained Padding for Object Retrievals with Dependencies",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4505,
    "paper_ids": [
      4168
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cas Magnus",
    "display_name": "Cas Magnus",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4506,
    "paper_ids": [
      1446
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sophia Yoo",
    "display_name": "Sophia Yoo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tango secure collaborative route control across the public internet",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "on the criticality of integrity protection in 5g fronthaul networks",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4507,
    "paper_ids": [
      3174
    ],
    "papers_without_artifact_ids": [
      3175,
      2734
    ]
  },
  {
    "name": "Xiaoqi Chen",
    "display_name": "Xiaoqi Chen",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "EUROSYS": {},
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sequence abstractions for flexible linerate network monitoring",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 4508,
    "paper_ids": [
      3174
    ],
    "papers_without_artifact_ids": [
      3541
    ]
  },
  {
    "name": "Rishi D. Jha",
    "display_name": "Rishi D. Jha",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Adversarial Illusions in Multi-Modal Embeddings",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4509,
    "paper_ids": [
      1841
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dandan Xu",
    "display_name": "Dandan Xu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4510,
    "paper_ids": [
      596
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Di Tang 0001",
    "display_name": "Di Tang",
    "affiliation": "Sun Yat-sen University",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 2,
        "2022": 1,
        "2021": 1
      },
      "ACSAC": {
        "2018": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 12.5,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gradient shaping enhancing backdoor attack against reverse engineering",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "tossing in the dark practical bitflipping on graybox deep neural networks for runtime trojan injection",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "sherlock on specs building lte conformance tests through automated reasoning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "homespy the invisible sniffer of infrared remote control of smart tvs",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "seeing the forest for the trees understanding security hazards in the 3gpp ecosystem through intelligent analysis on change requests",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "demon in the variant statistical analysis of dnns for robust backdoor contamination detection",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "beware of your screen anonymous fingerprinting of device screens for offline payment protection",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 4511,
    "paper_ids": [
      596
    ],
    "papers_without_artifact_ids": [
      603,
      604,
      609,
      5294,
      610,
      611,
      2930
    ]
  },
  {
    "name": "Yi Chen 0024",
    "display_name": "Yi Chen",
    "affiliation": "University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sherlock on specs building lte conformance tests through automated reasoning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "seeing the forest for the trees understanding security hazards in the 3gpp ecosystem through intelligent analysis on change requests",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4512,
    "paper_ids": [
      596
    ],
    "papers_without_artifact_ids": [
      609,
      610
    ]
  },
  {
    "name": "Longxing Li",
    "display_name": "Longxing Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4513,
    "paper_ids": [
      596
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muqi Zou",
    "display_name": "Muqi Zou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "neuroscope reverse engineering deep neural network on edge devices using dynamic analysis",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 4514,
    "paper_ids": [
      1772
    ],
    "papers_without_artifact_ids": [
      1776
    ]
  },
  {
    "name": "Arslan Khan",
    "display_name": "Arslan Khan",
    "affiliation": "Pennsylvania State University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "neuroscope reverse engineering deep neural network on edge devices using dynamic analysis",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "sain improving ics attack detection sensitivity via stateaware invariants",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "m2mon building an mmiobased security reference monitor for unmanned vehicles",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4515,
    "paper_ids": [
      1772
    ],
    "papers_without_artifact_ids": [
      1776,
      1739,
      1780
    ]
  },
  {
    "name": "Ruoyu Wu",
    "display_name": "Ruoyu Wu",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "veribin adaptive verification of patches at the binary level",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "neuroscope reverse engineering deep neural network on edge devices using dynamic analysis",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "are you spying on me largescale analysis on iot data exposure through companion apps",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "dnd a crossarchitecture deep neural network decompiler",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "lightblue automatic profileaware debloating of bluetooth stacks",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4516,
    "paper_ids": [
      1772
    ],
    "papers_without_artifact_ids": [
      1775,
      1776,
      608,
      1779,
      27
    ]
  },
  {
    "name": "Ingab Kang",
    "display_name": "Ingab Kang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "go go gadget hammer flipping nested pointers for arbitrary data leakage",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4517,
    "paper_ids": [
      1498
    ],
    "papers_without_artifact_ids": [
      1505
    ]
  },
  {
    "name": "Youssef Tobah",
    "display_name": "Youssef Tobah",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "go go gadget hammer flipping nested pointers for arbitrary data leakage",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4518,
    "paper_ids": [
      1498
    ],
    "papers_without_artifact_ids": [
      1505
    ]
  },
  {
    "name": "Andrew Kwong",
    "display_name": "Andrew Kwong",
    "affiliation": "University of North Carolina",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "go go gadget hammer flipping nested pointers for arbitrary data leakage",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "checking passwords on leaky computers a side channel analysis of chromes password leak detect protocol",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4519,
    "paper_ids": [
      1498
    ],
    "papers_without_artifact_ids": [
      1505,
      1506
    ]
  },
  {
    "name": "Ryan Little",
    "display_name": "Ryan Little",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure Account Recovery for a Privacy-Preserving Web Service",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4520,
    "paper_ids": [
      2442
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lucy Qin",
    "display_name": "Lucy Qin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure Account Recovery for a Privacy-Preserving Web Service",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "did they fing consent to that safer digital intimacy via proactive protection against imagebased sexual abuse",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4521,
    "paper_ids": [
      2442
    ],
    "papers_without_artifact_ids": [
      3211
    ]
  },
  {
    "name": "Yicheng Guang",
    "display_name": "Yicheng Guang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SeaK: Rethinking the Design of a Secure Allocator for OS Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4522,
    "paper_ids": [
      933
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhongshu Gu",
    "display_name": "Zhongshu Gu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "ACSAC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ACSAC": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SeaK: Rethinking the Design of a Secure Allocator for OS Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deta minimizing data leaks in federated learning via decentralized and trustworthy aggregation",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "gnnic finding longlost sibling functions with abstract similarity",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 4523,
    "paper_ids": [
      933
    ],
    "papers_without_artifact_ids": [
      2140,
      2141
    ]
  },
  {
    "name": "Martin Dunsche",
    "display_name": "Martin Dunsche",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "generalpurpose fdp estimation and auditing in a blackbox setting",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 4524,
    "paper_ids": [
      583
    ],
    "papers_without_artifact_ids": [
      5295
    ]
  },
  {
    "name": "Nicolai Bissantz",
    "display_name": "Nicolai Bissantz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4525,
    "paper_ids": [
      583
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junho Ahn",
    "display_name": "Junho Ahn",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4526,
    "paper_ids": [
      350
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jaehyeon Lee",
    "display_name": "Jaehyeon Lee",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4527,
    "paper_ids": [
      350
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kanghyuk Lee",
    "display_name": "Kanghyuk Lee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4528,
    "paper_ids": [
      350
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wooseok Gwak",
    "display_name": "Wooseok Gwak",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4529,
    "paper_ids": [
      350
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minseong Hwang",
    "display_name": "Minseong Hwang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4530,
    "paper_ids": [
      350
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haoran Lu",
    "display_name": "Haoran Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards Privacy-Preserving Social-Media SDKs on Android",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding malicious crosslibrary data harvesting on android",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4531,
    "paper_ids": [
      2450
    ],
    "papers_without_artifact_ids": [
      612
    ]
  },
  {
    "name": "Yichen Liu",
    "display_name": "Yichen Liu",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards Privacy-Preserving Social-Media SDKs on Android",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hidden and lost control on security design risks in iot userfacing matter controller",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 4532,
    "paper_ids": [
      2450
    ],
    "papers_without_artifact_ids": [
      2453
    ]
  },
  {
    "name": "Chen Ling 0004",
    "display_name": "Chen Ling",
    "affiliation": "Indiana University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PIXELMOD: Improving Soft Moderation of Visual Misleading Information on Twitter",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4533,
    "paper_ids": [
      2422
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jeremy Blackburn",
    "display_name": "Jeremy Blackburn",
    "affiliation": "Binghamton University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PIXELMOD: Improving Soft Moderation of Visual Misleading Information on Twitter",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4534,
    "paper_ids": [
      2422
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eric Cornelissen",
    "display_name": "Eric Cornelissen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GHunter: Universal Prototype Pollution Gadgets in JavaScript Runtimes",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4535,
    "paper_ids": [
      4183
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marco Herzog",
    "display_name": "Marco Herzog",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4536,
    "paper_ids": [
      2982
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simon Schwarz 0002",
    "display_name": "Simon Schwarz",
    "affiliation": "Airbus",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4537,
    "paper_ids": [
      2982
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shaoor Munir",
    "display_name": "Shaoor Munir",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PURL: Safe and Effective Sanitization of Link Decoration",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4538,
    "paper_ids": [
      803
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Patrick Lee",
    "display_name": "Patrick Lee",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PURL: Safe and Effective Sanitization of Link Decoration",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4539,
    "paper_ids": [
      803
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Oygenblik",
    "display_name": "David Oygenblik",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4540,
    "paper_ids": [
      1448
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arianna Mastali",
    "display_name": "Arianna Mastali",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4541,
    "paper_ids": [
      1448
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andy Riddle",
    "display_name": "Andy Riddle",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How does Endpoint Detection use the MITRE ATT&CK Framework?",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4542,
    "paper_ids": [
      1526
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hidde Lycklama",
    "display_name": "Hidde Lycklama",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Holding Secrets Accountable: Auditing Privacy-Preserving Machine Learning",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4543,
    "paper_ids": [
      2457
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christian Knabenhans",
    "display_name": "Christian Knabenhans",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Holding Secrets Accountable: Auditing Privacy-Preserving Machine Learning",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4544,
    "paper_ids": [
      2457
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xingkai Wang",
    "display_name": "Xingkai Wang",
    "affiliation": "Western Sydney University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4545,
    "paper_ids": [
      686
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yujie Bu",
    "display_name": "Yujie Bu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4546,
    "paper_ids": [
      686
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinmeng Zhou",
    "display_name": "Jinmeng Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a hybrid alias analysis and its application to global variable protection in the linux kernel",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4547,
    "paper_ids": [
      686
    ],
    "papers_without_artifact_ids": [
      2144
    ]
  },
  {
    "name": "Marius Musch",
    "display_name": "Marius Musch",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2021": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "accept all exploits exploring the security impact of cookie banners",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "u cant debug this detecting javascript antidebugging techniques in the wild",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4548,
    "paper_ids": [
      215
    ],
    "papers_without_artifact_ids": [
      227,
      229
    ]
  },
  {
    "name": "Xenia Hofmeier",
    "display_name": "Xenia Hofmeier",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PURE: Payments with UWB RElay-protection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4549,
    "paper_ids": [
      440
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Patrick Schaller",
    "display_name": "Patrick Schaller",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PURE: Payments with UWB RElay-protection",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "inducing authentication failures to bypass credit card pins",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4550,
    "paper_ids": [
      440
    ],
    "papers_without_artifact_ids": [
      454
    ]
  },
  {
    "name": "Lukas Wutschitz",
    "display_name": "Lukas Wutschitz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Closed-Form Bounds for DP-SGD against Record-level Inference",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4551,
    "paper_ids": [
      3193
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Santiago Zanella-Béguelin",
    "display_name": "Santiago Zanella-Béguelin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Closed-Form Bounds for DP-SGD against Record-level Inference",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8051,
    "paper_ids": [
      3193
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seyed Mohammad Mehdi Mirnajafizadeh",
    "display_name": "Seyed Mohammad Mehdi Mirnajafizadeh",
    "affiliation": "Wayne State University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Enhancing Network Attack Detection with Distributed and In-Network Data Collection System",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sketchfeature highquality perflow feature extractor towards securityaware data plane",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 4553,
    "paper_ids": [
      5296
    ],
    "papers_without_artifact_ids": [
      5297
    ]
  },
  {
    "name": "Ashwin Raam Sethuram",
    "display_name": "Ashwin Raam Sethuram",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Enhancing Network Attack Detection with Distributed and In-Network Data Collection System",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4554,
    "paper_ids": [
      5296
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Mohaisen",
    "display_name": "David Mohaisen",
    "affiliation": "University of Central Florida",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "PETS": {
        "2020": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Enhancing Network Attack Detection with Distributed and In-Network Data Collection System",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "from large to mammoth a comparative evaluation of large language models in vulnerability detection",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "multiχ identifying multiple authors from source code files",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 4555,
    "paper_ids": [
      5296
    ],
    "papers_without_artifact_ids": [
      5298,
      5299
    ]
  },
  {
    "name": "DaeHun Nyang",
    "display_name": "DaeHun Nyang",
    "affiliation": "Ewha Womans University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "PETS": {
        "2020": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Enhancing Network Attack Detection with Distributed and In-Network Data Collection System",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sketchfeature highquality perflow feature extractor towards securityaware data plane",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "multiχ identifying multiple authors from source code files",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 4556,
    "paper_ids": [
      5296
    ],
    "papers_without_artifact_ids": [
      5297,
      5299
    ]
  },
  {
    "name": "Rhongho Jang",
    "display_name": "Rhongho Jang",
    "affiliation": "Wayne State University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Enhancing Network Attack Detection with Distributed and In-Network Data Collection System",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sketchfeature highquality perflow feature extractor towards securityaware data plane",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 4557,
    "paper_ids": [
      5296
    ],
    "papers_without_artifact_ids": [
      5297
    ]
  },
  {
    "name": "Boshi Yuan 0002",
    "display_name": "Boshi Yuan",
    "affiliation": "VU Amsterdam",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4558,
    "paper_ids": [
      4046
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shixuan Yang",
    "display_name": "Shixuan Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4559,
    "paper_ids": [
      4046
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yongxiang Zhang",
    "display_name": "Yongxiang Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4560,
    "paper_ids": [
      4046
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ning Ding 0001",
    "display_name": "Ning Ding",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4561,
    "paper_ids": [
      4046
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leo Cao",
    "display_name": "Leo Cao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Stateful Least Privilege Authorization for the Cloud",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4562,
    "paper_ids": [
      3196
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rahul George",
    "display_name": "Rahul George",
    "affiliation": "University of California, Riverside",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4563,
    "paper_ids": [
      2219
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingming Chen 0001",
    "display_name": "Mingming Chen",
    "affiliation": "Kansas State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4564,
    "paper_ids": [
      2219
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas La Porta",
    "display_name": "Thomas La Porta",
    "affiliation": "Pennsylvania State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4565,
    "paper_ids": [
      2219
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Niels Dossche",
    "display_name": "Niels Dossche",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Inference of Error Specifications and Bug Detection Using Structural Similarities",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4566,
    "paper_ids": [
      3783
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Véronique Cortier",
    "display_name": "Véronique Cortier",
    "affiliation": "CNRS",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "votecheck secure postal voting with reduced trust assumptions",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 8052,
    "paper_ids": [
      3206
    ],
    "papers_without_artifact_ids": [
      5300
    ]
  },
  {
    "name": "Alexandre Debant",
    "display_name": "Alexandre Debant",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "votecheck secure postal voting with reduced trust assumptions",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "reversing breaking and fixing the french legislative election evoting protocol",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4568,
    "paper_ids": [
      3206
    ],
    "papers_without_artifact_ids": [
      5300,
      3208
    ]
  },
  {
    "name": "Anselme Goetschmann",
    "display_name": "Anselme Goetschmann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4569,
    "paper_ids": [
      3206
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Waleed Arshad",
    "display_name": "Waleed Arshad",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I chose to fight, be brave, and to deal with it\": Threat Experiences and Security Practices of Pakistani Content Creators",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4570,
    "paper_ids": [
      1828
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shanza",
    "display_name": "Shanza",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I chose to fight, be brave, and to deal with it\": Threat Experiences and Security Practices of Pakistani Content Creators",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4571,
    "paper_ids": [
      1828
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Angelica Goetzen",
    "display_name": "Angelica Goetzen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I chose to fight, be brave, and to deal with it\": Threat Experiences and Security Practices of Pakistani Content Creators",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "problematic advertising and its disparate exposure on facebook",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "ctrlshift how privacy sentiment changed from 2019 to 2021",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 4572,
    "paper_ids": [
      1828
    ],
    "papers_without_artifact_ids": [
      3213,
      3216
    ]
  },
  {
    "name": "Maryam Mustafa",
    "display_name": "Maryam Mustafa",
    "affiliation": "LUMS",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I chose to fight, be brave, and to deal with it\": Threat Experiences and Security Practices of Pakistani Content Creators",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aunties strangers and the fbi online privacy concerns and experiences of muslimamerican women",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4573,
    "paper_ids": [
      1828
    ],
    "papers_without_artifact_ids": [
      4383
    ]
  },
  {
    "name": "Zeyu Liu 0004",
    "display_name": "Zeyu Liu",
    "affiliation": "Chinese Academy of Sciences",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4574,
    "paper_ids": [
      2462
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yibin Yang 0001",
    "display_name": "Yibin Yang",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4575,
    "paper_ids": [
      5301
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Heath",
    "display_name": "David Heath",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scalable metadatahiding for privacypreserving iot systems",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 4576,
    "paper_ids": [
      5301
    ],
    "papers_without_artifact_ids": [
      2549
    ]
  },
  {
    "name": "Dario Lazzaro",
    "display_name": "Dario Lazzaro",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4577,
    "paper_ids": [
      100
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Antonio Emanuele Cinà",
    "display_name": "Antonio Emanuele Cinà",
    "affiliation": "University of Genoa",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8053,
    "paper_ids": [
      100
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yaroslav Oliinyk",
    "display_name": "Yaroslav Oliinyk",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4579,
    "paper_ids": [
      4190
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Scott",
    "display_name": "Michael Scott",
    "affiliation": "University of Rochester",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "generation of fast finite field arithmetic forcortexm4 with ecdh and sqisign applications",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 4580,
    "paper_ids": [
      4190
    ],
    "papers_without_artifact_ids": [
      5302
    ]
  },
  {
    "name": "Chongzhou Fang",
    "display_name": "Chongzhou Fang",
    "affiliation": "Rochester Inst. of Technology",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "large language models for code analysis do llms really do their job",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "forget and rewire enhancing the resilience of transformerbased models against bitflip attacks",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4581,
    "paper_ids": [
      4190
    ],
    "papers_without_artifact_ids": [
      4192,
      4193
    ]
  },
  {
    "name": "Supraja Sridhara",
    "display_name": "Supraja Sridhara",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "confidential computing with heterogeneous devices at cloudscale",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "heckler breaking confidential vms with malicious interrupts",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4582,
    "paper_ids": [
      2466
    ],
    "papers_without_artifact_ids": [
      1230,
      2469
    ]
  },
  {
    "name": "Andrin Bertschi",
    "display_name": "Andrin Bertschi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "heckler breaking confidential vms with malicious interrupts",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4583,
    "paper_ids": [
      2466
    ],
    "papers_without_artifact_ids": [
      2469
    ]
  },
  {
    "name": "Benedict Schlüter",
    "display_name": "Benedict Schlüter",
    "affiliation": "ETH Zurich",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "heckler breaking confidential vms with malicious interrupts",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 8054,
    "paper_ids": [
      2466
    ],
    "papers_without_artifact_ids": [
      2469
    ]
  },
  {
    "name": "Fabio Aliberti",
    "display_name": "Fabio Aliberti",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4585,
    "paper_ids": [
      2466
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Luyi Li",
    "display_name": "Luyi Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4586,
    "paper_ids": [
      3220
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hosein Yavarzadeh",
    "display_name": "Hosein Yavarzadeh",
    "affiliation": "University of California, San Diego",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4587,
    "paper_ids": [
      3220
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lirui Zhao",
    "display_name": "Lirui Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4588,
    "paper_ids": [
      2339
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohamed Moustafa Dawoud",
    "display_name": "Mohamed Moustafa Dawoud",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4589,
    "paper_ids": [
      1449
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ati Priya Bajaj",
    "display_name": "Ati Priya Bajaj",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tygr type inference on stripped binaries using graph neural networks",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4590,
    "paper_ids": [
      818
    ],
    "papers_without_artifact_ids": [
      825
    ]
  },
  {
    "name": "Jude O'Kain",
    "display_name": "Jude O'Kain",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4591,
    "paper_ids": [
      818
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Derron Miao",
    "display_name": "Derron Miao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4592,
    "paper_ids": [
      818
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mirza Masfiqur Rahman",
    "display_name": "Mirza Masfiqur Rahman",
    "affiliation": "University of Central Florida",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4593,
    "paper_ids": [
      1166
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Manoj Vignesh Kasi Murali",
    "display_name": "Manoj Vignesh Kasi Murali",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4594,
    "paper_ids": [
      2470
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Paul Pearce",
    "display_name": "Paul Pearce",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 6
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "6sense internetwide ipv6 scanning and its security applications",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "glowing in the dark uncovering ipv6 address discovery and scanning strategies in the wild",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "many roads lead to rome how packet headers influence dns censorship measurement",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "deep entity classification abusive account detection for online social networks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "delf safeguarding deletion correctness in online social networks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4595,
    "paper_ids": [
      2470
    ],
    "papers_without_artifact_ids": [
      3225,
      5303,
      5304,
      3227,
      5305
    ]
  },
  {
    "name": "Zongyang Zhang",
    "display_name": "Zongyang Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4596,
    "paper_ids": [
      1722
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weihan Li",
    "display_name": "Weihan Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4597,
    "paper_ids": [
      1722
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kexin Shi",
    "display_name": "Kexin Shi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4598,
    "paper_ids": [
      1722
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ximeng Liu",
    "display_name": "Ximeng Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cdn cannon exploiting cdn backtoorigin strategies for amplification attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "compressed federated learning based on adaptive local differential privacy",
        "conference": "ACSAC",
        "year": 2022
      }
    ],
    "author_id": 4599,
    "paper_ids": [
      1722
    ],
    "papers_without_artifact_ids": [
      3375,
      4419
    ]
  },
  {
    "name": "Jin Dong",
    "display_name": "Jin Dong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4600,
    "paper_ids": [
      1722
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rebecca Weil",
    "display_name": "Rebecca Weil",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards Privacy and Security in Private Clouds: A Representative Survey on the Prevalence of Private Hosting and Administrator Characteristics",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4601,
    "paper_ids": [
      1829
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Elena Groben",
    "display_name": "Elena Groben",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards Privacy and Security in Private Clouds: A Representative Survey on the Prevalence of Private Hosting and Administrator Characteristics",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4602,
    "paper_ids": [
      1829
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Schilling 0001",
    "display_name": "Michael Schilling",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards Privacy and Security in Private Clouds: A Representative Survey on the Prevalence of Private Hosting and Administrator Characteristics",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the unusual suspects studying reasons for lacking updates in wordpress",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "an open door may tempt a saint examining situational and individual determinants of privacyinvading behavior",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "explanation beats context the effect of timing rationales on users runtime permission decisions",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4603,
    "paper_ids": [
      1829
    ],
    "papers_without_artifact_ids": [
      1187,
      5306,
      409
    ]
  },
  {
    "name": "Changming Liu",
    "display_name": "Changming Liu",
    "affiliation": "Stanford University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2
      },
      "ACSAC": {
        "2018": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CO3: Concolic Co-execution for Firmware",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shift semihosted fuzz testing for embedded applications",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a heuristic framework to detect concurrency vulnerabilities",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 4604,
    "paper_ids": [
      3037
    ],
    "papers_without_artifact_ids": [
      3040,
      1109
    ]
  },
  {
    "name": "Alejandro Mera",
    "display_name": "Alejandro Mera",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CO3: Concolic Co-execution for Firmware",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shift semihosted fuzz testing for embedded applications",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "p2im scalable and hardwareindependent firmware testing via automatic peripheral interface modeling",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4605,
    "paper_ids": [
      3037
    ],
    "papers_without_artifact_ids": [
      3040,
      5307
    ]
  },
  {
    "name": "Meng Xu",
    "display_name": "Meng Xu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CO3: Concolic Co-execution for Firmware",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "be careful of what you embed demystifying ole vulnerabilities",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "sense enhancing microarchitectural awareness for tees via subscriptionbased notification",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 4606,
    "paper_ids": [
      3037
    ],
    "papers_without_artifact_ids": [
      777,
      660
    ]
  },
  {
    "name": "Long Lu",
    "display_name": "Long Lu",
    "affiliation": "Northeastern University",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "ATC": 0,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 1,
        "2021": 3
      },
      "ATC": {},
      "ACSAC": {
        "2019": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 12.5,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CO3: Concolic Co-execution for Firmware",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shift semihosted fuzz testing for embedded applications",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a study of multifactor and riskbased authentication availability",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "mind your weights a largescale study on insufficient machine learning model protection in mobile apps",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "ptauth temporal memory safety via robust pointsto authentication",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "finding bugs using your own code detecting functionallysimilar yet inconsistent code",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "p2im scalable and hardwareindependent firmware testing via automatic peripheral interface modeling",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "detecting absent apptoapp authentication on crossdevice shortdistance channels",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 4607,
    "paper_ids": [
      3037
    ],
    "papers_without_artifact_ids": [
      3040,
      3042,
      5270,
      5308,
      5309,
      5307,
      5310
    ]
  },
  {
    "name": "Ahmed Bouhoula",
    "display_name": "Ahmed Bouhoula",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Automated Large-Scale Analysis of Cookie Notice Compliance",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4608,
    "paper_ids": [
      441
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Amit Zac",
    "display_name": "Amit Zac",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Automated Large-Scale Analysis of Cookie Notice Compliance",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4609,
    "paper_ids": [
      441
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tania Ghafourian",
    "display_name": "Tania Ghafourian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From the Childhood Past: Views of Young Adults on Parental Sharing of Children's Photos",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4610,
    "paper_ids": [
      4194
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Elizabeth Margolin",
    "display_name": "Elizabeth Margolin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "arboretum a planner for largescale federated analytics with differential privacy",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 4611,
    "paper_ids": [
      1076
    ],
    "papers_without_artifact_ids": [
      2729
    ]
  },
  {
    "name": "Ulysse Planta",
    "display_name": "Ulysse Planta",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Security of Programmable Logic Controllers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4612,
    "paper_ids": [
      2473
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Carlos E. Rubio-Medrano",
    "display_name": "Carlos E. Rubio-Medrano",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Security of Programmable Logic Controllers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "having your cake and eating it an analysis of concessionabuseasaservice",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4613,
    "paper_ids": [
      2473
    ],
    "papers_without_artifact_ids": [
      828
    ]
  },
  {
    "name": "Alvaro A. Cárdenas",
    "display_name": "Alvaro A. Cárdenas",
    "affiliation": "Univ. of California - Santa Cruz",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2022": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Security of Programmable Logic Controllers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "madiot 20 modern highwattage iot botnet attacks and defenses",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "savior securing autonomous vehicles with robust physical invariants",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 8055,
    "paper_ids": [
      2473
    ],
    "papers_without_artifact_ids": [
      5311,
      398
    ]
  },
  {
    "name": "Jacob Ginesin",
    "display_name": "Jacob Ginesin",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Formal Analysis of SCTP: Attack Synthesis and Patch Verification",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4615,
    "paper_ids": [
      4197
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Max von Hippel",
    "display_name": "Max von Hippel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Formal Analysis of SCTP: Attack Synthesis and Patch Verification",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4616,
    "paper_ids": [
      4197
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Evan Defloor",
    "display_name": "Evan Defloor",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Formal Analysis of SCTP: Attack Synthesis and Patch Verification",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4617,
    "paper_ids": [
      4197
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Tüxen",
    "display_name": "Michael Tüxen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Formal Analysis of SCTP: Attack Synthesis and Patch Verification",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8056,
    "paper_ids": [
      4197
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chongqing Lei",
    "display_name": "Chongqing Lei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4619,
    "paper_ids": [
      1874
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yan Yang",
    "display_name": "Yan Yang",
    "affiliation": "Yale University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "optimization and verification of artificial intelligence image recognition algorithm for transmission line defects",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 4620,
    "paper_ids": [
      1874
    ],
    "papers_without_artifact_ids": [
      5312
    ]
  },
  {
    "name": "Daniel Luick",
    "display_name": "Daniel Luick",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4621,
    "paper_ids": [
      2463
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "John C. Kolesar",
    "display_name": "John C. Kolesar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4622,
    "paper_ids": [
      2463
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "William R. Harris",
    "display_name": "William R. Harris",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4623,
    "paper_ids": [
      2463
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Roland Czerny",
    "display_name": "Roland Czerny",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4624,
    "paper_ids": [
      335
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simone Franza",
    "display_name": "Simone Franza",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4625,
    "paper_ids": [
      335
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Doreen Joseph",
    "display_name": "Doreen Joseph",
    "affiliation": "University of California, Davis",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4626,
    "paper_ids": [
      4191
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Soheil Salehi",
    "display_name": "Soheil Salehi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4627,
    "paper_ids": [
      4191
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Prasant Mohapatra",
    "display_name": "Prasant Mohapatra",
    "affiliation": "University of South Florida",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4628,
    "paper_ids": [
      4191
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benjamin Fuller 0001",
    "display_name": "Benjamin Fuller",
    "affiliation": "University of Connecticut",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark Recording",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4629,
    "paper_ids": [
      5313
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rashmi Pai",
    "display_name": "Rashmi Pai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark Recording",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4630,
    "paper_ids": [
      5313
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexander Russell",
    "display_name": "Alexander Russell",
    "affiliation": "University of Connecticut",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1
      },
      "ATC": {},
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark Recording",
        "conference": "USENIXSEC",
        "year": 2024,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4631,
    "paper_ids": [
      5313
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sebastian Poeplau",
    "display_name": "Sebastian Poeplau",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "ACSAC": {
        "2019": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Symbolic execution with SymCC: Don't interpret, compile!",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "systematic comparison of symbolic execution systems intermediate representation and its generation",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 4632,
    "paper_ids": [
      2954
    ],
    "papers_without_artifact_ids": [
      2955
    ]
  },
  {
    "name": "Shuofei Zhu",
    "display_name": "Shuofei Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4633,
    "paper_ids": [
      1527
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianjun Shi",
    "display_name": "Jianjun Shi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4634,
    "paper_ids": [
      1527
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Boqin Qin",
    "display_name": "Boqin Qin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4635,
    "paper_ids": [
      1527
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Linhai Song",
    "display_name": "Linhai Song",
    "affiliation": "Chinese Academy of Sciences",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4636,
    "paper_ids": [
      1527
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Charles Weir",
    "display_name": "Charles Weir",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4637,
    "paper_ids": [
      1239
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ben Hermann",
    "display_name": "Ben Hermann",
    "affiliation": "University of Stuttgart",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4638,
    "paper_ids": [
      1239
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stefan Steinegger",
    "display_name": "Stefan Steinegger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4639,
    "paper_ids": [
      271
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "HyungSeok Han",
    "display_name": "HyungSeok Han",
    "affiliation": "KAIST",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i experienced more than 10 defi scams on defi users perception of security breaches and countermeasures",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "precise and scalable detection of useaftercompactinggarbagecollection bugs",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4640,
    "paper_ids": [
      1714
    ],
    "papers_without_artifact_ids": [
      661,
      5314
    ]
  },
  {
    "name": "Lele Ma",
    "display_name": "Lele Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Silhouette: Efficient Protected Shadow Stacks for Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4641,
    "paper_ids": [
      2936
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Barry Whitehat",
    "display_name": "Barry Whitehat",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scaling Verifiable Computation Using Efficient Set Accumulators",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4642,
    "paper_ids": [
      3142
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lukas Bodner",
    "display_name": "Lukas Bodner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4643,
    "paper_ids": [
      3234
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Raphael Spreitzer",
    "display_name": "Raphael Spreitzer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4644,
    "paper_ids": [
      3234
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fnu Suya",
    "display_name": "Fnu Suya",
    "affiliation": "University of Tennessee",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4645,
    "paper_ids": [
      3239
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianfeng Chi",
    "display_name": "Jianfeng Chi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4646,
    "paper_ids": [
      3239
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Karim Eldefrawy",
    "display_name": "Karim Eldefrawy",
    "affiliation": "University of California, Irvine",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4647,
    "paper_ids": [
      1174
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pedro Malagón",
    "display_name": "Pedro Malagón",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8057,
    "paper_ids": [
      1429
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "José Manuel Moya",
    "display_name": "José Manuel Moya",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8058,
    "paper_ids": [
      1429
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jan Ruge",
    "display_name": "Jan Ruge",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4650,
    "paper_ids": [
      412
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Francesco Gringoli",
    "display_name": "Francesco Gringoli",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "NSDI": {
        "2010": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "maranello practical partial packet recovery for 80211",
        "conference": "NSDI",
        "year": 2010
      }
    ],
    "author_id": 4651,
    "paper_ids": [
      412
    ],
    "papers_without_artifact_ids": [
      5315
    ]
  },
  {
    "name": "Hyeonmin Lee",
    "display_name": "Hyeonmin Lee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "under the hood of dane mismanagement in smtp",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4652,
    "paper_ids": [
      2158
    ],
    "papers_without_artifact_ids": [
      2162
    ]
  },
  {
    "name": "Aniketh Gireesh",
    "display_name": "Aniketh Gireesh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4653,
    "paper_ids": [
      2158
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Roland van Rijswijk-Deij",
    "display_name": "Roland van Rijswijk-Deij",
    "affiliation": "University of Twente",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "irredicator pruning irr with rpkivalid bgp insights",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "under the hood of dane mismanagement in smtp",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4654,
    "paper_ids": [
      2158
    ],
    "papers_without_artifact_ids": [
      2160,
      2162
    ]
  },
  {
    "name": "Taekyoung Kwon 0001",
    "display_name": "Taekyoung Kwon",
    "affiliation": "Seoul National University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4655,
    "paper_ids": [
      2158
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shravan Narayan",
    "display_name": "Shravan Narayan",
    "affiliation": "University of Texas at Austin",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Retrofitting Fine Grain Isolation in the Firefox Renderer",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "swivel hardening webassembly against spectre",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4656,
    "paper_ids": [
      3197
    ],
    "papers_without_artifact_ids": [
      3201
    ]
  },
  {
    "name": "Craig Disselkoen",
    "display_name": "Craig Disselkoen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Retrofitting Fine Grain Isolation in the Firefox Renderer",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "swivel hardening webassembly against spectre",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4657,
    "paper_ids": [
      3197
    ],
    "papers_without_artifact_ids": [
      3201
    ]
  },
  {
    "name": "Tal Garfinkel",
    "display_name": "Tal Garfinkel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0,
      "ATC": 0,
      "NSDI": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "SOSP": {},
      "ATC": {},
      "NSDI": {
        "2025": 1,
        "2006": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Retrofitting Fine Grain Isolation in the Firefox Renderer",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the benefits and limitations of user interrupts for preemptive userspace scheduling",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "virtualization aware file systems getting beyond the limitations of virtual disks",
        "conference": "NSDI",
        "year": 2006
      }
    ],
    "author_id": 4658,
    "paper_ids": [
      3197
    ],
    "papers_without_artifact_ids": [
      3455,
      5316
    ]
  },
  {
    "name": "Nathan Froyd",
    "display_name": "Nathan Froyd",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Retrofitting Fine Grain Isolation in the Firefox Renderer",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4659,
    "paper_ids": [
      3197
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eric Rahm",
    "display_name": "Eric Rahm",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Retrofitting Fine Grain Isolation in the Firefox Renderer",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4660,
    "paper_ids": [
      3197
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sorin Lerner",
    "display_name": "Sorin Lerner",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Retrofitting Fine Grain Isolation in the Firefox Renderer",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4661,
    "paper_ids": [
      3197
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dhaval Kapil",
    "display_name": "Dhaval Kapil",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automatic Techniques to Systematically Discover New Heap Exploitation Primitives",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4662,
    "paper_ids": [
      655
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Paul Fiterau-Brostean",
    "display_name": "Paul Fiterau-Brostean",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Analysis of DTLS Implementations Using Protocol State Fuzzing",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4663,
    "paper_ids": [
      956
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bengt Jonsson 0001",
    "display_name": "Bengt Jonsson",
    "affiliation": "Uppsala University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Analysis of DTLS Implementations Using Protocol State Fuzzing",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4664,
    "paper_ids": [
      956
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joeri de Ruiter",
    "display_name": "Joeri de Ruiter",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "ACSAC": {
        "2017": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Analysis of DTLS Implementations Using Protocol State Fuzzing",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "traks a universal key management scheme for ertms",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 4665,
    "paper_ids": [
      956
    ],
    "papers_without_artifact_ids": [
      5317
    ]
  },
  {
    "name": "Konstantinos Sagonas",
    "display_name": "Konstantinos Sagonas",
    "affiliation": "Uppsala University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "SOSP": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Analysis of DTLS Implementations Using Protocol State Fuzzing",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4666,
    "paper_ids": [
      956
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shunfan Zhou",
    "display_name": "Shunfan Zhou",
    "affiliation": "USTC",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ferry stateaware symbolic execution for exploring statedependent program paths",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4667,
    "paper_ids": [
      230
    ],
    "papers_without_artifact_ids": [
      255
    ]
  },
  {
    "name": "Jie Xiang",
    "display_name": "Jie Xiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4668,
    "paper_ids": [
      230
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tai Yue",
    "display_name": "Tai Yue",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4669,
    "paper_ids": [
      5318
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pengfei Wang 0010",
    "display_name": "Pengfei Wang",
    "affiliation": "National University of Defense Technology, School of Computer Science, Changsha, China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deepgo predictive directed greybox fuzzing",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 4670,
    "paper_ids": [
      5318
    ],
    "papers_without_artifact_ids": [
      5319
    ]
  },
  {
    "name": "Yong Tang 0005",
    "display_name": "Yong Tang",
    "affiliation": "National University of Defense Technology, School of Computer, Changsha, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4671,
    "paper_ids": [
      5318
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Enze Wang",
    "display_name": "Enze Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4672,
    "paper_ids": [
      5318
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bo Yu 0008",
    "display_name": "Bo Yu",
    "affiliation": "National University of Defense Technology, College of Computer, Changsha, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4673,
    "paper_ids": [
      5318
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kai Lu 0001",
    "display_name": "Kai Lu",
    "affiliation": "BITS Pilani",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0,
      "FAST": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "SC": {},
      "FAST": {
        "2026": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "adacheck an adaptive checkpointing system for efficient llm training with redundancy utilization",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "deepgo predictive directed greybox fuzzing",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 4674,
    "paper_ids": [
      5318
    ],
    "papers_without_artifact_ids": [
      5320,
      5319
    ]
  },
  {
    "name": "Xu Zhou 0004",
    "display_name": "Xu Zhou",
    "affiliation": "Sun Yat-sen University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deepgo predictive directed greybox fuzzing",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 4675,
    "paper_ids": [
      5318
    ],
    "papers_without_artifact_ids": [
      5319
    ]
  },
  {
    "name": "Benjamin Kiesl",
    "display_name": "Benjamin Kiesl",
    "affiliation": "Amazon Web Services, Seattle, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4676,
    "paper_ids": [
      1878
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Niklas Medinger",
    "display_name": "Niklas Medinger",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4677,
    "paper_ids": [
      1878
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Boyou Zhou",
    "display_name": "Boyou Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PHMon: A Programmable Hardware Monitor and Its Security Use Cases",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4678,
    "paper_ids": [
      796
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Schuyler Eldridge",
    "display_name": "Schuyler Eldridge",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PHMon: A Programmable Hardware Monitor and Its Security Use Cases",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4679,
    "paper_ids": [
      796
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonghwan Kim",
    "display_name": "Jonghwan Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4680,
    "paper_ids": [
      3790
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Brent ByungHoon Kang",
    "display_name": "Brent ByungHoon Kang",
    "affiliation": "KAIST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4681,
    "paper_ids": [
      3790
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiayi Chen",
    "display_name": "Jiayi Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chaperone: Real-time Locking and Loss Prevention for Smartphones",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sharing without scaring enabling smartphones to become aware of temporary sharing",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4682,
    "paper_ids": [
      5321
    ],
    "papers_without_artifact_ids": [
      5322
    ]
  },
  {
    "name": "Urs Hengartner",
    "display_name": "Urs Hengartner",
    "affiliation": "University of Waterloo",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1,
        "2021": 1
      },
      "ACSAC": {
        "2019": 1
      },
      "PETS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chaperone: Real-time Locking and Loss Prevention for Smartphones",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sharing without scaring enabling smartphones to become aware of temporary sharing",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "concerned but ineffective user perceptions methods and challenges when sanitizing old devices for disposal",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "appveto mobile application selfdefense through resource access veto",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 4683,
    "paper_ids": [
      5321
    ],
    "papers_without_artifact_ids": [
      5322,
      5323,
      5324
    ]
  },
  {
    "name": "Hassan Khan",
    "display_name": "Hassan Khan",
    "affiliation": "University of Guelph",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chaperone: Real-time Locking and Loss Prevention for Smartphones",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "im regretting that i hit run insitu assessment of potential malware",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "my privacy for their security employees privacy perspectives and expectations when using enterprise security software",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "sharing without scaring enabling smartphones to become aware of temporary sharing",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "concerned but ineffective user perceptions methods and challenges when sanitizing old devices for disposal",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "widely reused and shared infrequently updated and sometimes inherited a holistic view of pin authentication in digital lives and beyond",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 4684,
    "paper_ids": [
      5321
    ],
    "papers_without_artifact_ids": [
      5325,
      5326,
      5322,
      5323,
      878
    ]
  },
  {
    "name": "Mohammad Mannan",
    "display_name": "Mohammad Mannan",
    "affiliation": "Concordia University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1
      },
      "ACSAC": {
        "2019": 1,
        "2020": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chaperone: Real-time Locking and Loss Prevention for Smartphones",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "racing for tls certificate validation a hijackers guide to the android tls galaxy",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "my privacy for their security employees privacy perspectives and expectations when using enterprise security software",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "rebootoriented iot life cycle management in trusted execution environment for disposable iot devices",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "betrayed by the guardian security and privacy risks of parental control solutions",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "appveto mobile application selfdefense through resource access veto",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 4685,
    "paper_ids": [
      5321
    ],
    "papers_without_artifact_ids": [
      5327,
      5326,
      5328,
      5329,
      5324
    ]
  },
  {
    "name": "Guillaume Girol",
    "display_name": "Guillaume Girol",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4686,
    "paper_ids": [
      442
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Iaroslav Gridin",
    "display_name": "Iaroslav Gridin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Certified Side Channels",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4687,
    "paper_ids": [
      2251
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrea Possemato",
    "display_name": "Andrea Possemato",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards HTTPS Everywhere on Android: We Are Not There Yet",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4688,
    "paper_ids": [
      4218
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seyedhamed Ghavamnia",
    "display_name": "Seyedhamed Ghavamnia",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "EUROSYS": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Temporal System Call Specialization for Attack Surface Reduction",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "leakless selective data protection against memory leakage attacks for serverless platforms",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 4689,
    "paper_ids": [
      2988
    ],
    "papers_without_artifact_ids": [
      2990
    ]
  },
  {
    "name": "Fabian Schwarz",
    "display_name": "Fabian Schwarz",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1
      },
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "keyvisor a lightweight isa extension for protected key handles with cpuenforced usage policies",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "00seven reenabling virtual machine forensics introspecting confidential vms using privileged invm agents",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4690,
    "paper_ids": [
      847
    ],
    "papers_without_artifact_ids": [
      851,
      853
    ]
  },
  {
    "name": "Baozheng Liu",
    "display_name": "Baozheng Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FANS: Fuzzing Android Native System Services via Automated Interface Analysis",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4691,
    "paper_ids": [
      1884
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guang Gong",
    "display_name": "Guang Gong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "CHES": {
        "2023": 1
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FANS: Fuzzing Android Native System Services via Automated Interface Analysis",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "speeding up multiscalar multiplication over fixed points towards efficient zksnarks",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "polaris transparent succinct zeroknowledge arguments for r1cs with efficient verifier",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 4692,
    "paper_ids": [
      1884
    ],
    "papers_without_artifact_ids": [
      5330,
      5331
    ]
  },
  {
    "name": "Yishun Zeng",
    "display_name": "Yishun Zeng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FANS: Fuzzing Android Native System Services via Automated Interface Analysis",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "eagleye exposing hidden web interfaces in iot devices via routing analysis",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 4693,
    "paper_ids": [
      1884
    ],
    "papers_without_artifact_ids": [
      1888
    ]
  },
  {
    "name": "Haifeng Ruan",
    "display_name": "Haifeng Ruan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FANS: Fuzzing Android Native System Services via Automated Interface Analysis",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4694,
    "paper_ids": [
      1884
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abraham A. Clements",
    "display_name": "Abraham A. Clements",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4695,
    "paper_ids": [
      9
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Paul Grosen",
    "display_name": "Paul Grosen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4696,
    "paper_ids": [
      9
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Fritz",
    "display_name": "David Fritz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4697,
    "paper_ids": [
      9
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Noel Warford",
    "display_name": "Noel Warford",
    "affiliation": "University of Maryland",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how entertainment journalists manage online hate and harassment",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "how library it staff navigate privacy and security challenges and responsibilities",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "strategies and perceived risks of sending sensitive documents",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4698,
    "paper_ids": [
      1259
    ],
    "papers_without_artifact_ids": [
      1267,
      1272,
      876
    ]
  },
  {
    "name": "Amritha Jayanti",
    "display_name": "Amritha Jayanti",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4699,
    "paper_ids": [
      1259
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aravind Koneru",
    "display_name": "Aravind Koneru",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4700,
    "paper_ids": [
      1259
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sean Kross",
    "display_name": "Sean Kross",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4701,
    "paper_ids": [
      1259
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Miraida Morales",
    "display_name": "Miraida Morales",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4702,
    "paper_ids": [
      1259
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rock Stevens",
    "display_name": "Rock Stevens",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4703,
    "paper_ids": [
      1259
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Antonio Flores-Montoya",
    "display_name": "Antonio Flores-Montoya",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Datalog Disassembly",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4704,
    "paper_ids": [
      5332
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eric M. Schulte",
    "display_name": "Eric M. Schulte",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Datalog Disassembly",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4705,
    "paper_ids": [
      5332
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Harry A. Kalodner",
    "display_name": "Harry A. Kalodner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 0,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "EUROSYS": {},
      "PETS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BlockSci: Design and applications of a blockchain analysis platform",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4706,
    "paper_ids": [
      3241
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Malte Möser",
    "display_name": "Malte Möser",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "PETS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BlockSci: Design and applications of a blockchain analysis platform",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8059,
    "paper_ids": [
      3241
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kevin Lee",
    "display_name": "Kevin Lee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 2,
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BlockSci: Design and applications of a blockchain analysis platform",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "password policies of most top websites fail to follow best practices",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "adapting security warnings to counter online disinformation",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "an empirical study of wireless carrier authentication for sim swaps",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4708,
    "paper_ids": [
      3241
    ],
    "papers_without_artifact_ids": [
      5333,
      4278,
      4279
    ]
  },
  {
    "name": "Steven Goldfeder",
    "display_name": "Steven Goldfeder",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      },
      "PETS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BlockSci: Design and applications of a blockchain analysis platform",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4709,
    "paper_ids": [
      3241
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Plattner",
    "display_name": "Martin Plattner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BlockSci: Design and applications of a blockchain analysis platform",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4710,
    "paper_ids": [
      3241
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arvind Narayanan",
    "display_name": "Arvind Narayanan",
    "affiliation": "Princeton University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 2,
        "2022": 1,
        "2021": 1
      },
      "PETS": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BlockSci: Design and applications of a blockchain analysis platform",
        "conference": "USENIXSEC",
        "year": 2020,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "password policies of most top websites fail to follow best practices",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "virtual classrooms and real harms remote learning at us universities",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "no boundaries data exfiltration by third parties embedded on web pages",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "an empirical study of wireless carrier authentication for sim swaps",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4711,
    "paper_ids": [
      3241
    ],
    "papers_without_artifact_ids": [
      5333,
      5334,
      4315,
      4279
    ]
  },
  {
    "name": "David Fifield",
    "display_name": "David Fifield",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 3,
      "PETS": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2019": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1
      },
      "PETS": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A better zip bomb",
        "conference": "WOOT",
        "year": 2019,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "wallbleed a memory disclosure vulnerability in the great firewall of china",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "snowflake a censorship circumvention system using temporary webrtc proxies",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "network responses to russias invasion of ukraine in 2022 a cautionary tale for internet freedom",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "turbo tunnel a good way to design censorship circumvention protocols",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4712,
    "paper_ids": [
      5335
    ],
    "papers_without_artifact_ids": [
      888,
      5336,
      4187,
      5337
    ]
  },
  {
    "name": "Benedikt Radtke",
    "display_name": "Benedikt Radtke",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2019": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing",
        "conference": "WOOT",
        "year": 2019,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4713,
    "paper_ids": [
      4221
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bastian Harren",
    "display_name": "Bastian Harren",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2019": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing",
        "conference": "WOOT",
        "year": 2019,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4714,
    "paper_ids": [
      4221
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hadrien Barral",
    "display_name": "Hadrien Barral",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2019": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RISC-V: #AlphanumericShellcoding",
        "conference": "WOOT",
        "year": 2019,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4715,
    "paper_ids": [
      5338
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rémi Géraud-Stewart",
    "display_name": "Rémi Géraud-Stewart",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2019": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RISC-V: #AlphanumericShellcoding",
        "conference": "WOOT",
        "year": 2019,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8060,
    "paper_ids": [
      5338
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Georges-Axel Jaloyan",
    "display_name": "Georges-Axel Jaloyan",
    "affiliation": "École Normale Supérieure",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2019": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RISC-V: #AlphanumericShellcoding",
        "conference": "WOOT",
        "year": 2019,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4717,
    "paper_ids": [
      5338
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Naccache",
    "display_name": "David Naccache",
    "affiliation": "Ecole Normale Superieure",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "CHES": 0,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2019": 1
      },
      "CHES": {},
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RISC-V: #AlphanumericShellcoding",
        "conference": "WOOT",
        "year": 2019,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4718,
    "paper_ids": [
      5338
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Johannes Pohl",
    "display_name": "Johannes Pohl",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2019": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automatic Wireless Protocol Reverse Engineering",
        "conference": "WOOT",
        "year": 2019,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4719,
    "paper_ids": [
      5339
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andreas Noack",
    "display_name": "Andreas Noack",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2019": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automatic Wireless Protocol Reverse Engineering",
        "conference": "WOOT",
        "year": 2019,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4720,
    "paper_ids": [
      5339
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jithin Pavithran",
    "display_name": "Jithin Pavithran",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2019": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation",
        "conference": "WOOT",
        "year": 2019,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4721,
    "paper_ids": [
      5340
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Milan Patnaik",
    "display_name": "Milan Patnaik",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2019": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation",
        "conference": "WOOT",
        "year": 2019,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4722,
    "paper_ids": [
      5340
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chester Rebeiro",
    "display_name": "Chester Rebeiro",
    "affiliation": "IIT Madras",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "WOOT": 1,
      "CHES": 2,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2019": 1
      },
      "CHES": {
        "2025": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation",
        "conference": "WOOT",
        "year": 2019,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tesla trusted execution support for legacy embedded applications",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "whisperfuzz whitebox fuzzing for detecting and locating timing vulnerabilities in processors",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "faultmeter quantitative fault attack assessment of block cipher software",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "jugaad comprehensive malware behaviorasaservice",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4723,
    "paper_ids": [
      5340
    ],
    "papers_without_artifact_ids": [
      5341,
      2310,
      5342,
      5343
    ]
  },
  {
    "name": "Branimir Pervan",
    "display_name": "Branimir Pervan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2019": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Distributed Password Hash Computation on Commodity Heterogeneous Programmable Platforms",
        "conference": "WOOT",
        "year": 2019,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4724,
    "paper_ids": [
      5344
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Josip Knezovic",
    "display_name": "Josip Knezovic",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2019": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Distributed Password Hash Computation on Commodity Heterogeneous Programmable Platforms",
        "conference": "WOOT",
        "year": 2019,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4725,
    "paper_ids": [
      5344
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Katja Pericin",
    "display_name": "Katja Pericin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2019": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2019
    ],
    "year_range": "2019-2019",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Distributed Password Hash Computation on Commodity Heterogeneous Programmable Platforms",
        "conference": "WOOT",
        "year": 2019,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4726,
    "paper_ids": [
      5344
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jana Hofmann",
    "display_name": "Jana Hofmann",
    "affiliation": "Max Planck Society",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4727,
    "paper_ids": [
      4188
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Emanuele Vannacci",
    "display_name": "Emanuele Vannacci",
    "affiliation": "Vrije Universiteit Amsterdam",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "smash synchronized manysided rowhammer attacks from javascript",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4728,
    "paper_ids": [
      4188
    ],
    "papers_without_artifact_ids": [
      96
    ]
  },
  {
    "name": "Oleksii Oleksenko",
    "display_name": "Oleksii Oleksenko",
    "affiliation": "Microsoft Research",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1
      },
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "specfuzz bringing spectretype vulnerabilities to the surface",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4729,
    "paper_ids": [
      4188
    ],
    "papers_without_artifact_ids": [
      3816
    ]
  },
  {
    "name": "Neophytos Christou",
    "display_name": "Neophytos Christou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "quack hindering deserialization attacks via static duck typing",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 4730,
    "paper_ids": [
      3793
    ],
    "papers_without_artifact_ids": [
      3667
    ]
  },
  {
    "name": "Vaggelis Atlidakis",
    "display_name": "Vaggelis Atlidakis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 0,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "EUROSYS": {},
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "epf evil packet filter",
        "conference": "ATC",
        "year": 2023
      }
    ],
    "author_id": 4731,
    "paper_ids": [
      3793
    ],
    "papers_without_artifact_ids": [
      4113
    ]
  },
  {
    "name": "Moshe Kol",
    "display_name": "Moshe Kol",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Device Tracking via Linux's New TCP Source Port Selection Algorithm",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "groove flexible metadataprivate messaging",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 4732,
    "paper_ids": [
      3242
    ],
    "papers_without_artifact_ids": [
      988
    ]
  },
  {
    "name": "Hamid Mozaffari",
    "display_name": "Hamid Mozaffari",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4733,
    "paper_ids": [
      883
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zixuan Wang 0027",
    "display_name": "Zixuan Wang",
    "affiliation": "University of California, San Diego",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4734,
    "paper_ids": [
      3221
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Moghimi",
    "display_name": "Daniel Moghimi",
    "affiliation": "Google",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "ACSAC": 0,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 3,
        "2023": 2,
        "2021": 1
      },
      "ACSAC": {},
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "generalized power attacks against crypto hardware using longrange deep learning",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "downfall exploiting speculative data gathering",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "swivel hardening webassembly against spectre",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "medusa microarchitectural data leakage via automated attack synthesis",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "copycat controlled instructionlevel attacks on enclaves",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "tpmfail tpm meets timing and lattice attacks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4735,
    "paper_ids": [
      3221
    ],
    "papers_without_artifact_ids": [
      5345,
      5346,
      3201,
      334,
      1447,
      1435
    ]
  },
  {
    "name": "Jishen Zhao",
    "display_name": "Jishen Zhao",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4736,
    "paper_ids": [
      3221
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rohit Chouhan",
    "display_name": "Rohit Chouhan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SAFER: Efficient and Error-Tolerant Binary Instrumentation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4737,
    "paper_ids": [
      4025
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Brett Hemenway Falk",
    "display_name": "Brett Hemenway Falk",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GigaDORAM: Breaking the Billion Address Barrier",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4738,
    "paper_ids": [
      5347
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rafail Ostrovsky",
    "display_name": "Rafail Ostrovsky",
    "affiliation": "Univ. of California - Los Angeles",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GigaDORAM: Breaking the Billion Address Barrier",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rabbitmix robust algebraic anonymous broadcast from additive bases",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4739,
    "paper_ids": [
      5347
    ],
    "papers_without_artifact_ids": [
      5348
    ]
  },
  {
    "name": "Matan Shtepel",
    "display_name": "Matan Shtepel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GigaDORAM: Breaking the Billion Address Barrier",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4740,
    "paper_ids": [
      5347
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jacob Zhang",
    "display_name": "Jacob Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GigaDORAM: Breaking the Billion Address Barrier",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4741,
    "paper_ids": [
      5347
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ian Chang",
    "display_name": "Ian Chang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HOLMES: Efficient Distribution Testing for Secure Collaborative Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4742,
    "paper_ids": [
      4234
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Katerina Sotiraki",
    "display_name": "Katerina Sotiraki",
    "affiliation": "Yale University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HOLMES: Efficient Distribution Testing for Secure Collaborative Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4743,
    "paper_ids": [
      4234
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Raluca A. Popa",
    "display_name": "Raluca A. Popa",
    "affiliation": "Univ. of California - Berkeley",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HOLMES: Efficient Distribution Testing for Secure Collaborative Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4744,
    "paper_ids": [
      4234
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingtian Tao",
    "display_name": "Mingtian Tao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BunnyHop: Exploiting the Instruction Prefetcher",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4745,
    "paper_ids": [
      1499
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sioli O'Connell",
    "display_name": "Sioli O'Connell",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BunnyHop: Exploiting the Instruction Prefetcher",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pixel thief exploiting svg filter leakage in firefox and chrome",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "primeprobe 1 javascript 0 overcoming browserbased sidechannel defenses",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4746,
    "paper_ids": [
      1499
    ],
    "papers_without_artifact_ids": [
      1504,
      1509
    ]
  },
  {
    "name": "Nicholas Deily",
    "display_name": "Nicholas Deily",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4747,
    "paper_ids": [
      171
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tao Ju",
    "display_name": "Tao Ju",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4748,
    "paper_ids": [
      171
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Uday Jammalamadaka",
    "display_name": "Uday Jammalamadaka",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4749,
    "paper_ids": [
      171
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hyungseok Kim 0002",
    "display_name": "Hyungseok Kim",
    "affiliation": "KAIST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Reassembly is Hard: A Reflection on Challenges and Strategies",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4750,
    "paper_ids": [
      2477
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Soomin Kim 0002",
    "display_name": "Soomin Kim",
    "affiliation": "KAIST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Reassembly is Hard: A Reflection on Challenges and Strategies",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4751,
    "paper_ids": [
      2477
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junoh Lee",
    "display_name": "Junoh Lee",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Reassembly is Hard: A Reflection on Challenges and Strategies",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4752,
    "paper_ids": [
      2477
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniël Reijsbergen",
    "display_name": "Daniël Reijsbergen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TAP: Transparent and Privacy-Preserving Data Services",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8061,
    "paper_ids": [
      836
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aung Maw",
    "display_name": "Aung Maw",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TAP: Transparent and Privacy-Preserving Data Services",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4754,
    "paper_ids": [
      836
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tien Tuan Anh Dinh",
    "display_name": "Tien Tuan Anh Dinh",
    "affiliation": "SUTD",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 2,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {
        "2021": 1,
        "2022": 1
      },
      "PETS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TAP: Transparent and Privacy-Preserving Data Services",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "if you cant beat them pay them bitcoin protection racket is profitable",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "group timebased onetime passwords and its application to efficient privacypreserving proof of location",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 4755,
    "paper_ids": [
      836
    ],
    "papers_without_artifact_ids": [
      842,
      843
    ]
  },
  {
    "name": "Feng Wei",
    "display_name": "Feng Wei",
    "affiliation": "University at Buffalo",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4756,
    "paper_ids": [
      1200
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hongda Li 0002",
    "display_name": "Hongda Li",
    "affiliation": "Clemson University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4757,
    "paper_ids": [
      1200
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marco Chilese",
    "display_name": "Marco Chilese",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4758,
    "paper_ids": [
      2302
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Reham Mohamed 0002",
    "display_name": "Reham Mohamed",
    "affiliation": "TU Darmstadt, CYSEC, Germany",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4759,
    "paper_ids": [
      2302
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Markus Miettinen",
    "display_name": "Markus Miettinen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "ACSAC": {
        "2023": 1,
        "2020": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "crowdguard federated backdoor detection in federated learning",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "unleashing iot security assessing the effectiveness of best practices in protecting against threats",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "flame taming backdoors in federated learning",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "leakypick iot audio spy detector",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 4760,
    "paper_ids": [
      2302
    ],
    "papers_without_artifact_ids": [
      2308,
      2314,
      2318,
      2268
    ]
  },
  {
    "name": "Bo Hui 0002",
    "display_name": "Bo Hui",
    "affiliation": "VU Amsterdam",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4761,
    "paper_ids": [
      458
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haolin Yuan",
    "display_name": "Haolin Yuan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "webally making visual taskbased captchas transferable for people with visual impairments",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4762,
    "paper_ids": [
      458
    ],
    "papers_without_artifact_ids": [
      5349
    ]
  },
  {
    "name": "Mikhail Bogodukhov",
    "display_name": "Mikhail Bogodukhov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Instructions Unclear: Undefined Behaviour in Cellular Network Specifications",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4763,
    "paper_ids": [
      1537
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Rupprecht",
    "display_name": "David Rupprecht",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Instructions Unclear: Undefined Behaviour in Cellular Network Specifications",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the attacks arent alright largescale simulation of fake base station attacks and detections",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "call me maybe eavesdropping encrypted lte calls with revolte",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4764,
    "paper_ids": [
      1537
    ],
    "papers_without_artifact_ids": [
      5350,
      121
    ]
  },
  {
    "name": "Xiangyu Qi",
    "display_name": "Xiangyu Qi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards A Proactive ML Approach for Detecting Backdoor Poison Samples",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4765,
    "paper_ids": [
      127
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tinghao Xie",
    "display_name": "Tinghao Xie",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards A Proactive ML Approach for Detecting Backdoor Poison Samples",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4766,
    "paper_ids": [
      127
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiachen T. Wang",
    "display_name": "Jiachen T. Wang",
    "affiliation": "Princeton University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards A Proactive ML Approach for Detecting Backdoor Poison Samples",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4767,
    "paper_ids": [
      127
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sihang Liu 0001",
    "display_name": "Sihang Liu",
    "affiliation": "University of Waterloo",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 1,
      "EUROSYS": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Side-Channel Attacks on Optane Persistent Memory",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "nearpm a neardata processing system for storageclass applications",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "a cloudscale characterization of remote procedure calls",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "carbink faulttolerant far memory",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 4768,
    "paper_ids": [
      336
    ],
    "papers_without_artifact_ids": [
      5351,
      5352,
      5059
    ]
  },
  {
    "name": "Suraaj Kanniwadi",
    "display_name": "Suraaj Kanniwadi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Side-Channel Attacks on Optane Persistent Memory",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4769,
    "paper_ids": [
      336
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Samira Manabi Khan",
    "display_name": "Samira Manabi Khan",
    "affiliation": "University of Virginia",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Side-Channel Attacks on Optane Persistent Memory",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "nearpm a neardata processing system for storageclass applications",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "a cloudscale characterization of remote procedure calls",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 4770,
    "paper_ids": [
      336
    ],
    "papers_without_artifact_ids": [
      5351,
      5352
    ]
  },
  {
    "name": "Taesung Lee",
    "display_name": "Taesung Lee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "URET: Universal Robustness Evaluation Toolkit (for Evasion)",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4771,
    "paper_ids": [
      4236
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ian M. Molloy",
    "display_name": "Ian M. Molloy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "SOSP": {},
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "URET: Universal Robustness Evaluation Toolkit (for Evasion)",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4772,
    "paper_ids": [
      4236
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Masha Zorin",
    "display_name": "Masha Zorin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "URET: Universal Robustness Evaluation Toolkit (for Evasion)",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4773,
    "paper_ids": [
      4236
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Elena Korkes",
    "display_name": "Elena Korkes",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Educators' Perspectives of Using (or Not Using) Online Exam Proctoring",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the same pin just longer on the insecurity of upgrading pins from 4 to 6 digits",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4774,
    "paper_ids": [
      859
    ],
    "papers_without_artifact_ids": [
      867
    ]
  },
  {
    "name": "Yu-Fu Fu",
    "display_name": "Yu-Fu Fu",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "autofz: Automated Fuzzer Composition at Runtime",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4775,
    "paper_ids": [
      656
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jae-Hyuk Lee",
    "display_name": "Jae-Hyuk Lee",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "SOSP": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "autofz: Automated Fuzzer Composition at Runtime",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4776,
    "paper_ids": [
      656
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianhao Xu",
    "display_name": "Jianhao Xu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4777,
    "paper_ids": [
      10
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhengjie Du",
    "display_name": "Zhengjie Du",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4778,
    "paper_ids": [
      10
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhu Ding",
    "display_name": "Zhu Ding",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4779,
    "paper_ids": [
      10
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Linke Li",
    "display_name": "Linke Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4780,
    "paper_ids": [
      10
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qiushi Wu",
    "display_name": "Qiushi Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2021": 1
      },
      "ACSAC": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gnnic finding longlost sibling functions with abstract similarity",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "osaware vulnerability prioritization via differential severity analysis",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "understanding and detecting disordered error handling with precise function pairing",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4781,
    "paper_ids": [
      10
    ],
    "papers_without_artifact_ids": [
      2141,
      3161,
      3963
    ]
  },
  {
    "name": "Abderrahmen Amich",
    "display_name": "Abderrahmen Amich",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "morphence moving target defense against adversarial examples",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 4782,
    "paper_ids": [
      3253
    ],
    "papers_without_artifact_ids": [
      5353
    ]
  },
  {
    "name": "Birhanu Eshete",
    "display_name": "Birhanu Eshete",
    "affiliation": "University of Michigan-Dearborn",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "PETS": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "miashield defending membership inference attacks via preemptive exclusion of members",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "morphence moving target defense against adversarial examples",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 4783,
    "paper_ids": [
      3253
    ],
    "papers_without_artifact_ids": [
      5354,
      5353
    ]
  },
  {
    "name": "Matthew D. Green",
    "display_name": "Matthew D. Green",
    "affiliation": "Johns Hopkins University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "McFIL: Model Counting Functionality-Inherent Leakage",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4784,
    "paper_ids": [
      459
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lukas Seidel",
    "display_name": "Lukas Seidel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Forming Faster Firmware Fuzzers",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4785,
    "paper_ids": [
      1519
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anna Pätschke",
    "display_name": "Anna Pätschke",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8062,
    "paper_ids": [
      1430
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yazhou Tu",
    "display_name": "Yazhou Tu",
    "affiliation": "Auburn University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4787,
    "paper_ids": [
      2209
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Liqun Shan",
    "display_name": "Liqun Shan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4788,
    "paper_ids": [
      2209
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Md. Imran Hossen",
    "display_name": "Md. Imran Hossen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4789,
    "paper_ids": [
      2209
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiali Hei 0001",
    "display_name": "Xiali Hei",
    "affiliation": "Univ. of Louisiana - Lafayette",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4790,
    "paper_ids": [
      2209
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Santiago Cuéllar",
    "display_name": "Santiago Cuéllar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8063,
    "paper_ids": [
      2464
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bill Harris",
    "display_name": "Bill Harris",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4792,
    "paper_ids": [
      2464
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stuart Pernsteiner",
    "display_name": "Stuart Pernsteiner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4793,
    "paper_ids": [
      2464
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shani Stajnrod",
    "display_name": "Shani Stajnrod",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4794,
    "paper_ids": [
      3150
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhaofeng Chen",
    "display_name": "Zhaofeng Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Verified Confidential Computing as a Service Framework for Privacy Preservation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4795,
    "paper_ids": [
      597
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minyeop Choi",
    "display_name": "Minyeop Choi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BotScreen: Trust Everybody, but Cut the Aimbots Yourself",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4796,
    "paper_ids": [
      2478
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gihyuk Ko",
    "display_name": "Gihyuk Ko",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BotScreen: Trust Everybody, but Cut the Aimbots Yourself",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4797,
    "paper_ids": [
      2478
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jialai Wang",
    "display_name": "Jialai Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improving mlbased binary function similarity detection by assessing and deprioritizing control flow graph features",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4798,
    "paper_ids": [
      545
    ],
    "papers_without_artifact_ids": [
      563
    ]
  },
  {
    "name": "Ziyuan Zhang",
    "display_name": "Ziyuan Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4799,
    "paper_ids": [
      545
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Meiqi Wang",
    "display_name": "Meiqi Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4800,
    "paper_ids": [
      545
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Han Qiu 0001",
    "display_name": "Han Qiu",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4801,
    "paper_ids": [
      545
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zongpeng Li",
    "display_name": "Zongpeng Li",
    "affiliation": "University of Calgary",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improving mlbased binary function similarity detection by assessing and deprioritizing control flow graph features",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4802,
    "paper_ids": [
      545
    ],
    "papers_without_artifact_ids": [
      563
    ]
  },
  {
    "name": "Jonathan Prokos",
    "display_name": "Jonathan Prokos",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4803,
    "paper_ids": [
      460
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Neil Fendley",
    "display_name": "Neil Fendley",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4804,
    "paper_ids": [
      460
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yi Zeng 0005",
    "display_name": "Yi Zeng",
    "affiliation": "Virginia Tech, Blacksburg, VA, USA",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "asset robust backdoor data detection across a multiplicity of deep learning paradigms",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4805,
    "paper_ids": [
      5355
    ],
    "papers_without_artifact_ids": [
      5356
    ]
  },
  {
    "name": "Minzhou Pan",
    "display_name": "Minzhou Pan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "asset robust backdoor data detection across a multiplicity of deep learning paradigms",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4806,
    "paper_ids": [
      5355
    ],
    "papers_without_artifact_ids": [
      5356
    ]
  },
  {
    "name": "Himanshu Jahagirdar",
    "display_name": "Himanshu Jahagirdar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4807,
    "paper_ids": [
      5355
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ming Jin 0002",
    "display_name": "Ming Jin",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4808,
    "paper_ids": [
      5355
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lingjuan Lyu",
    "display_name": "Lingjuan Lyu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unveiling the secrets without data can graph neural networks be exploited through datafree model extraction attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "asset robust backdoor data detection across a multiplicity of deep learning paradigms",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4809,
    "paper_ids": [
      5355
    ],
    "papers_without_artifact_ids": [
      5032,
      5356
    ]
  },
  {
    "name": "Ruoxi Jia 0001",
    "display_name": "Ruoxi Jia",
    "affiliation": "Virginia Tech",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2
      },
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "asset robust backdoor data detection across a multiplicity of deep learning paradigms",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "dplis boosting utility of differentially private deep learning via randomized smoothing",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 4810,
    "paper_ids": [
      5355
    ],
    "papers_without_artifact_ids": [
      5356,
      3285
    ]
  },
  {
    "name": "Conrad Watt",
    "display_name": "Conrad Watt",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Capstone: A Capability-based Foundation for Trustless Secure Memory Access",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4811,
    "paper_ids": [
      1767
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aditya Badole",
    "display_name": "Aditya Badole",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Capstone: A Capability-based Foundation for Trustless Secure Memory Access",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4812,
    "paper_ids": [
      1767
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sixiang Gao",
    "display_name": "Sixiang Gao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "EnigMap: External-Memory Oblivious Map for Secure Enclaves",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4813,
    "paper_ids": [
      2490
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yutao Dong",
    "display_name": "Yutao Dong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4814,
    "paper_ids": [
      5357
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qing Li 0006",
    "display_name": "Qing Li",
    "affiliation": "Sun Yat-sen University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ATC": {
        "2024": 3
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "qdsr accelerating layer7 load balancing by direct server return with quic",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "kepcpush a knowledgeenhanced proactive content push strategy for edgeassisted video feed streaming",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "etc an elastic transmission control using endtoend available bandwidth perception",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 4815,
    "paper_ids": [
      5357
    ],
    "papers_without_artifact_ids": [
      5358,
      5359,
      5360
    ]
  },
  {
    "name": "Kaidong Wu",
    "display_name": "Kaidong Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4816,
    "paper_ids": [
      5357
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ruoyu Li 0003",
    "display_name": "Ruoyu Li",
    "affiliation": "Shenzhen University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4817,
    "paper_ids": [
      5357
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dan Zhao 0003",
    "display_name": "Dan Zhao",
    "affiliation": "Peng Cheng Laboratory, Department of Strategic and Advanced Interdisciplinary Research, Shenzhen, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4818,
    "paper_ids": [
      5357
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gareth Tyson",
    "display_name": "Gareth Tyson",
    "affiliation": "HKUST",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 1,
      "NSDI": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "ATC": {
        "2024": 1
      },
      "NSDI": {
        "2024": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "measuring the accuracy and effectiveness of pii removal services",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "etc an elastic transmission control using endtoend available bandwidth perception",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "the eternal tussle exploring the role of centralization in ipfs",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "guardians of the galaxy content moderation in the interplanetary file system",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4819,
    "paper_ids": [
      5357
    ],
    "papers_without_artifact_ids": [
      3317,
      5360,
      5361,
      4587
    ]
  },
  {
    "name": "Junkun Peng",
    "display_name": "Junkun Peng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4820,
    "paper_ids": [
      5357
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yong Jiang 0001",
    "display_name": "Yong Jiang",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0,
      "ATC": 3,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "SOSP": {},
      "ATC": {
        "2024": 3
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "qdsr accelerating layer7 load balancing by direct server return with quic",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "kepcpush a knowledgeenhanced proactive content push strategy for edgeassisted video feed streaming",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "etc an elastic transmission control using endtoend available bandwidth perception",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "a multitab website fingerprinting attack",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 4821,
    "paper_ids": [
      5357
    ],
    "papers_without_artifact_ids": [
      5358,
      5359,
      5360,
      577
    ]
  },
  {
    "name": "Shutao Xia",
    "display_name": "Shutao Xia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4822,
    "paper_ids": [
      5357
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingwei Xu 0001",
    "display_name": "Mingwei Xu",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 11,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "EUROSYS": 1,
      "ATC": 2,
      "NSDI": 4,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2024": 1,
        "2023": 1
      },
      "NSDI": {
        "2024": 2,
        "2023": 1,
        "2022": 1
      },
      "NDSS": {
        "2024": 2
      }
    },
    "artifact_rate": 9.1,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "superfe a scalable and flexible feature extractor for mlbased traffic analysis applications",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "etc an elastic transmission control using endtoend available bandwidth perception",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "pencil private and extensible collaborative learning without the noncolluding assumption",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "lordma a new lowrate dos attack in rdma networks",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "brainonswitch towards advanced intelligent network data plane via nndriven traffic analysis at linespeed",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "hairpin rethinking packet loss recovery in edgebased interactive video streaming",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "learning with semantics towards a semanticsaware routing anomaly detection system",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "bridging the gap between qoe and qos in congestion control a largescale mobile web service perspective",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "enabling high quality realtime communications with adaptive framerate",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "imap fast and scalable innetwork scanning with programmable switches",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 4823,
    "paper_ids": [
      5357
    ],
    "papers_without_artifact_ids": [
      5362,
      5360,
      554,
      4930,
      560,
      1205,
      566,
      5363,
      1206,
      1207
    ]
  },
  {
    "name": "Tamer Abdelaziz",
    "display_name": "Tamer Abdelaziz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Smart Learning to Find Dumb Contracts",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4824,
    "paper_ids": [
      3948
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Théophile Wallez",
    "display_name": "Théophile Wallez",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TreeSync: Authenticated Group Management for Messaging Layer Security",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8064,
    "paper_ids": [
      4077
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonathan Protzenko",
    "display_name": "Jonathan Protzenko",
    "affiliation": "Google Inc., USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TreeSync: Authenticated Group Management for Messaging Layer Security",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4826,
    "paper_ids": [
      4077
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benjamin Beurdouche",
    "display_name": "Benjamin Beurdouche",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TreeSync: Authenticated Group Management for Messaging Layer Security",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4827,
    "paper_ids": [
      4077
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xueqiang Wang",
    "display_name": "Xueqiang Wang",
    "affiliation": "University of Central Florida",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 3,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacy law enforcement under centralized governance a qualitative analysis of four years special privacy rectification campaigns",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "navigating the privacy compliance maze understanding risks with privacyconfigurable mobile sdks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "union under duress understanding hazards of duplicate resource mismediation in android software supply chain",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "are you spying on me largescale analysis on iot data exposure through companion apps",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "understanding malicious crosslibrary data harvesting on android",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4828,
    "paper_ids": [
      598
    ],
    "papers_without_artifact_ids": [
      5364,
      605,
      607,
      608,
      612
    ]
  },
  {
    "name": "Yuqiong Sun",
    "display_name": "Yuqiong Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4829,
    "paper_ids": [
      598
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Susanta Nanda",
    "display_name": "Susanta Nanda",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4830,
    "paper_ids": [
      598
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gabriel K. Gegenhuber",
    "display_name": "Gabriel K. Gegenhuber",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4831,
    "paper_ids": [
      2151
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wilfried Mayer",
    "display_name": "Wilfried Mayer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4832,
    "paper_ids": [
      2151
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kevin Morio",
    "display_name": "Kevin Morio",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Automated Security Analysis of Exposure Notification Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4833,
    "paper_ids": [
      4217
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ilkan Esiyok",
    "display_name": "Ilkan Esiyok",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Automated Security Analysis of Exposure Notification Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4834,
    "paper_ids": [
      4217
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junjie Wang 0008",
    "display_name": "Junjie Wang",
    "affiliation": "University of Electronic Science and Technology of China, State Key Laboratory of Electronic Thin Films and Integrated Devices, Chengdu, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4835,
    "paper_ids": [
      5365
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhiyi Zhang",
    "display_name": "Zhiyi Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4836,
    "paper_ids": [
      5365
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuang Liu 0007",
    "display_name": "Shuang Liu",
    "affiliation": "Tianjin University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4837,
    "paper_ids": [
      5365
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaoning Du 0001",
    "display_name": "Xiaoning Du",
    "affiliation": "Monash University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "songbsab a dual prevention approach against singing voice conversion based illegal song covers",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 4838,
    "paper_ids": [
      5365
    ],
    "papers_without_artifact_ids": [
      3126
    ]
  },
  {
    "name": "Junjie Chen 0003",
    "display_name": "Junjie Chen",
    "affiliation": "Tianjin University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4839,
    "paper_ids": [
      5365
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alex Luoyuan Xiong",
    "display_name": "Alex Luoyuan Xiong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VeriZexe: Decentralized Private Computation with Universal Setup",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4840,
    "paper_ids": [
      5366
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Binyi Chen",
    "display_name": "Binyi Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VeriZexe: Decentralized Private Computation with Universal Setup",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4841,
    "paper_ids": [
      5366
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhenfei Zhang",
    "display_name": "Zhenfei Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "PETS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VeriZexe: Decentralized Private Computation with Universal Setup",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4842,
    "paper_ids": [
      5366
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benedikt Bünz",
    "display_name": "Benedikt Bünz",
    "affiliation": "New York University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VeriZexe: Decentralized Private Computation with Universal Setup",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8065,
    "paper_ids": [
      5366
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ben Fisch",
    "display_name": "Ben Fisch",
    "affiliation": "Yale University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VeriZexe: Decentralized Private Computation with Universal Setup",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4844,
    "paper_ids": [
      5366
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fernando Krell",
    "display_name": "Fernando Krell",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VeriZexe: Decentralized Private Computation with Universal Setup",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4845,
    "paper_ids": [
      5366
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Philippe Camacho",
    "display_name": "Philippe Camacho",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VeriZexe: Decentralized Private Computation with Universal Setup",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4846,
    "paper_ids": [
      5366
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Babak Amin Azad",
    "display_name": "Babak Amin Azad",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "animatedead debloating web applications using concolic execution",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4847,
    "paper_ids": [
      798
    ],
    "papers_without_artifact_ids": [
      801
    ]
  },
  {
    "name": "Dawei Wang 0021",
    "display_name": "Dawei Wang",
    "affiliation": "Zhongguancun Laboratory, Beijing, China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fuzzguard filtering out unreachable inputs in directed greybox fuzzing through deep learning",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4848,
    "paper_ids": [
      1850
    ],
    "papers_without_artifact_ids": [
      1870
    ]
  },
  {
    "name": "Ying Li 0104",
    "display_name": "Ying Li",
    "affiliation": "Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4849,
    "paper_ids": [
      1850
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhiyu Zhang 0017",
    "display_name": "Zhiyu Zhang",
    "affiliation": "Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "darkfleece probing the dark side of android subscription apps",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4850,
    "paper_ids": [
      1850
    ],
    "papers_without_artifact_ids": [
      1862
    ]
  },
  {
    "name": "Daniel Hirschberger",
    "display_name": "Daniel Hirschberger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Every Signature is Broken: On the Insecurity of Microsoft Office's OOXML Signatures",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4851,
    "paper_ids": [
      585
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minwoo Baek",
    "display_name": "Minwoo Baek",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4852,
    "paper_ids": [
      2331
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dongkwan Kim 0001",
    "display_name": "Dongkwan Kim",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "watching the watchers practical video identification attack in lte networks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "firmae towards largescale emulation of iot firmware for dynamic analysis",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 4853,
    "paper_ids": [
      2331
    ],
    "papers_without_artifact_ids": [
      1718,
      2335
    ]
  },
  {
    "name": "Gertjan Franken",
    "display_name": "Gertjan Franken",
    "affiliation": "KU Leuven",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4854,
    "paper_ids": [
      4251
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lieven Desmet",
    "display_name": "Lieven Desmet",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "SC": {},
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "premadoma an operational solution for dns registries to prevent malicious domain registrations",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 4855,
    "paper_ids": [
      4251
    ],
    "papers_without_artifact_ids": [
      4259
    ]
  },
  {
    "name": "Björn Mathis",
    "display_name": "Björn Mathis",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Systematic Assessment of Fuzzers using Mutation Analysis",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8066,
    "paper_ids": [
      102
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andreas Zeller",
    "display_name": "Andreas Zeller",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Systematic Assessment of Fuzzers using Mutation Analysis",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4857,
    "paper_ids": [
      102
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rahul Gopinath",
    "display_name": "Rahul Gopinath",
    "affiliation": "University of Sydney",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Systematic Assessment of Fuzzers using Mutation Analysis",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4858,
    "paper_ids": [
      102
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonathan Fuller",
    "display_name": "Jonathan Fuller",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mistrust plugins you must a largescale study of malicious plugins in wordpress marketplaces",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4859,
    "paper_ids": [
      1450
    ],
    "papers_without_artifact_ids": [
      1452
    ]
  },
  {
    "name": "Ranjita Pai Kasturi",
    "display_name": "Ranjita Pai Kasturi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mistrust plugins you must a largescale study of malicious plugins in wordpress marketplaces",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "forecasting malware capabilities from cyber attack memory images",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4860,
    "paper_ids": [
      1450
    ],
    "papers_without_artifact_ids": [
      1452,
      1453
    ]
  },
  {
    "name": "Saumya Agarwal",
    "display_name": "Saumya Agarwal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4861,
    "paper_ids": [
      1450
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Amit Kumar Sikder",
    "display_name": "Amit Kumar Sikder",
    "affiliation": "Iowa State University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {
        "2019": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aegis a contextaware security framework for smart home systems",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 4862,
    "paper_ids": [
      1450
    ],
    "papers_without_artifact_ids": [
      4141
    ]
  },
  {
    "name": "Hossein Moghaddas",
    "display_name": "Hossein Moghaddas",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ARMore: Pushing Love Back Into Binaries",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4863,
    "paper_ids": [
      11
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muhammad Faisal 0001",
    "display_name": "Muhammad Faisal",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "SOSP": {},
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TVA: A multi-party computation system for secure and expressive time series analytics",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secrecy secure collaborative analytics in untrusted clouds",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 4864,
    "paper_ids": [
      2443
    ],
    "papers_without_artifact_ids": [
      2446
    ]
  },
  {
    "name": "Jerry Zhang",
    "display_name": "Jerry Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "SOSP": {
        "2024": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TVA: A multi-party computation system for secure and expressive time series analytics",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rust for linux understanding the security impact of rust in the linux kernel",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "veld verified linux drivers",
        "conference": "SOSP",
        "year": 2024
      }
    ],
    "author_id": 4865,
    "paper_ids": [
      2443
    ],
    "papers_without_artifact_ids": [
      2836,
      2843
    ]
  },
  {
    "name": "Guangmeng Zhou",
    "display_name": "Guangmeng Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "An Efficient Design of Intelligent Network Data Plane",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pred performanceoriented random early detection for consistently stable performance in datacenters",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 4866,
    "paper_ids": [
      546
    ],
    "papers_without_artifact_ids": [
      2496
    ]
  },
  {
    "name": "Chuanpu Fu",
    "display_name": "Chuanpu Fu",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "An Efficient Design of Intelligent Network Data Plane",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "offpath network traffic manipulation via revitalized icmp redirect attacks",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4867,
    "paper_ids": [
      546
    ],
    "papers_without_artifact_ids": [
      574
    ]
  },
  {
    "name": "Tae Eun Kim",
    "display_name": "Tae Eun Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DAFL: Directed Grey-box Fuzzing guided by Data Dependency",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4868,
    "paper_ids": [
      2479
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jaeseung Choi 0002",
    "display_name": "Jaeseung Choi",
    "affiliation": "Sogang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DAFL: Directed Grey-box Fuzzing guided by Data Dependency",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4869,
    "paper_ids": [
      2479
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kihong Heo",
    "display_name": "Kihong Heo",
    "affiliation": "KAIST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DAFL: Directed Grey-box Fuzzing guided by Data Dependency",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4870,
    "paper_ids": [
      2479
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu Chen 0003",
    "display_name": "Yu Chen",
    "affiliation": "Temple University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Linear Private Set Union from Multi-Query Reverse Private Membership Test",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4871,
    "paper_ids": [
      3256
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Min Zhang 0064",
    "display_name": "Min Zhang",
    "affiliation": "Shandong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Linear Private Set Union from Multi-Query Reverse Private Membership Test",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4872,
    "paper_ids": [
      3256
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dongdai Lin",
    "display_name": "Dongdai Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Linear Private Set Union from Multi-Query Reverse Private Membership Test",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improved attacks on ecdsa with nonce leakage by lattice sieving with predicate",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 4873,
    "paper_ids": [
      3256
    ],
    "papers_without_artifact_ids": [
      5367
    ]
  },
  {
    "name": "Matthew M. Hong",
    "display_name": "Matthew M. Hong",
    "affiliation": "Massachusetts Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4874,
    "paper_ids": [
      1015
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sarah Meiklejohn",
    "display_name": "Sarah Meiklejohn",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "WOOT": 0,
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2022": 1
      },
      "WOOT": {},
      "PETS": {
        "2020": 1,
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding helpseeking and helpgiving on social media for imagebased sexual abuse",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "acorn input validation for secure aggregation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "sok sct auditing in certificate transparency",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "how to peel a million validating and expanding bitcoin clusters",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "reputable list curation from decentralized voting",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 4875,
    "paper_ids": [
      1015
    ],
    "papers_without_artifact_ids": [
      4150,
      5368,
      5369,
      5370,
      5371
    ]
  },
  {
    "name": "Vinod Vaikuntanathan",
    "display_name": "Vinod Vaikuntanathan",
    "affiliation": "Massachusetts Inst. of Technology",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NSDI": {
        "2017": 1,
        "2016": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "splinter practical private queries on public data",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "sieve cryptographically enforced access control for user data in untrusted clouds",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 4876,
    "paper_ids": [
      1015
    ],
    "papers_without_artifact_ids": [
      2659,
      990
    ]
  },
  {
    "name": "Yoonsang Kim",
    "display_name": "Yoonsang Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Erebus: Access Control for Augmented Reality Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4877,
    "paper_ids": [
      4260
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sanket Goutam",
    "display_name": "Sanket Goutam",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Erebus: Access Control for Augmented Reality Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4878,
    "paper_ids": [
      4260
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arie E. Kaufman",
    "display_name": "Arie E. Kaufman",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Erebus: Access Control for Augmented Reality Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4879,
    "paper_ids": [
      4260
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Janarth Dheenadhayalan",
    "display_name": "Janarth Dheenadhayalan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Are Consumers Willing to Pay for Security and Privacy of IoT Devices?",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4880,
    "paper_ids": [
      2498
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuvraj Agarwal",
    "display_name": "Yuvraj Agarwal",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      },
      "ATC": {},
      "NSDI": {
        "2009": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Are Consumers Willing to Pay for Security and Privacy of IoT Devices?",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "capture centralized library management for heterogeneous iot devices",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "softspeak making voip play well in existing 80211 deployments",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "somniloquy augmenting network interfaces to reduce pc energy usage",
        "conference": "NSDI",
        "year": 2009
      }
    ],
    "author_id": 4881,
    "paper_ids": [
      2498
    ],
    "papers_without_artifact_ids": [
      5372,
      5373,
      5374
    ]
  },
  {
    "name": "Fiona Willi",
    "display_name": "Fiona Willi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4882,
    "paper_ids": [
      2467
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zekun Cai",
    "display_name": "Zekun Cai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Understand Users' Privacy Perception and Decision of V2X Communication in Connected Autonomous Vehicles",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4883,
    "paper_ids": [
      4262
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Katzman",
    "display_name": "Daniel Katzman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Gates of Time: Improving Cache Attacks with Transient Execution",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4884,
    "paper_ids": [
      1521
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "William Kosasih",
    "display_name": "William Kosasih",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Gates of Time: Improving Cache Attacks with Transient Execution",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4885,
    "paper_ids": [
      1521
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ruide Zhang",
    "display_name": "Ruide Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ARI: Attestation of Real-time Mission Execution Integrity",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4886,
    "paper_ids": [
      172
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingi Cho",
    "display_name": "Mingi Cho",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4887,
    "paper_ids": [
      5375
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dohyeon An",
    "display_name": "Dohyeon An",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4888,
    "paper_ids": [
      5375
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hoyong Jin",
    "display_name": "Hoyong Jin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4889,
    "paper_ids": [
      5375
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Taekyoung Kwon 0002",
    "display_name": "Taekyoung Kwon",
    "affiliation": "Yonsei University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "SC": {},
      "ACSAC": {
        "2017": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "here is your fingerprint actual risk versus user perception of latent fingerprints and smudges remaining on smartphones",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 4890,
    "paper_ids": [
      5375
    ],
    "papers_without_artifact_ids": [
      5376
    ]
  },
  {
    "name": "Simon Nachtigall",
    "display_name": "Simon Nachtigall",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4891,
    "paper_ids": [
      586
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingshi Wu",
    "display_name": "Mingshi Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4892,
    "paper_ids": [
      884
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Danesh Sivakumar",
    "display_name": "Danesh Sivakumar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4893,
    "paper_ids": [
      884
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jack Burg",
    "display_name": "Jack Burg",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4894,
    "paper_ids": [
      884
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peter Anderson",
    "display_name": "Peter Anderson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4895,
    "paper_ids": [
      884
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaokang Wang",
    "display_name": "Xiaokang Wang",
    "affiliation": "Western Sydney University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "snowflake a censorship circumvention system using temporary webrtc proxies",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4896,
    "paper_ids": [
      884
    ],
    "papers_without_artifact_ids": [
      5336
    ]
  },
  {
    "name": "Doreen Riepel",
    "display_name": "Doreen Riepel",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "abe cubed advanced benchmarking extensions for abe squared",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 4897,
    "paper_ids": [
      103
    ],
    "papers_without_artifact_ids": [
      1471
    ]
  },
  {
    "name": "Jinyang Ruan",
    "display_name": "Jinyang Ruan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4898,
    "paper_ids": [
      771
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guangbei Yi",
    "display_name": "Guangbei Yi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4899,
    "paper_ids": [
      771
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kirill Nikitin 0001",
    "display_name": "Kirill Nikitin",
    "affiliation": "BITS Pilani",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "PETS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Authenticated private information retrieval",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4900,
    "paper_ids": [
      1016
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lesly-Ann Daniel",
    "display_name": "Lesly-Ann Daniel",
    "affiliation": "EURECOM",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ProSpeCT: Provably Secure Speculation for the Constant-Time Policy",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4901,
    "paper_ids": [
      1781
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Job Noorman",
    "display_name": "Job Noorman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ProSpeCT: Provably Secure Speculation for the Constant-Time Policy",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4902,
    "paper_ids": [
      1781
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tamara Rezk",
    "display_name": "Tamara Rezk",
    "affiliation": "INRIA, Sophia Antipolis, France",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ProSpeCT: Provably Secure Speculation for the Constant-Time Policy",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4903,
    "paper_ids": [
      1781
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Liang Wang 0023",
    "display_name": "Liang Wang",
    "affiliation": "University of Wisconsin-Madison",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Guarding Serverless Applications with Kalium",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4904,
    "paper_ids": [
      2921
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Siddhant Bhagat",
    "display_name": "Siddhant Bhagat",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Guarding Serverless Applications with Kalium",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4905,
    "paper_ids": [
      2921
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "George Macon",
    "display_name": "George Macon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VulChecker: Graph-based Vulnerability Localization in Source Code",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4906,
    "paper_ids": [
      1411
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael D. Brown",
    "display_name": "Michael D. Brown",
    "affiliation": "York University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VulChecker: Graph-based Vulnerability Localization in Source Code",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a broad comparative evaluation of software debloating tools",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a broad comparative evaluation of x8664 binary rewriters",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4907,
    "paper_ids": [
      1411
    ],
    "papers_without_artifact_ids": [
      5377,
      5378
    ]
  },
  {
    "name": "Matthew Pruett",
    "display_name": "Matthew Pruett",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VulChecker: Graph-based Vulnerability Localization in Source Code",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "arcus symbolic root cause analysis of exploits in production systems",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "forecasting malware capabilities from cyber attack memory images",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4908,
    "paper_ids": [
      1411
    ],
    "papers_without_artifact_ids": [
      1420,
      1453
    ]
  },
  {
    "name": "Evan Downing",
    "display_name": "Evan Downing",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VulChecker: Graph-based Vulnerability Localization in Source Code",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deepreflect discovering malicious functionality through binary reconstruction",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4909,
    "paper_ids": [
      1411
    ],
    "papers_without_artifact_ids": [
      1419
    ]
  },
  {
    "name": "J. Sukarno Mertoguno",
    "display_name": "J. Sukarno Mertoguno",
    "affiliation": "Office of Naval Research, Arlington",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VulChecker: Graph-based Vulnerability Localization in Source Code",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4910,
    "paper_ids": [
      1411
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alessandro Chiesa",
    "display_name": "Alessandro Chiesa",
    "affiliation": "EPFL",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Eos: Efficient Private Delegation of zkSNARK Provers",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4911,
    "paper_ids": [
      4270
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yinuo Zhang",
    "display_name": "Yinuo Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Eos: Efficient Private Delegation of zkSNARK Provers",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4912,
    "paper_ids": [
      4270
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Salim Al Wahaibi",
    "display_name": "Salim Al Wahaibi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4913,
    "paper_ids": [
      5379
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Myles Foley",
    "display_name": "Myles Foley",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4914,
    "paper_ids": [
      5379
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sergio Maffeis",
    "display_name": "Sergio Maffeis",
    "affiliation": "Imperial College London",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ATC": {},
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4915,
    "paper_ids": [
      5379
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nico Schiller",
    "display_name": "Nico Schiller",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4916,
    "paper_ids": [
      104
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aleksandr Nahapetyan",
    "display_name": "Aleksandr Nahapetyan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "characterizing the security of github ci workflows",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4917,
    "paper_ids": [
      1773
    ],
    "papers_without_artifact_ids": [
      2429
    ]
  },
  {
    "name": "Greg Tystahl",
    "display_name": "Greg Tystahl",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4918,
    "paper_ids": [
      1773
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bradley Reaves",
    "display_name": "Bradley Reaves",
    "affiliation": "North Carolina State University",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "ACSAC": 1,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 3,
        "2023": 2,
        "2022": 1,
        "2021": 1
      },
      "ACSAC": {
        "2018": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 12.5,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diving into robocall content with snorcall",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "characterizing the security of github ci workflows",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "investigating web service account remediation advice",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "actions speak louder than words entitysensitive privacy policy and data flow analysis with policheck",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "cardpliance pci dss compliance of android applications",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "whos calling characterizing robocalls through audio and metadata analysis",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "a large scale investigation of obfuscation use in google play",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 4919,
    "paper_ids": [
      1773
    ],
    "papers_without_artifact_ids": [
      5380,
      2429,
      2437,
      2269,
      2270,
      5381,
      1258
    ]
  },
  {
    "name": "Aravind Machiry",
    "display_name": "Aravind Machiry",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1
      },
      "ACSAC": {
        "2018": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fuzzuer enabling fuzzing of uefi interfaces on edk2",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "veribin adaptive verification of patches at the binary level",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "tygr type inference on stripped binaries using graph neural networks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "characterizing the security of github ci workflows",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "using loops for malware classification resilient to featureunaware perturbations",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 4920,
    "paper_ids": [
      1773
    ],
    "papers_without_artifact_ids": [
      5382,
      1775,
      825,
      2429,
      1163
    ]
  },
  {
    "name": "Wenjun Qiu",
    "display_name": "Wenjun Qiu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4921,
    "paper_ids": [
      1686
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lisa M. Austin",
    "display_name": "Lisa M. Austin",
    "affiliation": "University of Toronto",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active Learning",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a large scale study of user behavior expectations and engagement with android permissions",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4922,
    "paper_ids": [
      1686
    ],
    "papers_without_artifact_ids": [
      1691
    ]
  },
  {
    "name": "Mang Zhao",
    "display_name": "Mang Zhao",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4923,
    "paper_ids": [
      1881
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matteo Campanelli",
    "display_name": "Matteo Campanelli",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Curve Trees: Practical and Transparent Zero-Knowledge Accumulators",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4924,
    "paper_ids": [
      5383
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mathias Hall-Andersen",
    "display_name": "Mathias Hall-Andersen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "PETS": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Curve Trees: Practical and Transparent Zero-Knowledge Accumulators",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "efficient proofs of software exploitability for realworld processors",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "efficient set membership proofs using mpcinthehead",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 4925,
    "paper_ids": [
      5383
    ],
    "papers_without_artifact_ids": [
      4207,
      4208
    ]
  },
  {
    "name": "Simon Holmgaard Kamp",
    "display_name": "Simon Holmgaard Kamp",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Curve Trees: Practical and Transparent Zero-Knowledge Accumulators",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4926,
    "paper_ids": [
      5383
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gustavo Sandoval",
    "display_name": "Gustavo Sandoval",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4927,
    "paper_ids": [
      3094
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hammond Pearce",
    "display_name": "Hammond Pearce",
    "affiliation": "UNSW",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4928,
    "paper_ids": [
      3094
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Teo Nys",
    "display_name": "Teo Nys",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4929,
    "paper_ids": [
      3094
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Siddharth Garg",
    "display_name": "Siddharth Garg",
    "affiliation": "New York University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4930,
    "paper_ids": [
      3094
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yudi Zhao",
    "display_name": "Yudi Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "backporting security patches of web applications a prototype design and implementation on injection vulnerability patches",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4931,
    "paper_ids": [
      231
    ],
    "papers_without_artifact_ids": [
      252
    ]
  },
  {
    "name": "Yashaswi Malla",
    "display_name": "Yashaswi Malla",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4932,
    "paper_ids": [
      3074
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zihang Xia",
    "display_name": "Zihang Xia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4933,
    "paper_ids": [
      3074
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Elise Klein 0002",
    "display_name": "Elise Klein",
    "affiliation": "Inria Nancy - Grand-Est research centre, Villers-ls-Nancy, France",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A comprehensive, formal and automated analysis of the EDHOC protocol",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4934,
    "paper_ids": [
      2520
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maïwenn Racouchot",
    "display_name": "Maïwenn Racouchot",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A comprehensive, formal and automated analysis of the EDHOC protocol",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8067,
    "paper_ids": [
      2520
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abdullah AlHamdan",
    "display_name": "Abdullah AlHamdan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "welcome to jurassic park a comprehensive study of security risks in deno and its ecosystem",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 4936,
    "paper_ids": [
      4249
    ],
    "papers_without_artifact_ids": [
      4250
    ]
  },
  {
    "name": "Jesse De Meulemeester",
    "display_name": "Jesse De Meulemeester",
    "affiliation": "KU Leuven",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SpectrEM: Exploiting Electromagnetic Emanations During Transient Execution",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4937,
    "paper_ids": [
      1790
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Taehyun Kim",
    "display_name": "Taehyun Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NSDI": {
        "2021": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rearchitecting the tcp stack for iooffloaded content delivery",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "elastic resource sharing for distributed deep learning",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 4938,
    "paper_ids": [
      325
    ],
    "papers_without_artifact_ids": [
      356,
      4946
    ]
  },
  {
    "name": "Robert Dumitru 0002",
    "display_name": "Robert Dumitru",
    "affiliation": "University of Adelaide",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Impostor Among US(B): Off-Path Injection Attacks on USB Communications",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on borrowed time preventing static sidechannel analysis",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 4939,
    "paper_ids": [
      1500
    ],
    "papers_without_artifact_ids": [
      1523
    ]
  },
  {
    "name": "Andrew Wabnitz",
    "display_name": "Andrew Wabnitz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Impostor Among US(B): Off-Path Injection Attacks on USB Communications",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on borrowed time preventing static sidechannel analysis",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 4940,
    "paper_ids": [
      1500
    ],
    "papers_without_artifact_ids": [
      1523
    ]
  },
  {
    "name": "Conor Gilsenan",
    "display_name": "Conor Gilsenan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Security and Privacy Failures in Popular 2FA Apps",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the medium is the message how secure messaging apps leak sensitive data to push notification services",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 4941,
    "paper_ids": [
      3921
    ],
    "papers_without_artifact_ids": [
      3923
    ]
  },
  {
    "name": "Fuzail Shakir",
    "display_name": "Fuzail Shakir",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Security and Privacy Failures in Popular 2FA Apps",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4942,
    "paper_ids": [
      3921
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Noura Alomar",
    "display_name": "Noura Alomar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1
      },
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Security and Privacy Failures in Popular 2FA Apps",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the effect of platform policies on app privacy compliance a study of childdirected apps",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "lessons in vcr repair compliance of android app developers with the california consumer privacy act ccpa",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "developers say the darnedest things privacy compliance processes followed by developers of childdirected apps",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "youve got your nice list of bugs now what vulnerability discovery and management processes in the wild",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4943,
    "paper_ids": [
      3921
    ],
    "papers_without_artifact_ids": [
      3922,
      3924,
      3926,
      3930
    ]
  },
  {
    "name": "Nicholas Boucher",
    "display_name": "Nicholas Boucher",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Trojan Source: Invisible Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4944,
    "paper_ids": [
      4115
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jakob Koschel",
    "display_name": "Jakob Koschel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Uncontained: Uncovering Container Confusion in the Linux Kernel",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4945,
    "paper_ids": [
      86
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pietro Borrello",
    "display_name": "Pietro Borrello",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Uncontained: Uncovering Container Confusion in the Linux Kernel",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "predictive contextsensitive fuzzing",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "æpic leak architecturally leaking uninitialized data from the microarchitecture",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4946,
    "paper_ids": [
      86
    ],
    "papers_without_artifact_ids": [
      91,
      333
    ]
  },
  {
    "name": "Daniele Cono D'Elia",
    "display_name": "Daniele Cono D'Elia",
    "affiliation": "Sapienza University of Rome",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "EUROSYS": 0,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      },
      "EUROSYS": {},
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Uncontained: Uncovering Container Confusion in the Linux Kernel",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "qmsan efficiently detecting uninitialized memory errors during fuzzing",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "predictive contextsensitive fuzzing",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "the use of likely invariants as feedback for fuzzers",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4947,
    "paper_ids": [
      86
    ],
    "papers_without_artifact_ids": [
      19,
      91,
      5384
    ]
  },
  {
    "name": "Scott Jordan 0001",
    "display_name": "Scott Jordan",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4948,
    "paper_ids": [
      960
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tianyi Shan",
    "display_name": "Tianyi Shan",
    "affiliation": "University of California, San Diego",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improving Logging to Reduce Permission Over-Granting Mistakes",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "multiview finding blind spots in accessdeny issues diagnosis",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4949,
    "paper_ids": [
      3705
    ],
    "papers_without_artifact_ids": [
      3706
    ]
  },
  {
    "name": "Kunal Mukherjee",
    "display_name": "Kunal Mukherjee",
    "affiliation": "The University of Texas at Dallas",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Evading Provenance-Based ML Detectors with Adversarial System Actions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4950,
    "paper_ids": [
      3246
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joshua Wiedemeier",
    "display_name": "Joshua Wiedemeier",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Evading Provenance-Based ML Detectors with Adversarial System Actions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4951,
    "paper_ids": [
      3246
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tianhao Wang 0026",
    "display_name": "Tianhao Wang",
    "affiliation": "University of Texas at Dallas",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Evading Provenance-Based ML Detectors with Adversarial System Actions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4952,
    "paper_ids": [
      3246
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "James Wei",
    "display_name": "James Wei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Evading Provenance-Based ML Detectors with Adversarial System Actions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4953,
    "paper_ids": [
      3246
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Feng Chen",
    "display_name": "Feng Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Evading Provenance-Based ML Detectors with Adversarial System Actions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4954,
    "paper_ids": [
      3246
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muhyun Kim",
    "display_name": "Muhyun Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Evading Provenance-Based ML Detectors with Adversarial System Actions",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4955,
    "paper_ids": [
      3246
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yibo Huang 0005",
    "display_name": "Yibo Huang",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Remote Direct Memory Introspection",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4956,
    "paper_ids": [
      699
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinyan Xu",
    "display_name": "Jinyan Xu",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4957,
    "paper_ids": [
      687
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yiyuan Liu",
    "display_name": "Yiyuan Liu",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4958,
    "paper_ids": [
      687
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sirui He",
    "display_name": "Sirui He",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4959,
    "paper_ids": [
      687
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matthias Gierlings",
    "display_name": "Matthias Gierlings",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4960,
    "paper_ids": [
      587
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mazal Bethany",
    "display_name": "Mazal Bethany",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Targeted Obfuscation of Adversarial Unsafe Images using Reconstruction and Counterfactual Super Region Attribution Explainability",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deciphering textual authenticity a generalized strategy through the lens of large language semantics for detecting human vs machinegenerated text",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4961,
    "paper_ids": [
      4132
    ],
    "papers_without_artifact_ids": [
      4133
    ]
  },
  {
    "name": "Andrew Seong",
    "display_name": "Andrew Seong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Targeted Obfuscation of Adversarial Unsafe Images using Reconstruction and Counterfactual Super Region Attribution Explainability",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4962,
    "paper_ids": [
      4132
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Samuel Henrique Silva",
    "display_name": "Samuel Henrique Silva",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Targeted Obfuscation of Adversarial Unsafe Images using Reconstruction and Counterfactual Super Region Attribution Explainability",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4963,
    "paper_ids": [
      4132
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nicole Beebe",
    "display_name": "Nicole Beebe",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Targeted Obfuscation of Adversarial Unsafe Images using Reconstruction and Counterfactual Super Region Attribution Explainability",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4964,
    "paper_ids": [
      4132
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peyman Najafirad",
    "display_name": "Peyman Najafirad",
    "affiliation": "University of Texas at San Antonio",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Targeted Obfuscation of Adversarial Unsafe Images using Reconstruction and Counterfactual Super Region Attribution Explainability",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deciphering textual authenticity a generalized strategy through the lens of large language semantics for detecting human vs machinegenerated text",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4965,
    "paper_ids": [
      4132
    ],
    "papers_without_artifact_ids": [
      4133
    ]
  },
  {
    "name": "Sourav Das 0001",
    "display_name": "Sourav Das",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NSDI": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shoal high throughput dag bft can be fast and robust",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "powers of tau in asynchrony",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 4966,
    "paper_ids": [
      2665
    ],
    "papers_without_artifact_ids": [
      3489,
      5385
    ]
  },
  {
    "name": "Zhuolun Xiang",
    "display_name": "Zhuolun Xiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "powers of tau in asynchrony",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "long live the honey badger robust asynchronous dpss and its applications",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4967,
    "paper_ids": [
      2665
    ],
    "papers_without_artifact_ids": [
      5385,
      5386
    ]
  },
  {
    "name": "Ling Ren 0001",
    "display_name": "Ling Ren",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "powers of tau in asynchrony",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 4968,
    "paper_ids": [
      2665
    ],
    "papers_without_artifact_ids": [
      5385
    ]
  },
  {
    "name": "Tejesh Reddy",
    "display_name": "Tejesh Reddy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4969,
    "paper_ids": [
      819
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zack Smith",
    "display_name": "Zack Smith",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4970,
    "paper_ids": [
      819
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Han Zheng 0006",
    "display_name": "Han Zheng",
    "affiliation": "EPFL",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4971,
    "paper_ids": [
      12
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiayuan Zhang",
    "display_name": "Jiayuan Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4972,
    "paper_ids": [
      12
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuhang Huang",
    "display_name": "Yuhang Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4973,
    "paper_ids": [
      12
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zezhong Ren",
    "display_name": "Zezhong Ren",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4974,
    "paper_ids": [
      12
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "He Wang 0014",
    "display_name": "He Wang",
    "affiliation": "Xidian University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4975,
    "paper_ids": [
      12
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chunjie Cao",
    "display_name": "Chunjie Cao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4976,
    "paper_ids": [
      12
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuqing Zhang 0001",
    "display_name": "Yuqing Zhang",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ATC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2021": 2
      },
      "ATC": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "maginot line assessing a new crossapp threat to piiasfactor authentication in chinese mobile apps",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "understanding malicious crosslibrary data harvesting on android",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "automatic firmware emulation through invalidityguided knowledge inference",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "shattered chain of trust understanding security risks in crosscloud iot access delegation",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4977,
    "paper_ids": [
      12
    ],
    "papers_without_artifact_ids": [
      5387,
      612,
      2405,
      615
    ]
  },
  {
    "name": "Xiaofei Xie",
    "display_name": "Xiaofei Xie",
    "affiliation": "Singapore Management University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2
      },
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Decompiling x86 Deep Neural Network Executables",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mitigating membership inference attacks via weighted smoothing",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "automataguided controlflowsensitive fuzz driver generation",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4978,
    "paper_ids": [
      947
    ],
    "papers_without_artifact_ids": [
      900,
      786
    ]
  },
  {
    "name": "Lei Ma 0003",
    "display_name": "Lei Ma",
    "affiliation": "HKUST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Decompiling x86 Deep Neural Network Executables",
        "conference": "USENIXSEC",
        "year": 2023,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4979,
    "paper_ids": [
      947
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Salman Qazi",
    "display_name": "Salman Qazi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Half-Double: Hammering From the Next Row Over",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4980,
    "paper_ids": [
      337
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yoongu Kim",
    "display_name": "Yoongu Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Half-Double: Hammering From the Next Row Over",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4981,
    "paper_ids": [
      337
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Moritz Lipp",
    "display_name": "Moritz Lipp",
    "affiliation": "Amazon Web Services",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 3
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Half-Double: Hammering From the Next Row Over",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "amd prefetch attacks through power and time",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "æpic leak architecturally leaking uninitialized data from the microarchitecture",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "medusa microarchitectural data leakage via automated attack synthesis",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 4982,
    "paper_ids": [
      337
    ],
    "papers_without_artifact_ids": [
      332,
      333,
      334
    ]
  },
  {
    "name": "Nicolas Boichat",
    "display_name": "Nicolas Boichat",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Half-Double: Hammering From the Next Row Over",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4983,
    "paper_ids": [
      337
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eric Shiu",
    "display_name": "Eric Shiu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Half-Double: Hammering From the Next Row Over",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4984,
    "paper_ids": [
      337
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mattias Nissler",
    "display_name": "Mattias Nissler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Half-Double: Hammering From the Next Row Over",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4985,
    "paper_ids": [
      337
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kinan Dak Albab",
    "display_name": "Kinan Dak Albab",
    "affiliation": "Brown University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "SOSP": {
        "2024": 1
      },
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Batched Differentially Private Information Retrieval",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sesame practical endtoend privacy compliance with policy containers and privacy regions",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "k9db privacycompliant storage for web applications by construction",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 4986,
    "paper_ids": [
      2444
    ],
    "papers_without_artifact_ids": [
      3471,
      3472
    ]
  },
  {
    "name": "Rawane Issa",
    "display_name": "Rawane Issa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Batched Differentially Private Information Retrieval",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hecate abuse reporting in secure messengers with sealed sender",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 4987,
    "paper_ids": [
      2444
    ],
    "papers_without_artifact_ids": [
      2448
    ]
  },
  {
    "name": "Kalman Graffi",
    "display_name": "Kalman Graffi",
    "affiliation": "Heinrich Heine University of Dsseldorf, Department of Computer Science, Germany",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Batched Differentially Private Information Retrieval",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4988,
    "paper_ids": [
      2444
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wen Shih Lim",
    "display_name": "Wen Shih Lim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Provably-Safe Multilingual Software Sandboxing using WebAssembly",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4989,
    "paper_ids": [
      716
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Furkan Turan",
    "display_name": "Furkan Turan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4990,
    "paper_ids": [
      1791
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jeffrey Young",
    "display_name": "Jeffrey Young",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4991,
    "paper_ids": [
      1201
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alejandro Cuevas Villalba",
    "display_name": "Alejandro Cuevas Villalba",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Measurement by Proxy: On the Accuracy of Online Marketplace Measurements",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "does online anonymous market vendor reputation matter",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4992,
    "paper_ids": [
      3290
    ],
    "papers_without_artifact_ids": [
      3292
    ]
  },
  {
    "name": "Fieke Miedema",
    "display_name": "Fieke Miedema",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Measurement by Proxy: On the Accuracy of Online Marketplace Measurements",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mixed signals analyzing groundtruth data on the users and economics of a bitcoin mixing service",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 4993,
    "paper_ids": [
      3290
    ],
    "papers_without_artifact_ids": [
      5388
    ]
  },
  {
    "name": "Rolf van Wegberg",
    "display_name": "Rolf van Wegberg",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 6
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 2
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Measurement by Proxy: On the Accuracy of Online Marketplace Measurements",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ghost clusters evaluating attribution of illicit services through cryptocurrency tracing",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "the unpatchables why municipalities persist in running vulnerable hosts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "mixed signals analyzing groundtruth data on the users and economics of a bitcoin mixing service",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "risky business investigating the security practices of vendors on an online anonymous market using groundtruth data",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "catching phishers by their bait investigating the dutch phishing landscape through phishing kit detection",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4994,
    "paper_ids": [
      3290
    ],
    "papers_without_artifact_ids": [
      3342,
      3344,
      5388,
      5389,
      5092
    ]
  },
  {
    "name": "Kaihang Ji",
    "display_name": "Kaihang Ji",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4995,
    "paper_ids": [
      1768
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jun Zeng 0006",
    "display_name": "Jun Zeng",
    "affiliation": "Shenzhen University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "EUROSYS": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "uictx understanding ui behaviors with code contexts for mobile applications",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "provguard detecting sdn control policy manipulation via contextual semantics of provenance graphs",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "automatic root cause analysis via large language models for cloud incidents",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "uihash detecting similar android uis through gridbased visual appearance representation",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 4996,
    "paper_ids": [
      1768
    ],
    "papers_without_artifact_ids": [
      2795,
      2796,
      626,
      2797
    ]
  },
  {
    "name": "Zheng Leong Chua",
    "display_name": "Zheng Leong Chua",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4997,
    "paper_ids": [
      1768
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pietro Frigo",
    "display_name": "Pietro Frigo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "smash synchronized manysided rowhammer attacks from javascript",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 4998,
    "paper_ids": [
      87
    ],
    "papers_without_artifact_ids": [
      96
    ]
  },
  {
    "name": "Xiaoyong Yuan",
    "display_name": "Xiaoyong Yuan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Membership Inference Attacks and Defenses in Neural Network Pruning",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 4999,
    "paper_ids": [
      5390
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lan Zhang 0005",
    "display_name": "Lan Zhang",
    "affiliation": "Clemson University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Membership Inference Attacks and Defenses in Neural Network Pruning",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5000,
    "paper_ids": [
      5390
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xunchao Hu",
    "display_name": "Xunchao Hu",
    "affiliation": "University of Notre Dame",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5001,
    "paper_ids": [
      2273
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maya Dotan",
    "display_name": "Maya Dotan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Twilight: A Differentially Private Payment Channel Network",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5002,
    "paper_ids": [
      3243
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Saar Tochner",
    "display_name": "Saar Tochner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Twilight: A Differentially Private Payment Channel Network",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5003,
    "paper_ids": [
      3243
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aviv Zohar",
    "display_name": "Aviv Zohar",
    "affiliation": "Hebrew University of Jerusalem",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Twilight: A Differentially Private Payment Channel Network",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "speculative denialofservice attacks in ethereum",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5004,
    "paper_ids": [
      3243
    ],
    "papers_without_artifact_ids": [
      5391
    ]
  },
  {
    "name": "Ziyang Yang",
    "display_name": "Ziyang Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Bedrock: Programmable Network Support for Secure RDMA Systems",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5005,
    "paper_ids": [
      700
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shravan Srinivasan",
    "display_name": "Shravan Srinivasan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5006,
    "paper_ids": [
      4280
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexander Chepurnoy",
    "display_name": "Alexander Chepurnoy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5007,
    "paper_ids": [
      4280
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Charalampos Papamanthou",
    "display_name": "Charalampos Papamanthou",
    "affiliation": "Yale University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 2,
        "2023": 1,
        "2022": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "single pass clientpreprocessing private information retrieval",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "balanceproofs maintainable vector commitments with fast aggregation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "seal attack mitigation for encrypted databases via adjustable leakage",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "mirage succinct arguments for randomized algorithms with applications to universal zksnarks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5008,
    "paper_ids": [
      4280
    ],
    "papers_without_artifact_ids": [
      5392,
      5393,
      2419,
      2420
    ]
  },
  {
    "name": "Alin Tomescu",
    "display_name": "Alin Tomescu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5009,
    "paper_ids": [
      4280
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bojun Zhu",
    "display_name": "Bojun Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Hardware-Software Co-design for Efficient Intra-Enclave Isolation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5010,
    "paper_ids": [
      38
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wentai Li",
    "display_name": "Wentai Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Hardware-Software Co-design for Efficient Intra-Enclave Isolation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "epk scalable and efficient memory protection keys",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 5011,
    "paper_ids": [
      38
    ],
    "papers_without_artifact_ids": [
      66
    ]
  },
  {
    "name": "Janice Tran Ho",
    "display_name": "Janice Tran Ho",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5012,
    "paper_ids": [
      961
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xida Ren",
    "display_name": "Xida Ren",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SecSMT: Securing SMT Processors against Contention-Based Covert Channels",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5013,
    "paper_ids": [
      3222
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ashish Venkat",
    "display_name": "Ashish Venkat",
    "affiliation": "University of Virginia",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SecSMT: Securing SMT Processors against Contention-Based Covert Channels",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5014,
    "paper_ids": [
      3222
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sayanton V. Dibbo",
    "display_name": "Sayanton V. Dibbo",
    "affiliation": "Dartmouth College",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5015,
    "paper_ids": [
      1167
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Moritz Contag",
    "display_name": "Moritz Contag",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Loki: Hardening Code Obfuscation Against Automated Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5016,
    "paper_ids": [
      105
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cornelius Aschermann",
    "display_name": "Cornelius Aschermann",
    "affiliation": "Meta",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "EUROSYS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 2,
        "2022": 1,
        "2021": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Loki: Hardening Code Obfuscation Against Automated Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "nyxnet network fuzzing with incremental snapshots",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "nyx greybox hypervisor fuzzing using fast snapshots and affine types",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "aurora statistical crash analysis for automated root cause explanation",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "ethbmc a bounded model checker for smart contracts",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5017,
    "paper_ids": [
      105
    ],
    "papers_without_artifact_ids": [
      117,
      118,
      122,
      123
    ]
  },
  {
    "name": "Julius Basler",
    "display_name": "Julius Basler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Loki: Hardening Code Obfuscation Against Automated Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5018,
    "paper_ids": [
      105
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Octavian Suciu",
    "display_name": "Octavian Suciu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5019,
    "paper_ids": [
      1536
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Connor Nelson",
    "display_name": "Connor Nelson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5020,
    "paper_ids": [
      1536
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhuoer Lyu",
    "display_name": "Zhuoer Lyu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scammagnifier piercing the veil of fraudulent shopping website campaigns",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 5021,
    "paper_ids": [
      1536
    ],
    "papers_without_artifact_ids": [
      823
    ]
  },
  {
    "name": "Tudor Dumitras",
    "display_name": "Tudor Dumitras",
    "affiliation": "Univ. of Maryland - College Park",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "EUROSYS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2021": 1
      },
      "EUROSYS": {},
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scavy automated discovery of memory corruption targets in linux kernel for privilege escalation",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "when malware changed its mind an empirical study of variable program behaviors in the real world",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5022,
    "paper_ids": [
      1536
    ],
    "papers_without_artifact_ids": [
      5394,
      5102
    ]
  },
  {
    "name": "Nirvan Tyagi",
    "display_name": "Nirvan Tyagi",
    "affiliation": "University of Washington",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Orca: Blocklisting in Sender-Anonymous Messaging",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5023,
    "paper_ids": [
      4281
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Julia Len",
    "display_name": "Julia Len",
    "affiliation": "University of North Carolina",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Orca: Blocklisting in Sender-Anonymous Messaging",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "optiks an optimized key transparency system",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "partitioning oracle attacks",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5024,
    "paper_ids": [
      4281
    ],
    "papers_without_artifact_ids": [
      5395,
      4288
    ]
  },
  {
    "name": "Ian Miers",
    "display_name": "Ian Miers",
    "affiliation": "Univ. of Maryland - College Park",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "PETS": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Orca: Blocklisting in Sender-Anonymous Messaging",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "zipnet lowbandwidth anonymous broadcast from distrusted execution environments",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "zkpromises anonymous moderation reputation and blocking from anonymous credentials with callbacks",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 5025,
    "paper_ids": [
      4281
    ],
    "papers_without_artifact_ids": [
      5396,
      5397
    ]
  },
  {
    "name": "Björn B. Brandenburg",
    "display_name": "Björn B. Brandenburg",
    "affiliation": "Max Planck Society",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "EUROSYS": {},
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8068,
    "paper_ids": [
      1966
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Natã M. Barbosa",
    "display_name": "Natã M. Barbosa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "webally making visual taskbased captchas transferable for people with visual impairments",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "do privacy and security matter to everyone quantifying and clustering usercentric considerations about smart home device adoption",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 8069,
    "paper_ids": [
      1528
    ],
    "papers_without_artifact_ids": [
      5349,
      5398
    ]
  },
  {
    "name": "Olivia Figueira",
    "display_name": "Olivia Figueira",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5028,
    "paper_ids": [
      1528
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yang Wang 0005",
    "display_name": "Yang Wang",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2021": 3
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 12.5,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacy perceptions and behaviors towards targeted advertising on social media a crosscountry study on the effect of culture and religion",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "im not convinced that they dont collect more than is necessary usercontrolled data minimization design in search engines",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a mixedmethods study of security practices of smart contract developers",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "assessing browserlevel defense against idnbased phishing",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "how i know for sure peoples perspectives on solely automated decisionmaking sadm",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "webally making visual taskbased captchas transferable for people with visual impairments",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "do privacy and security matter to everyone quantifying and clustering usercentric considerations about smart home device adoption",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5029,
    "paper_ids": [
      1528
    ],
    "papers_without_artifact_ids": [
      5399,
      5400,
      5401,
      1534,
      5402,
      5349,
      5398
    ]
  },
  {
    "name": "Theresa Stadler",
    "display_name": "Theresa Stadler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Synthetic Data - Anonymisation Groundhog Day",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5030,
    "paper_ids": [
      967
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bristena Oprisanu",
    "display_name": "Bristena Oprisanu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Synthetic Data - Anonymisation Groundhog Day",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5031,
    "paper_ids": [
      967
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Renuka Kumar",
    "display_name": "Renuka Kumar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Large-scale Investigation into Geodifferences in Mobile Apps",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "security analysis of unified payments interface and payment apps in india",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5032,
    "paper_ids": [
      4186
    ],
    "papers_without_artifact_ids": [
      4990
    ]
  },
  {
    "name": "Ram Sundara Raman",
    "display_name": "Ram Sundara Raman",
    "affiliation": "Univ. of California - Santa Cruz",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1
      },
      "PETS": {
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Large-scale Investigation into Geodifferences in Mobile Apps",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "modeling and detecting internet censorship events",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "digital discrimination of users in sanctioned states the case of the cuba embargo",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "certainty detecting dns manipulation at scale using tls certificates",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "network responses to russias invasion of ukraine in 2022 a cautionary tale for internet freedom",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5033,
    "paper_ids": [
      4186
    ],
    "papers_without_artifact_ids": [
      4294,
      4296,
      4298,
      4187
    ]
  },
  {
    "name": "Atul Prakash 0001",
    "display_name": "Atul Prakash",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      },
      "ACSAC": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Large-scale Investigation into Geodifferences in Mobile Apps",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "modeling and detecting internet censorship events",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "security analysis of unified payments interface and payment apps in india",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5034,
    "paper_ids": [
      4186
    ],
    "papers_without_artifact_ids": [
      4294,
      4990
    ]
  },
  {
    "name": "Elizabeth Tang He",
    "display_name": "Elizabeth Tang He",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5035,
    "paper_ids": [
      1817
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jayakrishna Vadayath",
    "display_name": "Jayakrishna Vadayath",
    "affiliation": "Arizona State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5036,
    "paper_ids": [
      820
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Moritz Eckert",
    "display_name": "Moritz Eckert",
    "affiliation": "EURECOM",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5037,
    "paper_ids": [
      820
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nicolaas Weideman",
    "display_name": "Nicolaas Weideman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5038,
    "paper_ids": [
      820
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gokulkrishna Praveen Menon",
    "display_name": "Gokulkrishna Praveen Menon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5039,
    "paper_ids": [
      820
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Davide Balzarotti",
    "display_name": "Davide Balzarotti",
    "affiliation": "EURECOM",
    "artifact_count": 1,
    "total_papers": 12,
    "total_papers_by_conf": {
      "USENIXSEC": 9,
      "ACSAC": 2,
      "WOOT": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 3,
        "2022": 4,
        "2021": 2
      },
      "ACSAC": {
        "2019": 1,
        "2020": 1
      },
      "WOOT": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 8.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "predictive contextsensitive fuzzing",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "rods with laser beams understanding browser fingerprinting on phishing pages",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "whip improving static vulnerability detection in web application by forcing tools to collaborate",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "humans vs machines in malware classification",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "how machine learning is solving the binary function similarity problem",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "when sally met trackers web tracking from the users perspective",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "remind a first look inside the mind of a reverse engineer",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "when malware changed its mind an empirical study of variable program behaviors in the real world",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "the use of likely invariants as feedback for fuzzers",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "the tangled genealogy of iot malware",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "bakingtimer privacy analysis of serverside request processing time",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 5040,
    "paper_ids": [
      820
    ],
    "papers_without_artifact_ids": [
      91,
      3988,
      5403,
      5404,
      4219,
      3989,
      4220,
      5102,
      5384,
      4342,
      3990
    ]
  },
  {
    "name": "Pratik Vaishnavi",
    "display_name": "Pratik Vaishnavi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Transferring Adversarial Robustness Through Robust Representation Matching",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5041,
    "paper_ids": [
      4237
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrei Tatar",
    "display_name": "Andrei Tatar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "ATC": {},
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5042,
    "paper_ids": [
      88
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Philipp Nieting",
    "display_name": "Philipp Nieting",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5043,
    "paper_ids": [
      588
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Claudio Canella",
    "display_name": "Claudio Canella",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5044,
    "paper_ids": [
      327
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Moritz Wilhelm",
    "display_name": "Moritz Wilhelm",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Security Lottery: Measuring Client-Side Web Security Inconsistencies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5045,
    "paper_ids": [
      1184
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joel Wanner",
    "display_name": "Joel Wanner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Creating a Secure Underlay for the Internet",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5046,
    "paper_ids": [
      129
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonghoon Kwon",
    "display_name": "Jonghoon Kwon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Creating a Secure Underlay for the Internet",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "did the shark eat the watchdog in the ntp pool deceiving the ntp pools monitoring system",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5047,
    "paper_ids": [
      129
    ],
    "papers_without_artifact_ids": [
      1705
    ]
  },
  {
    "name": "François Wirz",
    "display_name": "François Wirz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Creating a Secure Underlay for the Internet",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8070,
    "paper_ids": [
      129
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sunnyeo Park",
    "display_name": "Sunnyeo Park",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5049,
    "paper_ids": [
      1715
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daejun Kim",
    "display_name": "Daejun Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "adcube webvr ad fraud and practical confinement of thirdparty ads",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5050,
    "paper_ids": [
      1715
    ],
    "papers_without_artifact_ids": [
      1719
    ]
  },
  {
    "name": "Sai Lakshmi Bhavana Obbattu",
    "display_name": "Sai Lakshmi Bhavana Obbattu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5051,
    "paper_ids": [
      2533
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lukas Petzi",
    "display_name": "Lukas Petzi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5052,
    "paper_ids": [
      1175
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ala Eddine Ben Yahya",
    "display_name": "Ala Eddine Ben Yahya",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5053,
    "paper_ids": [
      1175
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas Prantl",
    "display_name": "Thomas Prantl",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5054,
    "paper_ids": [
      1175
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhicong Huang",
    "display_name": "Zhicong Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "CHES": 2,
      "PETS": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2022": 1
      },
      "CHES": {
        "2025": 2
      },
      "PETS": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "xboot freexor gates for ckks with applications to transciphering",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "sok fhefriendly symmetric ciphers and transciphering",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "bumblebee secure twoparty inference framework for large transformers",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "accelerating secure collaborative machine learning with protocolaware rdma",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "efficient 3pc for binary circuits with application to maliciouslysecure dnn inference",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "squirrel a scalable secure twoparty computation framework for training gradient boosting decision tree",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5055,
    "paper_ids": [
      4306
    ],
    "papers_without_artifact_ids": [
      4245,
      4246,
      309,
      3860,
      1896,
      4308
    ]
  },
  {
    "name": "Jiansheng Ding",
    "display_name": "Jiansheng Ding",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5056,
    "paper_ids": [
      4306
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Raphael Hiesgen",
    "display_name": "Raphael Hiesgen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5057,
    "paper_ids": [
      5405
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marcin Nawrocki",
    "display_name": "Marcin Nawrocki",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5058,
    "paper_ids": [
      5405
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alistair King",
    "display_name": "Alistair King",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5059,
    "paper_ids": [
      5405
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alberto Dainotti",
    "display_name": "Alberto Dainotti",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "ACSAC": {},
      "NSDI": {
        "2024": 1,
        "2019": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a system to detect forgedorigin bgp hijacks",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "access denied assessing physical risks to internet access networks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "blink fast connectivity recovery entirely in the data plane",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 5060,
    "paper_ids": [
      5405
    ],
    "papers_without_artifact_ids": [
      5406,
      5407,
      5408
    ]
  },
  {
    "name": "Thomas C. Schmidt",
    "display_name": "Thomas C. Schmidt",
    "affiliation": "Hochschule fr Angewandte Wissenschaften Hamburg, Germany",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5061,
    "paper_ids": [
      5405
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matthias Wählisch",
    "display_name": "Matthias Wählisch",
    "affiliation": "TU Dresden",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8071,
    "paper_ids": [
      5405
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shubham Jain 0006",
    "display_name": "Shubham Jain",
    "affiliation": "Sense Street, London, UK",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "did the neurons read your book documentlevel membership inference for large language models",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5063,
    "paper_ids": [
      3303
    ],
    "papers_without_artifact_ids": [
      3306
    ]
  },
  {
    "name": "Johannes Krupp",
    "display_name": "Johannes Krupp",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5064,
    "paper_ids": [
      848
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Samuel Judson",
    "display_name": "Samuel Judson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ppSAT: Towards Two-Party Private SAT Solving",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5065,
    "paper_ids": [
      3229
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Long Chen 0018",
    "display_name": "Long Chen",
    "affiliation": "New Jersey Institute of Technology, Newark, NJ, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5066,
    "paper_ids": [
      3308
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ju Chen",
    "display_name": "Ju Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5067,
    "paper_ids": [
      2274
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wookhyun Han",
    "display_name": "Wookhyun Han",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5068,
    "paper_ids": [
      2274
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingjun Yin",
    "display_name": "Mingjun Yin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5069,
    "paper_ids": [
      2274
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haochen Zeng",
    "display_name": "Haochen Zeng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5070,
    "paper_ids": [
      2274
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chengyu Song",
    "display_name": "Chengyu Song",
    "affiliation": "Univ. of California - Riverside",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "SOSP": 0,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 2
      },
      "SOSP": {},
      "ACSAC": {
        "2018": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "kleak towards automating the generation of multistep infoleak exploits against the linux kernel",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "dont waste my efforts pruning redundant sanitizer checks by developerimplemented type checks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "linkrid vetting imbalance reference counting in linux kernel with symbolic execution",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "iac on the feasibility of utilizing neural signals for access control",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 5071,
    "paper_ids": [
      2274
    ],
    "papers_without_artifact_ids": [
      2222,
      2225,
      2227,
      5409
    ]
  },
  {
    "name": "Tiantai Zhang",
    "display_name": "Tiantai Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ground Truth for Binary Disassembly is Not Easy",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5072,
    "paper_ids": [
      1754
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Miles Dai",
    "display_name": "Miles Dai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5073,
    "paper_ids": [
      1818
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Miguel Gomez-Garcia",
    "display_name": "Miguel Gomez-Garcia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5074,
    "paper_ids": [
      1818
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "John D. McCalpin",
    "display_name": "John D. McCalpin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5075,
    "paper_ids": [
      1818
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Townley",
    "display_name": "Daniel Townley",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5076,
    "paper_ids": [
      4309
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Oguz Ergin",
    "display_name": "Oguz Ergin",
    "affiliation": "TOBB ETÜ",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5077,
    "paper_ids": [
      4309
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Atri Bhattacharyya",
    "display_name": "Atri Bhattacharyya",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Midas: Systematic Kernel TOCTTOU Protection",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5078,
    "paper_ids": [
      13
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Uros Tesic",
    "display_name": "Uros Tesic",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Midas: Systematic Kernel TOCTTOU Protection",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5079,
    "paper_ids": [
      13
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Julia Slupska",
    "display_name": "Julia Slupska",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"They Look at Vulnerability and Use That to Abuse You\": Participatory Threat Modelling with Migrant Domestic Workers",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "networks of care tech abuse advocates digital security practices",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5080,
    "paper_ids": [
      4028
    ],
    "papers_without_artifact_ids": [
      5410
    ]
  },
  {
    "name": "Selina Y. Cho",
    "display_name": "Selina Y. Cho",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"They Look at Vulnerability and Use That to Abuse You\": Participatory Threat Modelling with Migrant Domestic Workers",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5081,
    "paper_ids": [
      4028
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marissa Begonia",
    "display_name": "Marissa Begonia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"They Look at Vulnerability and Use That to Abuse You\": Participatory Threat Modelling with Migrant Domestic Workers",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5082,
    "paper_ids": [
      4028
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nayanatara Prakash",
    "display_name": "Nayanatara Prakash",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"They Look at Vulnerability and Use That to Abuse You\": Participatory Threat Modelling with Migrant Domestic Workers",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5083,
    "paper_ids": [
      4028
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mallika Balakrishnan",
    "display_name": "Mallika Balakrishnan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"They Look at Vulnerability and Use That to Abuse You\": Participatory Threat Modelling with Migrant Domestic Workers",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5084,
    "paper_ids": [
      4028
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Derek Leung",
    "display_name": "Derek Leung",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "SOSP": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5085,
    "paper_ids": [
      982
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sergey Gorbunov 0001",
    "display_name": "Sergey Gorbunov",
    "affiliation": "University of Waterloo",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pixel multisignatures for consensus",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5086,
    "paper_ids": [
      982
    ],
    "papers_without_artifact_ids": [
      5411
    ]
  },
  {
    "name": "Leonid Reyzin",
    "display_name": "Leonid Reyzin",
    "affiliation": "Boston University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5087,
    "paper_ids": [
      982
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu Liang 0002",
    "display_name": "Yu Liang",
    "affiliation": "University of Massachusetts Lowell",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Detecting Logical Bugs of DBMS with Coverage-based Guidance",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5088,
    "paper_ids": [
      4124
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Song Liu",
    "display_name": "Song Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Detecting Logical Bugs of DBMS with Coverage-based Guidance",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "viper spotting syscallguard variables for dataonly attacks",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5089,
    "paper_ids": [
      4124
    ],
    "papers_without_artifact_ids": [
      4126
    ]
  },
  {
    "name": "Charlie Wolfe",
    "display_name": "Charlie Wolfe",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Khaleesi: Breaker of Advertising and Tracking Request Chains",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5090,
    "paper_ids": [
      805
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Charles Nguyen",
    "display_name": "Charles Nguyen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Khaleesi: Breaker of Advertising and Tracking Request Chains",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5091,
    "paper_ids": [
      805
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinsheng Ba",
    "display_name": "Jinsheng Ba",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Stateful Greybox Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5092,
    "paper_ids": [
      3295
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zahra Mirzamomen",
    "display_name": "Zahra Mirzamomen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Stateful Greybox Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5093,
    "paper_ids": [
      3295
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunang Chen",
    "display_name": "Yunang Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 2
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Data Access Minimization in Trigger-Action Platforms",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scalable metadatahiding for privacypreserving iot systems",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "experimental security analysis of the app model in business collaboration platforms",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5094,
    "paper_ids": [
      2541
    ],
    "papers_without_artifact_ids": [
      2549,
      2556
    ]
  },
  {
    "name": "Mohannad Alhanahnah",
    "display_name": "Mohannad Alhanahnah",
    "affiliation": "University of Wisconsin-Madison",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Data Access Minimization in Trigger-Action Platforms",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5095,
    "paper_ids": [
      2541
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Song Li 0006",
    "display_name": "Song Li",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mining Node.js Vulnerabilities via Object Dependence Graph and Query",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5096,
    "paper_ids": [
      461
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingqing Kang",
    "display_name": "Mingqing Kang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mining Node.js Vulnerabilities via Object Dependence Graph and Query",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5097,
    "paper_ids": [
      461
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianwei Hou",
    "display_name": "Jianwei Hou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Mining Node.js Vulnerabilities via Object Dependence Graph and Query",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5098,
    "paper_ids": [
      461
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tobias Cloosters",
    "display_name": "Tobias Cloosters",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "teerex discovery and exploitation of memory corruption vulnerabilities in sgx enclaves",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5099,
    "paper_ids": [
      107
    ],
    "papers_without_artifact_ids": [
      4318
    ]
  },
  {
    "name": "Johannes Willbold",
    "display_name": "Johannes Willbold",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "wireless signal injection attacks on vsat satellite modems",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5100,
    "paper_ids": [
      107
    ],
    "papers_without_artifact_ids": [
      1762
    ]
  },
  {
    "name": "Kyle Tilbury",
    "display_name": "Kyle Tilbury",
    "affiliation": "University of Waterloo",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Caring about Sharing: User Perceptions of Multiparty Data Sharing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5101,
    "paper_ids": [
      1210
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Patrick Leu",
    "display_name": "Patrick Leu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 2
      },
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ltrack stealthy tracking of mobile phones in lte",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "security of multicarrier timeofflight ranging",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 5102,
    "paper_ids": [
      413
    ],
    "papers_without_artifact_ids": [
      1233,
      1234
    ]
  },
  {
    "name": "Marc Roeschlin",
    "display_name": "Marc Roeschlin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "security of multicarrier timeofflight ranging",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 5103,
    "paper_ids": [
      413
    ],
    "papers_without_artifact_ids": [
      1234
    ]
  },
  {
    "name": "Brian Kondracki",
    "display_name": "Brian Kondracki",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ready or not here i come characterizing the security of prematurelypublic web applications",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "smudged fingerprints characterizing and improving the performance of web application fingerprinting",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5104,
    "paper_ids": [
      1113
    ],
    "papers_without_artifact_ids": [
      1117,
      1119
    ]
  },
  {
    "name": "Jianwei Huang",
    "display_name": "Jianwei Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SWAPP: A New Programmable Playground for Web Application Security",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "abusing hidden properties to attack the nodejs ecosystem",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5105,
    "paper_ids": [
      4021
    ],
    "papers_without_artifact_ids": [
      1418
    ]
  },
  {
    "name": "A. S. M. Rizvi",
    "display_name": "A. S. M. Rizvi",
    "affiliation": "University of Southern California",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Anycast Agility: Network Playbooks to Fight DDoS",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5106,
    "paper_ids": [
      5412
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leandro M. Bertholdo",
    "display_name": "Leandro M. Bertholdo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Anycast Agility: Network Playbooks to Fight DDoS",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5107,
    "paper_ids": [
      5412
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "João M. Ceron",
    "display_name": "João M. Ceron",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Anycast Agility: Network Playbooks to Fight DDoS",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8072,
    "paper_ids": [
      5412
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "John S. Heidemann",
    "display_name": "John S. Heidemann",
    "affiliation": "University of Southern California",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "SOSP": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Anycast Agility: Network Playbooks to Fight DDoS",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5109,
    "paper_ids": [
      5412
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qi-An Fu",
    "display_name": "Qi-An Fu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AutoDA: Automated Decision-based Iterative Adversarial Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5110,
    "paper_ids": [
      1885
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yinpeng Dong",
    "display_name": "Yinpeng Dong",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AutoDA: Automated Decision-based Iterative Adversarial Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "making them ask and answer jailbreaking large language models in few queries via disguise and reconstruction",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5111,
    "paper_ids": [
      1885
    ],
    "papers_without_artifact_ids": [
      1860
    ]
  },
  {
    "name": "Hang Su 0006",
    "display_name": "Hang Su",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AutoDA: Automated Decision-based Iterative Adversarial Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5112,
    "paper_ids": [
      1885
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jun Zhu 0001",
    "display_name": "Jun Zhu",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AutoDA: Automated Decision-based Iterative Adversarial Attacks",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5113,
    "paper_ids": [
      1885
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lun Wang 0001",
    "display_name": "Lun Wang",
    "affiliation": "University of California, Berkeley",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      },
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivGuard: Privacy Regulation Compliance Made Easier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "patrol provable defense against adversarial policy in twoplayer games",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "dplis boosting utility of differentially private deep learning via randomized smoothing",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 5114,
    "paper_ids": [
      3278
    ],
    "papers_without_artifact_ids": [
      942,
      3285
    ]
  },
  {
    "name": "Usmann Khan",
    "display_name": "Usmann Khan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivGuard: Privacy Regulation Compliance Made Easier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5115,
    "paper_ids": [
      3278
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joseph P. Near",
    "display_name": "Joseph P. Near",
    "affiliation": "University of Vermont",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 2
      },
      "PETS": {
        "2025": 1,
        "2026": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivGuard: Privacy Regulation Compliance Made Easier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "we need a standard toward an expertinformed privacy label for differential privacy",
        "conference": "PETS",
        "year": 2026
      },
      {
        "title": "sok usability studies in differential privacy",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "evaluating the usability of differential privacy tools with data practitioners",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "efficient differentially private secure aggregation for federated learning via hardness of learning with errors",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5116,
    "paper_ids": [
      3278
    ],
    "papers_without_artifact_ids": [
      5413,
      5414,
      5415,
      5416
    ]
  },
  {
    "name": "Jithendaraa Subramanian",
    "display_name": "Jithendaraa Subramanian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivGuard: Privacy Regulation Compliance Made Easier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5117,
    "paper_ids": [
      3278
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Neel Somani",
    "display_name": "Neel Somani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivGuard: Privacy Regulation Compliance Made Easier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5118,
    "paper_ids": [
      3278
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrew Low",
    "display_name": "Andrew Low",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivGuard: Privacy Regulation Compliance Made Easier",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5119,
    "paper_ids": [
      3278
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hang Zhang 0012",
    "display_name": "Hang Zhang",
    "affiliation": "Indiana University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2021": 2
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "statically discover crossentry useafterfree vulnerabilities in the linux kernel",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "a hybrid alias analysis and its application to global variable protection in the linux kernel",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "syzvegas beating kernel fuzzing odds with reinforcement learning",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "an investigation of the android kernel patch ecosystem",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5120,
    "paper_ids": [
      2220
    ],
    "papers_without_artifact_ids": [
      658,
      2144,
      2228,
      2229
    ]
  },
  {
    "name": "Alon Shakevsky",
    "display_name": "Alon Shakevsky",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5121,
    "paper_ids": [
      3156
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Avishai Wool",
    "display_name": "Avishai Wool",
    "affiliation": "Tel Aviv University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "CHES": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5122,
    "paper_ids": [
      3156
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peter Mayer 0001",
    "display_name": "Peter Mayer",
    "affiliation": "Queen's University Belfast",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2022": 2,
        "2021": 1
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Why Users (Don't) Use Password Managers at a Large Educational Institution",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "of mothers and managers the effect of videos depicting gender stereotypes on women and men in the security and privacy field",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "i dont know why i check this investigating expert users strategies to detect email signature spoofing attacks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "now im a bit angry individuals awareness perception and responses to data breaches that affected them",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "an investigation of phishing awareness and education over time when and how to best remind users",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "on the systematic development and evaluation of password security awarenessraising materials",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 5123,
    "paper_ids": [
      860
    ],
    "papers_without_artifact_ids": [
      5417,
      959,
      874,
      5418,
      5419
    ]
  },
  {
    "name": "Bijeeta Pal",
    "display_name": "Bijeeta Pal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Might I Get Pwned: A Second Generation Compromised Credential Checking Service",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5124,
    "paper_ids": [
      2542
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marina Sanusi Bohuk",
    "display_name": "Marina Sanusi Bohuk",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2,
        "2022": 2,
        "2025": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Might I Get Pwned: A Second Generation Compromised Credential Checking Service",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "im trying to learnand im shooting myself in the foot beginners struggles when solving binary exploitation exercises",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "araña discovering and characterizing password guessing attacks in practice",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "account security interfaces important unintuitive and untrustworthy",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "gossamer securely measuring passwordbased logins",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5125,
    "paper_ids": [
      2542
    ],
    "papers_without_artifact_ids": [
      2280,
      2552,
      4284,
      2555
    ]
  },
  {
    "name": "Luke Valenta",
    "display_name": "Luke Valenta",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Might I Get Pwned: A Second Generation Compromised Credential Checking Service",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5126,
    "paper_ids": [
      2542
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tara Whalen",
    "display_name": "Tara Whalen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Might I Get Pwned: A Second Generation Compromised Credential Checking Service",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "let the right one in attestation as a usable captcha alternative",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5127,
    "paper_ids": [
      2542
    ],
    "papers_without_artifact_ids": [
      2944
    ]
  },
  {
    "name": "Michael Harrity",
    "display_name": "Michael Harrity",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5128,
    "paper_ids": [
      2481
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Frederick Sell",
    "display_name": "Frederick Sell",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5129,
    "paper_ids": [
      2481
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Paul Grubbs",
    "display_name": "Paul Grubbs",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1,
        "2021": 1
      },
      "ACSAC": {},
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Zero-Knowledge Middleboxes",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "zombie middleboxes that dont snoop",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "partitioning oracle attacks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "pancake frequency smoothing for encrypted data stores",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5130,
    "paper_ids": [
      2869
    ],
    "papers_without_artifact_ids": [
      2870,
      4288,
      2707
    ]
  },
  {
    "name": "Arasu Arun",
    "display_name": "Arasu Arun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Zero-Knowledge Middleboxes",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "zombie middleboxes that dont snoop",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 5131,
    "paper_ids": [
      2869
    ],
    "papers_without_artifact_ids": [
      2870
    ]
  },
  {
    "name": "Ye Zhang",
    "display_name": "Ye Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Zero-Knowledge Middleboxes",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5132,
    "paper_ids": [
      2869
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pengcheng Fang",
    "display_name": "Pengcheng Fang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Back-Propagating System Dependency Impact for Attack Investigation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5133,
    "paper_ids": [
      2494
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Changlin Liu",
    "display_name": "Changlin Liu",
    "affiliation": "Stanford University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Back-Propagating System Dependency Impact for Attack Investigation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5134,
    "paper_ids": [
      2494
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yanfang (Fanny) Ye",
    "display_name": "Yanfang (Fanny) Ye",
    "affiliation": "University of Notre Dame",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Back-Propagating System Dependency Impact for Attack Investigation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5135,
    "paper_ids": [
      2494
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xusheng Xiao",
    "display_name": "Xusheng Xiao",
    "affiliation": "Arizona State University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ATC": 0,
      "ACSAC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2,
        "2022": 1
      },
      "ATC": {},
      "ACSAC": {
        "2019": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Back-Propagating System Dependency Impact for Attack Investigation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "careful about what app promotion ads recommend detecting and explaining malware promotion via app promotion graph",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "nodlink an online system for finegrained apt attack detection and investigation",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "distdet a costeffective distributed cyber threat detection system",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "on the security risks of knowledge graph reasoning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "progressive processing of systembehavioral query",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 5136,
    "paper_ids": [
      2494
    ],
    "papers_without_artifact_ids": [
      5420,
      4348,
      783,
      785,
      5421
    ]
  },
  {
    "name": "Nikolaos Alexopoulos",
    "display_name": "Nikolaos Alexopoulos",
    "affiliation": "Technical University of Darmstadt",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5137,
    "paper_ids": [
      4319
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Manuel Brack",
    "display_name": "Manuel Brack",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5138,
    "paper_ids": [
      4319
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jan Philipp Wagner",
    "display_name": "Jan Philipp Wagner",
    "affiliation": "Technical University of Darmstadt, Germany",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5139,
    "paper_ids": [
      4319
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tim Grube",
    "display_name": "Tim Grube",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "userlevel label leakage from gradients in federated learning",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 5140,
    "paper_ids": [
      4319
    ],
    "papers_without_artifact_ids": [
      4324
    ]
  },
  {
    "name": "Andrew J. Blumberg",
    "display_name": "Andrew J. Blumberg",
    "affiliation": "Columbia University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0,
      "EUROSYS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Representation of Numerical Optimization Problems for SNARKs",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5141,
    "paper_ids": [
      1078
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jean-Luc Watson",
    "display_name": "Jean-Luc Watson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Piranha: A GPU Platform for Secure Computation",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5142,
    "paper_ids": [
      669
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuchen Zhang 0006",
    "display_name": "Yuchen Zhang",
    "affiliation": "New York University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Debloating Address Sanitizer",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5143,
    "paper_ids": [
      1755
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nikos Triandopoulos",
    "display_name": "Nikos Triandopoulos",
    "affiliation": "Brown University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Debloating Address Sanitizer",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5144,
    "paper_ids": [
      1755
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vincent Cheval",
    "display_name": "Vincent Cheval",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SAPIC+: protocol verifiers of the world, unite!",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hash gone bad automated discovery of protocol attacks that exploit hash function weaknesses",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5145,
    "paper_ids": [
      2521
    ],
    "papers_without_artifact_ids": [
      1882
    ]
  },
  {
    "name": "Zhaohan Xi",
    "display_name": "Zhaohan Xi",
    "affiliation": "Binghamton University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 2,
        "2021": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Security Risks of AutoML",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the difficulty of defending contrastive learning against backdoor attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "on the security risks of knowledge graph reasoning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "seeing is living rethinking the security of facial liveness verification in the deepfake era",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "graph backdoor",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5146,
    "paper_ids": [
      773
    ],
    "papers_without_artifact_ids": [
      1546,
      785,
      1557,
      1559
    ]
  },
  {
    "name": "Ange Albertini",
    "display_name": "Ange Albertini",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How to Abuse and Fix Authenticated Encryption Without Key Commitment",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5147,
    "paper_ids": [
      5422
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thai Duong",
    "display_name": "Thai Duong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How to Abuse and Fix Authenticated Encryption Without Key Commitment",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5148,
    "paper_ids": [
      5422
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shay Gueron",
    "display_name": "Shay Gueron",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How to Abuse and Fix Authenticated Encryption Without Key Commitment",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5149,
    "paper_ids": [
      5422
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stefan Kölbl",
    "display_name": "Stefan Kölbl",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How to Abuse and Fix Authenticated Encryption Without Key Commitment",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8073,
    "paper_ids": [
      5422
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Atul Luykx",
    "display_name": "Atul Luykx",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How to Abuse and Fix Authenticated Encryption Without Key Commitment",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reducing hsm reliance in payments through proxy reencryption",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5151,
    "paper_ids": [
      5422
    ],
    "papers_without_artifact_ids": [
      5423
    ]
  },
  {
    "name": "Sophie Schmieg",
    "display_name": "Sophie Schmieg",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How to Abuse and Fix Authenticated Encryption Without Key Commitment",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5152,
    "paper_ids": [
      5422
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fabio Pagani",
    "display_name": "Fabio Pagani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 2
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Regulator: Dynamic Analysis to Detect ReDoS",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "decomperson how humans decompile and what we can learn from it",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5153,
    "paper_ids": [
      1151
    ],
    "papers_without_artifact_ids": [
      1160
    ]
  },
  {
    "name": "Viet Tung Hoang",
    "display_name": "Viet Tung Hoang",
    "affiliation": "Florida State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Faster Yet Safer: Logging System Via Fixed-Key Blockcipher",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5154,
    "paper_ids": [
      5424
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cong Wu",
    "display_name": "Cong Wu",
    "affiliation": "The University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Faster Yet Safer: Logging System Via Fixed-Key Blockcipher",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5155,
    "paper_ids": [
      5424
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xin Yuan 0001",
    "display_name": "Xin Yuan",
    "affiliation": "Florida State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Faster Yet Safer: Logging System Via Fixed-Key Blockcipher",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5156,
    "paper_ids": [
      5424
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michele Grisafi",
    "display_name": "Michele Grisafi",
    "affiliation": "University of Trento",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PISTIS: Trusted Computing Architecture for Low-end Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5157,
    "paper_ids": [
      4035
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marco Roveri",
    "display_name": "Marco Roveri",
    "affiliation": "University of Trento",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PISTIS: Trusted Computing Architecture for Low-end Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5158,
    "paper_ids": [
      4035
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Luca Dolfi",
    "display_name": "Luca Dolfi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5159,
    "paper_ids": [
      132
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Irwin Reyes",
    "display_name": "Irwin Reyes",
    "affiliation": "Two Six Technologies",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Security and Privacy Perceptions of Third-Party Application Access for Google Accounts",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the price is not right comparing privacy in free and paid apps",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 5160,
    "paper_ids": [
      861
    ],
    "papers_without_artifact_ids": [
      3928
    ]
  },
  {
    "name": "Olga Gkountouna",
    "display_name": "Olga Gkountouna",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "One-off Disclosure Control by Heterogeneous Generalization",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5161,
    "paper_ids": [
      5425
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Katerina Doka",
    "display_name": "Katerina Doka",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "One-off Disclosure Control by Heterogeneous Generalization",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5162,
    "paper_ids": [
      5425
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingqiang Xue",
    "display_name": "Mingqiang Xue",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "One-off Disclosure Control by Heterogeneous Generalization",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5163,
    "paper_ids": [
      5425
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianneng Cao",
    "display_name": "Jianneng Cao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "One-off Disclosure Control by Heterogeneous Generalization",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5164,
    "paper_ids": [
      5425
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Panagiotis Karras",
    "display_name": "Panagiotis Karras",
    "affiliation": "University of Copenhagen",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "One-off Disclosure Control by Heterogeneous Generalization",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5165,
    "paper_ids": [
      5425
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sabrina Amft",
    "display_name": "Sabrina Amft",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2021": 1
      },
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "you have to read 50 different rfcs that contradict each other an interview study on the experiences of implementing cryptographic standards",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "privacy rarely considered exploring considerations in the adoption of thirdparty services by websites",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "why eve and mallory still love android revisiting tls insecurity in android applications",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5166,
    "paper_ids": [
      1241
    ],
    "papers_without_artifact_ids": [
      1249,
      116,
      408
    ]
  },
  {
    "name": "Ben Gras",
    "display_name": "Ben Gras",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5167,
    "paper_ids": [
      924
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ritik Roongta",
    "display_name": "Ritik Roongta",
    "affiliation": "New York University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sheeps clothing wolfish intent automated detection and evaluation of problematic allowed advertisements",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 5168,
    "paper_ids": [
      3095
    ],
    "papers_without_artifact_ids": [
      5426
    ]
  },
  {
    "name": "Shujun Tang",
    "display_name": "Shujun Tang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Building an Open, Robust, and Stable Voting-Based Domain Top List",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "revealing the black box of device search engine scanning assets strategies and ethical consideration",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "dissecting open edge computing platforms ecosystem usage and security risks",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 5169,
    "paper_ids": [
      901
    ],
    "papers_without_artifact_ids": [
      245,
      907
    ]
  },
  {
    "name": "Xiaofeng Zheng",
    "display_name": "Xiaofeng Zheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 2,
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Building an Open, Robust, and Stable Voting-Based Domain Top List",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding the implementation and security implications of protective dns services",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "a largescale and longitudinal measurement study of dkim deployment",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "weak links in authentication chains a largescale analysis of email sender spoofing attacks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "poison over troubled forwarders a cache poisoning attack targeting dns forwarding devices",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5170,
    "paper_ids": [
      901
    ],
    "papers_without_artifact_ids": [
      909,
      917,
      259,
      920
    ]
  },
  {
    "name": "Qingran Lin",
    "display_name": "Qingran Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Building an Open, Robust, and Stable Voting-Based Domain Top List",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5171,
    "paper_ids": [
      901
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bandan Das",
    "display_name": "Bandan Das",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Morphuzz: Bending (Input) Space to Fuzz Virtual Devices",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5172,
    "paper_ids": [
      799
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stefan Hajnoczi",
    "display_name": "Stefan Hajnoczi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Morphuzz: Bending (Input) Space to Fuzz Virtual Devices",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5173,
    "paper_ids": [
      799
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dino Bollinger",
    "display_name": "Dino Bollinger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Automating Cookie Consent and GDPR Violation Detection",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5174,
    "paper_ids": [
      443
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhenhua Zou",
    "display_name": "Zhenhua Zou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5175,
    "paper_ids": [
      547
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhi Wang 0004",
    "display_name": "Zhi Wang",
    "affiliation": "Florida State University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "EUROSYS": 0,
      "ATC": 0,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 2
      },
      "EUROSYS": {},
      "ATC": {},
      "ACSAC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sgxlock towards efficiently establishing mutual distrust between host application and enclave for sgx",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "viblive a continuous liveness detection for secure voice user interface in iot environment",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "automatic hot patch generation for android kernels",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5176,
    "paper_ids": [
      547
    ],
    "papers_without_artifact_ids": [
      322,
      5427,
      3131
    ]
  },
  {
    "name": "Tiancheng Xie",
    "display_name": "Tiancheng Xie",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Polynomial Commitment with a One-to-Many Prover and Applications",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "updatable private set intersection",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 5177,
    "paper_ids": [
      1402
    ],
    "papers_without_artifact_ids": [
      5428
    ]
  },
  {
    "name": "Mojtaba Zaheri",
    "display_name": "Mojtaba Zaheri",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5178,
    "paper_ids": [
      4326
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yossi Oren",
    "display_name": "Yossi Oren",
    "affiliation": "Ben-Gurion University of the Negev",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2021": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pixel thief exploiting svg filter leakage in firefox and chrome",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "primeprobe 1 javascript 0 overcoming browserbased sidechannel defenses",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5179,
    "paper_ids": [
      4326
    ],
    "papers_without_artifact_ids": [
      1504,
      1509
    ]
  },
  {
    "name": "Zenong Zhang",
    "display_name": "Zenong Zhang",
    "affiliation": "Google",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5180,
    "paper_ids": [
      5429
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zach Patterson",
    "display_name": "Zach Patterson",
    "affiliation": "The University of Texas at Dallas",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5181,
    "paper_ids": [
      5429
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Hicks 0001",
    "display_name": "Michael Hicks",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "benefits and drawbacks of adopting a secure programming language rust as a case study",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "understanding security mistakes developers make qualitative analysis from build it break it fix it",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5182,
    "paper_ids": [
      5429
    ],
    "papers_without_artifact_ids": [
      1277,
      1280
    ]
  },
  {
    "name": "Shiyi Wei",
    "display_name": "Shiyi Wei",
    "affiliation": "University of Texas at Dallas",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5183,
    "paper_ids": [
      5429
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vaibhav Bedi",
    "display_name": "Vaibhav Bedi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5184,
    "paper_ids": [
      2188
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sungbae Yoo",
    "display_name": "Sungbae Yoo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5185,
    "paper_ids": [
      657
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinbum Park",
    "display_name": "Jinbum Park",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploiting uses of uninitialized stack variables in linux kernels to leak kernel pointers",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "primecount novel crossworld covert channels on arm trustzone",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 5186,
    "paper_ids": [
      657
    ],
    "papers_without_artifact_ids": [
      829,
      832
    ]
  },
  {
    "name": "Seolheui Kim",
    "display_name": "Seolheui Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5187,
    "paper_ids": [
      657
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yeji Kim",
    "display_name": "Yeji Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5188,
    "paper_ids": [
      657
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Richard Sadek",
    "display_name": "Richard Sadek",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Jenny: Securing Syscalls for PKU-based Memory Isolation Systems",
        "conference": "USENIXSEC",
        "year": 2022,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5189,
    "paper_ids": [
      273
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muhammad Shujaat Mirza",
    "display_name": "Muhammad Shujaat Mirza",
    "affiliation": "New York University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "PETS": {
        "2024": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Exposing the Guardrails: Reverse-Engineering and Jailbreaking Safety Filters in DALL·E Text-to-Image Pipelines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "media talks privacy unraveling a decade of privacy discourse around the world",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "codexleaks privacy leaks from code generation language models in github copilot",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "sok managing longitudinal privacy of publicly shared personal online data",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 5190,
    "paper_ids": [
      3075
    ],
    "papers_without_artifact_ids": [
      3076,
      3079,
      3082
    ]
  },
  {
    "name": "Nan Wang 0028",
    "display_name": "Nan Wang",
    "affiliation": "Data61, CSIRO, Australia",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flashswift a configurable and more efficient range proof with transparent setup",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 5191,
    "paper_ids": [
      2272
    ],
    "papers_without_artifact_ids": [
      5430
    ]
  },
  {
    "name": "Qianhui Wang",
    "display_name": "Qianhui Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5192,
    "paper_ids": [
      2272
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dongxi Liu",
    "display_name": "Dongxi Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flashswift a configurable and more efficient range proof with transparent setup",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 5193,
    "paper_ids": [
      2272
    ],
    "papers_without_artifact_ids": [
      5430
    ]
  },
  {
    "name": "Muhammed F. Esgin",
    "display_name": "Muhammed F. Esgin",
    "affiliation": "Monash University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5194,
    "paper_ids": [
      2272
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seongho Keum",
    "display_name": "Seongho Keum",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Private Investigator: Extracting Personally Identifiable Information from Large Language Models Using Optimized Prompts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5195,
    "paper_ids": [
      1716
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leo Marchyok",
    "display_name": "Leo Marchyok",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Private Investigator: Extracting Personally Identifiable Information from Large Language Models Using Optimized Prompts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5196,
    "paper_ids": [
      1716
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu Pan",
    "display_name": "Yu Pan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CollisionRepair: First-Aid and Automated Patching for Storage Collision Vulnerabilities in Smart Contracts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5197,
    "paper_ids": [
      4327
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wanjing Han",
    "display_name": "Wanjing Han",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CollisionRepair: First-Aid and Automated Patching for Storage Collision Vulnerabilities in Smart Contracts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5198,
    "paper_ids": [
      4327
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Canran Wang",
    "display_name": "Canran Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure Information Embedding in Forensic 3D Fingerprinting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5199,
    "paper_ids": [
      174
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mi Zhou",
    "display_name": "Mi Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure Information Embedding in Forensic 3D Fingerprinting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5200,
    "paper_ids": [
      174
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vinh Pham",
    "display_name": "Vinh Pham",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure Information Embedding in Forensic 3D Fingerprinting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5201,
    "paper_ids": [
      174
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Senyue Hao",
    "display_name": "Senyue Hao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure Information Embedding in Forensic 3D Fingerprinting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5202,
    "paper_ids": [
      174
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chao Zhou",
    "display_name": "Chao Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure Information Embedding in Forensic 3D Fingerprinting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5203,
    "paper_ids": [
      174
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Netanel Raviv",
    "display_name": "Netanel Raviv",
    "affiliation": "Washington University in St. Louis",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure Information Embedding in Forensic 3D Fingerprinting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5204,
    "paper_ids": [
      174
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bosi Zhang",
    "display_name": "Bosi Zhang",
    "affiliation": "Huazhong University of Science and Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Following Devils' Footprint: Towards Real-time Detection of Price Manipulation Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5205,
    "paper_ids": [
      3954
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kai Ma",
    "display_name": "Kai Ma",
    "affiliation": "Huazhong University of Science and Technology",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Following Devils' Footprint: Towards Real-time Detection of Price Manipulation Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "noctua towards automated and practical finegrained consistency analysis",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 5206,
    "paper_ids": [
      3954
    ],
    "papers_without_artifact_ids": [
      643
    ]
  },
  {
    "name": "Songze Li",
    "display_name": "Songze Li",
    "affiliation": "Southeast University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "urvfl undetectable data reconstruction attack on vertical federated learning",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "manifoldchain maximizing blockchain throughput via bandwidthclustered sharding",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "backdoorindicator leveraging ood data for proactive backdoor detection in federated learning",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5207,
    "paper_ids": [
      4331
    ],
    "papers_without_artifact_ids": [
      5431,
      5432,
      5433
    ]
  },
  {
    "name": "Joseph Spracklen",
    "display_name": "Joseph Spracklen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5208,
    "paper_ids": [
      4333
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Raveen Wijewickrama",
    "display_name": "Raveen Wijewickrama",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mirageflow a new bandwidth inflation attack on tor",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5209,
    "paper_ids": [
      4333
    ],
    "papers_without_artifact_ids": [
      4303
    ]
  },
  {
    "name": "A. H. M. Nazmus Sakib",
    "display_name": "A. H. M. Nazmus Sakib",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5210,
    "paper_ids": [
      4333
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anindya Maiti",
    "display_name": "Anindya Maiti",
    "affiliation": "University of Oklahoma",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "acoustics to the rescue physical key inference attack revisited",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5211,
    "paper_ids": [
      4333
    ],
    "papers_without_artifact_ids": [
      4335
    ]
  },
  {
    "name": "Bimal Viswanath",
    "display_name": "Bimal Viswanath",
    "affiliation": "Virginia Tech",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "EUROSYS": 0,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      },
      "EUROSYS": {},
      "ACSAC": {
        "2023": 1,
        "2020": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a first look at toxicity injection attacks on opendomain chatbots",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "tminer a generative approach to defend against trojan attacks on dnnbased text classification",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "noisescope detecting deepfake images in a blind setting",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 5212,
    "paper_ids": [
      4333
    ],
    "papers_without_artifact_ids": [
      5434,
      5435,
      5436
    ]
  },
  {
    "name": "Bochuan Cao",
    "display_name": "Bochuan Cao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Watch the Watchers! On the Security Risks of Robustness-Enhancing Diffusion Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the difficulty of defending contrastive learning against backdoor attacks",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5213,
    "paper_ids": [
      1538
    ],
    "papers_without_artifact_ids": [
      1546
    ]
  },
  {
    "name": "Jinghui Chen",
    "display_name": "Jinghui Chen",
    "affiliation": "Pennsylvania State University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Watch the Watchers! On the Security Risks of Robustness-Enhancing Diffusion Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the difficulty of defending contrastive learning against backdoor attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "unveiling the secrets without data can graph neural networks be exploited through datafree model extraction attacks",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5214,
    "paper_ids": [
      1538
    ],
    "papers_without_artifact_ids": [
      1546,
      5032
    ]
  },
  {
    "name": "Fenglong Ma",
    "display_name": "Fenglong Ma",
    "affiliation": "Pennsylvania State University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Watch the Watchers! On the Security Risks of Robustness-Enhancing Diffusion Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the security risks of knowledge graph reasoning",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5215,
    "paper_ids": [
      1538
    ],
    "papers_without_artifact_ids": [
      785
    ]
  },
  {
    "name": "Florian Hantke",
    "display_name": "Florian Hantke",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Web Execution Bundles: Reproducible, Accurate, and Archivable Web Measurements",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5216,
    "paper_ids": [
      1185
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peter Snyder",
    "display_name": "Peter Snyder",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "PETS": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Web Execution Bundles: Reproducible, Accurate, and Archivable Web Measurements",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "measuring the accuracy and effectiveness of pii removal services",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "poolparty exploiting browser resource pools for web tracking",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "blocked or broken automatically detecting when privacy interventions break websites",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 5217,
    "paper_ids": [
      1185
    ],
    "papers_without_artifact_ids": [
      3317,
      3319,
      3200
    ]
  },
  {
    "name": "Jiaqin Yan",
    "display_name": "Jiaqin Yan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EKC: A Portable and Extensible Kernel Compartment for De-Privileging Commodity OS",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5218,
    "paper_ids": [
      365
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qiujiang Chen",
    "display_name": "Qiujiang Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EKC: A Portable and Extensible Kernel Compartment for De-Privileging Commodity OS",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5219,
    "paper_ids": [
      365
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuai Zhou",
    "display_name": "Shuai Zhou",
    "affiliation": "USTC",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EKC: A Portable and Extensible Kernel Compartment for De-Privileging Commodity OS",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5220,
    "paper_ids": [
      365
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuke Peng",
    "display_name": "Yuke Peng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EKC: A Portable and Extensible Kernel Compartment for De-Privileging Commodity OS",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5221,
    "paper_ids": [
      365
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jaehan Kim",
    "display_name": "Jaehan Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Refusal Is Not an Option: Unlearning Safety Alignment of Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "heimdallr fingerprinting sdwan controlplane architecture via encrypted control traffic",
        "conference": "ACSAC",
        "year": 2022
      }
    ],
    "author_id": 5222,
    "paper_ids": [
      1717
    ],
    "papers_without_artifact_ids": [
      4339
    ]
  },
  {
    "name": "Qichang Liu",
    "display_name": "Qichang Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CertPHash: Towards Certified Perceptual Hashing via Robust Training",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5223,
    "paper_ids": [
      462
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christopher Brix",
    "display_name": "Christopher Brix",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CertPHash: Towards Certified Perceptual Hashing via Robust Training",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5224,
    "paper_ids": [
      462
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Huan Zhang 0001",
    "display_name": "Huan Zhang",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CertPHash: Towards Certified Perceptual Hashing via Robust Training",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diffsmooth certifiably robust learning via diffusion models and local smoothing",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5225,
    "paper_ids": [
      462
    ],
    "papers_without_artifact_ids": [
      4142
    ]
  },
  {
    "name": "Tianyao Gu",
    "display_name": "Tianyao Gu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5226,
    "paper_ids": [
      2491
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yilei Wang",
    "display_name": "Yilei Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5227,
    "paper_ids": [
      2491
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bingnan Chen",
    "display_name": "Bingnan Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5228,
    "paper_ids": [
      2491
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ke Yi 0001",
    "display_name": "Ke Yi",
    "affiliation": "HKUST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5229,
    "paper_ids": [
      2491
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiawen Zhang 0005",
    "display_name": "Jiawen Zhang",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Activation Approximations Can Incur Safety Vulnerabilities in Aligned LLMs: Comprehensive Analysis and Defense",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secure transformer inference made noninteractive",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 5230,
    "paper_ids": [
      299
    ],
    "papers_without_artifact_ids": [
      307
    ]
  },
  {
    "name": "Kejia Chen 0007",
    "display_name": "Kejia Chen",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Activation Approximations Can Incur Safety Vulnerabilities in Aligned LLMs: Comprehensive Analysis and Defense",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secure transformer inference made noninteractive",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 5231,
    "paper_ids": [
      299
    ],
    "papers_without_artifact_ids": [
      307
    ]
  },
  {
    "name": "Lipeng He",
    "display_name": "Lipeng He",
    "affiliation": "University of Waterloo",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Activation Approximations Can Incur Safety Vulnerabilities in Aligned LLMs: Comprehensive Analysis and Defense",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secure transformer inference made noninteractive",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "on the atomicity and efficiency of blockchain payment channels",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 5232,
    "paper_ids": [
      299
    ],
    "papers_without_artifact_ids": [
      307,
      310
    ]
  },
  {
    "name": "Jian Lou 0001",
    "display_name": "Jian Lou",
    "affiliation": "Sun Yat-sen University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Activation Approximations Can Incur Safety Vulnerabilities in Aligned LLMs: Comprehensive Analysis and Defense",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5233,
    "paper_ids": [
      299
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dan Li 0032",
    "display_name": "Dan Li",
    "affiliation": "Sun Yat-sen University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Activation Approximations Can Incur Safety Vulnerabilities in Aligned LLMs: Comprehensive Analysis and Defense",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5234,
    "paper_ids": [
      299
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zunlei Feng",
    "display_name": "Zunlei Feng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Activation Approximations Can Incur Safety Vulnerabilities in Aligned LLMs: Comprehensive Analysis and Defense",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5235,
    "paper_ids": [
      299
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingli Song",
    "display_name": "Mingli Song",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Activation Approximations Can Incur Safety Vulnerabilities in Aligned LLMs: Comprehensive Analysis and Defense",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5236,
    "paper_ids": [
      299
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yupeng Yang",
    "display_name": "Yupeng Yang",
    "affiliation": "Yale University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hybrid Language Processor Fuzzing via LLM-Based Constraint Solving",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards generic database management system fuzzing",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "µfuzz redesign of parallel fuzzing using microservice architecture",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5237,
    "paper_ids": [
      1412
    ],
    "papers_without_artifact_ids": [
      1414,
      1416
    ]
  },
  {
    "name": "Shenglong Yao",
    "display_name": "Shenglong Yao",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hybrid Language Processor Fuzzing via LLM-Based Constraint Solving",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5238,
    "paper_ids": [
      1412
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jizhou Chen",
    "display_name": "Jizhou Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hybrid Language Processor Fuzzing via LLM-Based Constraint Solving",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards generic database management system fuzzing",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "pasan detecting peripheral access concurrency bugs within baremetal embedded applications",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5239,
    "paper_ids": [
      1412
    ],
    "papers_without_artifact_ids": [
      1414,
      4181
    ]
  },
  {
    "name": "Daqi Hu",
    "display_name": "Daqi Hu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Understanding zk-SNARKs: The Gap Between Research and Practice",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5240,
    "paper_ids": [
      3322
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunbo Yang",
    "display_name": "Yunbo Yang",
    "affiliation": "Yale University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Understanding zk-SNARKs: The Gap Between Research and Practice",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "siniel distributed privacypreserving zksnark",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 5241,
    "paper_ids": [
      3322
    ],
    "papers_without_artifact_ids": [
      4418
    ]
  },
  {
    "name": "Felix Stöger",
    "display_name": "Felix Stöger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BGP Vortex: Update Message Floods Can Create Internet Instabilities",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8074,
    "paper_ids": [
      1702
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Giacomo Giuliari",
    "display_name": "Giacomo Giuliari",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BGP Vortex: Update Message Floods Can Create Internet Instabilities",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5243,
    "paper_ids": [
      1702
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jordi Subirà Nieto",
    "display_name": "Jordi Subirà Nieto",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BGP Vortex: Update Message Floods Can Create Internet Instabilities",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8075,
    "paper_ids": [
      1702
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuxi Ling",
    "display_name": "Yuxi Ling",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sound and Efficient Generation of Data-Oriented Exploits via Programming Language Synthesis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5245,
    "paper_ids": [
      3947
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gokul Rajiv",
    "display_name": "Gokul Rajiv",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sound and Efficient Generation of Data-Oriented Exploits via Programming Language Synthesis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5246,
    "paper_ids": [
      3947
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kiran Gopinathan",
    "display_name": "Kiran Gopinathan",
    "affiliation": "University of Illinois Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sound and Efficient Generation of Data-Oriented Exploits via Programming Language Synthesis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5247,
    "paper_ids": [
      3947
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Neil P. Thimmaiah",
    "display_name": "Neil P. Thimmaiah",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FIXX: FInding eXploits from eXamples",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5248,
    "paper_ids": [
      5437
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yashashvi J. Dave",
    "display_name": "Yashashvi J. Dave",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FIXX: FInding eXploits from eXamples",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5249,
    "paper_ids": [
      5437
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rigel Gjomemo",
    "display_name": "Rigel Gjomemo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FIXX: FInding eXploits from eXamples",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5250,
    "paper_ids": [
      5437
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "V. N. Venkatakrishnan",
    "display_name": "V. N. Venkatakrishnan",
    "affiliation": "University of Illinois at Chicago",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SOSP": {},
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FIXX: FInding eXploits from eXamples",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5251,
    "paper_ids": [
      5437
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chenyang Zhao 0006",
    "display_name": "Chenyang Zhao",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Revisiting Training-Inference Trigger Intensity in Backdoor Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5252,
    "paper_ids": [
      3312
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shiwei Wang",
    "display_name": "Shiwei Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Revisiting Training-Inference Trigger Intensity in Backdoor Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5253,
    "paper_ids": [
      3312
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Longtian Wang",
    "display_name": "Longtian Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Revisiting Training-Inference Trigger Intensity in Backdoor Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5254,
    "paper_ids": [
      3312
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhengyu Zhao 0001",
    "display_name": "Zhengyu Zhao",
    "affiliation": "Xi'an Jiaotong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Revisiting Training-Inference Trigger Intensity in Backdoor Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5255,
    "paper_ids": [
      3312
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xunguang Wang",
    "display_name": "Xunguang Wang",
    "affiliation": "Western Sydney University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5256,
    "paper_ids": [
      949
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhenlan Ji",
    "display_name": "Zhenlan Ji",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5257,
    "paper_ids": [
      949
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pingchuan Ma 0004",
    "display_name": "Pingchuan Ma",
    "affiliation": "Hong Kong University of Science and Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5258,
    "paper_ids": [
      949
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ning Liu",
    "display_name": "Ning Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5259,
    "paper_ids": [
      949
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Juergen Rahmel",
    "display_name": "Juergen Rahmel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5260,
    "paper_ids": [
      949
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Side Liu",
    "display_name": "Side Liu",
    "affiliation": "Tulane University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VAPD: An Anomaly Detection Model for PDF Malware Forensics with Adversarial Robustness",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5261,
    "paper_ids": [
      2256
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yilin Zhou",
    "display_name": "Yilin Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VAPD: An Anomaly Detection Model for PDF Malware Forensics with Adversarial Robustness",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5262,
    "paper_ids": [
      2256
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianming Fu",
    "display_name": "Jianming Fu",
    "affiliation": "Wuhan University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0,
      "ACSAC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      },
      "ATC": {},
      "ACSAC": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VAPD: An Anomaly Detection Model for PDF Malware Forensics with Adversarial Robustness",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "retrofitting xom for stripped binaries without embedded data relocation",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "obfuscationresilient executable payload extraction from packed malware",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5263,
    "paper_ids": [
      2256
    ],
    "papers_without_artifact_ids": [
      2258,
      2261
    ]
  },
  {
    "name": "Guojun Peng",
    "display_name": "Guojun Peng",
    "affiliation": "Wuhan University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      },
      "ATC": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VAPD: An Anomaly Detection Model for PDF Malware Forensics with Adversarial Robustness",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "retrofitting xom for stripped binaries without embedded data relocation",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "obfuscationresilient executable payload extraction from packed malware",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5264,
    "paper_ids": [
      2256
    ],
    "papers_without_artifact_ids": [
      2258,
      2261
    ]
  },
  {
    "name": "Jonas Tai",
    "display_name": "Jonas Tai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IRBlock: A Large-Scale Measurement Study of the Great Firewall of Iran",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5265,
    "paper_ids": [
      3254
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Karthik Nishanth Sengottuvelavan",
    "display_name": "Karthik Nishanth Sengottuvelavan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IRBlock: A Large-Scale Measurement Study of the Great Firewall of Iran",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5266,
    "paper_ids": [
      3254
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peter Whiting",
    "display_name": "Peter Whiting",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IRBlock: A Large-Scale Measurement Study of the Great Firewall of Iran",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5267,
    "paper_ids": [
      3254
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pengli Wang",
    "display_name": "Pengli Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition Algorithms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5268,
    "paper_ids": [
      2974
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bingyou Dong",
    "display_name": "Bingyou Dong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition Algorithms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5269,
    "paper_ids": [
      2974
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yifeng Cai",
    "display_name": "Yifeng Cai",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition Algorithms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i can tell your secrets inferring privacy attributes from miniapp interaction history in superapps",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "famos robust privacypreserving authentication on payment apps via federated multimodal contrastive learning",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5270,
    "paper_ids": [
      2974
    ],
    "papers_without_artifact_ids": [
      4344,
      5438
    ]
  },
  {
    "name": "Huanran Xue",
    "display_name": "Huanran Xue",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition Algorithms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5271,
    "paper_ids": [
      2974
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ziqi Zhang",
    "display_name": "Ziqi Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition Algorithms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i can tell your secrets inferring privacy attributes from miniapp interaction history in superapps",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "famos robust privacypreserving authentication on payment apps via federated multimodal contrastive learning",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5272,
    "paper_ids": [
      2974
    ],
    "papers_without_artifact_ids": [
      4344,
      5438
    ]
  },
  {
    "name": "Haowen Pan",
    "display_name": "Haowen Pan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5273,
    "paper_ids": [
      2565
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiaqi Hu",
    "display_name": "Jiaqi Hu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5274,
    "paper_ids": [
      2565
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunhao Fu",
    "display_name": "Yunhao Fu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5275,
    "paper_ids": [
      2565
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiafeng Hua",
    "display_name": "Jiafeng Hua",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5276,
    "paper_ids": [
      2565
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunyi Chen",
    "display_name": "Yunyi Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5277,
    "paper_ids": [
      2565
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jin Dong 0004",
    "display_name": "Jin Dong",
    "affiliation": "University of Kentucky",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5278,
    "paper_ids": [
      2565
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yiheng Zhang",
    "display_name": "Yiheng Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Precise and Effective Gadget Chain Mining through Deserialization Guided Call Graph Construction",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5279,
    "paper_ids": [
      1096
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ming Wen 0001",
    "display_name": "Ming Wen",
    "affiliation": "HUST",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Precise and Effective Gadget Chain Mining through Deserialization Guided Call Graph Construction",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automatic root cause analysis via large language models for cloud incidents",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 5280,
    "paper_ids": [
      1096
    ],
    "papers_without_artifact_ids": [
      626
    ]
  },
  {
    "name": "Shunjie Liu",
    "display_name": "Shunjie Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Precise and Effective Gadget Chain Mining through Deserialization Guided Call Graph Construction",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5281,
    "paper_ids": [
      1096
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dongjie He",
    "display_name": "Dongjie He",
    "affiliation": "Chongqing University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Precise and Effective Gadget Chain Mining through Deserialization Guided Call Graph Construction",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5282,
    "paper_ids": [
      1096
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fujiao Ji",
    "display_name": "Fujiao Ji",
    "affiliation": "University of Tennessee",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5283,
    "paper_ids": [
      1122
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kiho Lee",
    "display_name": "Kiho Lee",
    "affiliation": "ETRI",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an llmassisted easytotrigger backdoor attack on code completion models injecting disguised vulnerabilities against strong detection",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5284,
    "paper_ids": [
      1122
    ],
    "papers_without_artifact_ids": [
      4328
    ]
  },
  {
    "name": "Wenhao You",
    "display_name": "Wenhao You",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5285,
    "paper_ids": [
      1122
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Euijin Choo",
    "display_name": "Euijin Choo",
    "affiliation": "University of Alberta",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5286,
    "paper_ids": [
      1122
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunkai Zou",
    "display_name": "Yunkai Zou",
    "affiliation": "Nankai University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Password Guessing Using Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "password guessing using random forest",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "pass2edit a multistep generative model for guessing edited passwords",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5287,
    "paper_ids": [
      3880
    ],
    "papers_without_artifact_ids": [
      3884,
      3885
    ]
  },
  {
    "name": "Maoxiang An",
    "display_name": "Maoxiang An",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Password Guessing Using Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5288,
    "paper_ids": [
      3880
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sahar Ghoflsaz Ghinani",
    "display_name": "Sahar Ghoflsaz Ghinani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Low-Cost Secure Computing on Untrusted In-Memory Architectures",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5289,
    "paper_ids": [
      5439
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jingyao Zhang 0002",
    "display_name": "Jingyao Zhang",
    "affiliation": "University of California, Riverside",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Low-Cost Secure Computing on Untrusted In-Memory Architectures",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5290,
    "paper_ids": [
      5439
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Elaheh Sadredini",
    "display_name": "Elaheh Sadredini",
    "affiliation": "Univ. of California - Riverside",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Low-Cost Secure Computing on Untrusted In-Memory Architectures",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5291,
    "paper_ids": [
      5439
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ziwei Yan",
    "display_name": "Ziwei Yan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VoiceWukong: Benchmarking Deepfake Voice Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5292,
    "paper_ids": [
      4347
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yanjie Zhao 0001",
    "display_name": "Yanjie Zhao",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VoiceWukong: Benchmarking Deepfake Voice Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5293,
    "paper_ids": [
      4347
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hanqing Guo",
    "display_name": "Hanqing Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AUDIO WATERMARK: Dynamic and Harmless Watermark for Black-box Voice Dataset Copyright Protection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5294,
    "paper_ids": [
      3935
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junfeng Guo",
    "display_name": "Junfeng Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AUDIO WATERMARK: Dynamic and Harmless Watermark for Black-box Voice Dataset Copyright Protection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5295,
    "paper_ids": [
      3935
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bocheng Chen",
    "display_name": "Bocheng Chen",
    "affiliation": "the University of Mississippi",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AUDIO WATERMARK: Dynamic and Harmless Watermark for Black-box Voice Dataset Copyright Protection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5296,
    "paper_ids": [
      3935
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuanda Wang",
    "display_name": "Yuanda Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AUDIO WATERMARK: Dynamic and Harmless Watermark for Black-box Voice Dataset Copyright Protection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5297,
    "paper_ids": [
      3935
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Heng Huang",
    "display_name": "Heng Huang",
    "affiliation": "George Washington University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AUDIO WATERMARK: Dynamic and Harmless Watermark for Black-box Voice Dataset Copyright Protection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5298,
    "paper_ids": [
      3935
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qiben Yan",
    "display_name": "Qiben Yan",
    "affiliation": "Michigan State University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AUDIO WATERMARK: Dynamic and Harmless Watermark for Black-box Voice Dataset Copyright Protection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "doublestar longrange attack towards depth estimation based obstacle avoidance in autonomous systems",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5299,
    "paper_ids": [
      3935
    ],
    "papers_without_artifact_ids": [
      5033
    ]
  },
  {
    "name": "Li Xiao 0001",
    "display_name": "Li Xiao",
    "affiliation": "Michigan State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AUDIO WATERMARK: Dynamic and Harmless Watermark for Black-box Voice Dataset Copyright Protection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5300,
    "paper_ids": [
      3935
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shijie Luo",
    "display_name": "Shijie Luo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SNI5GECT: A Practical Approach to Inject aNRchy into 5G NR",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5301,
    "paper_ids": [
      837
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chandrika Mukherjee",
    "display_name": "Chandrika Mukherjee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Shadowed Realities: An Investigation of UI Attacks in WebXR",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5302,
    "paper_ids": [
      1731
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Reham Mohamed 0003",
    "display_name": "Reham Mohamed",
    "affiliation": "American University of Sharjah, UAE",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Shadowed Realities: An Investigation of UI Attacks in WebXR",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "attention please an investigation of the app tracking transparency permission",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "istelan disclosing sensitive user information by mobile magnetometer from finger touches",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "locin inferring semantic location from spatial maps in mixed reality",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5303,
    "paper_ids": [
      1731
    ],
    "papers_without_artifact_ids": [
      1741,
      1742,
      1746
    ]
  },
  {
    "name": "Arka Rai Choudhuri",
    "display_name": "Arka Rai Choudhuri",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "PETS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Mempool Privacy via One-time Setup Batched Threshold Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sublonk sublinear prover plonk",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "mempool privacy via batched threshold encryption attacks and defenses",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "timedeniable signatures",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 5304,
    "paper_ids": [
      4350
    ],
    "papers_without_artifact_ids": [
      4352,
      4353,
      4206
    ]
  },
  {
    "name": "Guru-Vamsi Policharla",
    "display_name": "Guru-Vamsi Policharla",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Mempool Privacy via One-time Setup Batched Threshold Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mempool privacy via batched threshold encryption attacks and defenses",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "zksaas zeroknowledge snarks as a service",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5305,
    "paper_ids": [
      4350
    ],
    "papers_without_artifact_ids": [
      4353,
      4354
    ]
  },
  {
    "name": "Mingyuan Wang 0001",
    "display_name": "Mingyuan Wang",
    "affiliation": "NYU Shanghai",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Mempool Privacy via One-time Setup Batched Threshold Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5306,
    "paper_ids": [
      4350
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joseph Pollock",
    "display_name": "Joseph Pollock",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Free Record-Level Privacy Risk Evaluation Through Artifact-Based Methods",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5307,
    "paper_ids": [
      3304
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Igor Shilov",
    "display_name": "Igor Shilov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Free Record-Level Privacy Risk Evaluation Through Artifact-Based Methods",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5308,
    "paper_ids": [
      3304
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Euodia Dodd",
    "display_name": "Euodia Dodd",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Free Record-Level Privacy Risk Evaluation Through Artifact-Based Methods",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5309,
    "paper_ids": [
      3304
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuai Cheng",
    "display_name": "Shuai Cheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective PII Extraction from LLMs through Augmented Few-Shot Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5310,
    "paper_ids": [
      3113
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shu Meng",
    "display_name": "Shu Meng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective PII Extraction from LLMs through Augmented Few-Shot Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5311,
    "paper_ids": [
      3113
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haitao Xu 0002",
    "display_name": "Haitao Xu",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective PII Extraction from LLMs through Augmented Few-Shot Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5312,
    "paper_ids": [
      3113
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haoran Zhang",
    "display_name": "Haoran Zhang",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "FAST": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective PII Extraction from LLMs through Augmented Few-Shot Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "whats the story in ebs glory evolutions and lessons in building cloud block store",
        "conference": "FAST",
        "year": 2024
      }
    ],
    "author_id": 5313,
    "paper_ids": [
      3113
    ],
    "papers_without_artifact_ids": [
      2091
    ]
  },
  {
    "name": "Shuai Hao 0001",
    "display_name": "Shuai Hao",
    "affiliation": "Old Dominion University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective PII Extraction from LLMs through Augmented Few-Shot Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5314,
    "paper_ids": [
      3113
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenrui Ma",
    "display_name": "Wenrui Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective PII Extraction from LLMs through Augmented Few-Shot Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5315,
    "paper_ids": [
      3113
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Meng Han",
    "display_name": "Meng Han",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective PII Extraction from LLMs through Augmented Few-Shot Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5316,
    "paper_ids": [
      3113
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhao Li 0007",
    "display_name": "Zhao Li",
    "affiliation": "Hangzhou Yugu Technology Co., Ltd., Hangzhou, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective PII Extraction from LLMs through Augmented Few-Shot Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5317,
    "paper_ids": [
      3113
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xingan Gao",
    "display_name": "Xingan Gao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5318,
    "paper_ids": [
      4122
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaobing Sun 0001",
    "display_name": "Xiaobing Sun",
    "affiliation": "Yangzhou University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5319,
    "paper_ids": [
      4122
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sicong Cao",
    "display_name": "Sicong Cao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5320,
    "paper_ids": [
      4122
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kaifeng Huang 0001",
    "display_name": "Kaifeng Huang",
    "affiliation": "Tongji University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5321,
    "paper_ids": [
      4122
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Di Wu",
    "display_name": "Di Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "SC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the atomicity and efficiency of blockchain payment channels",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 5322,
    "paper_ids": [
      4122
    ],
    "papers_without_artifact_ids": [
      310
    ]
  },
  {
    "name": "Xiaolei Liu",
    "display_name": "Xiaolei Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5323,
    "paper_ids": [
      4122
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yang Xiang",
    "display_name": "Yang Xiang",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5324,
    "paper_ids": [
      4122
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yinyuan Zhang",
    "display_name": "Yinyuan Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5325,
    "paper_ids": [
      3125
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cuiying Gao",
    "display_name": "Cuiying Gao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automated mass malware factory the convergence of piggybacking and adversarial example in android malicious software generation",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "blackbox adversarial example attack towards fcg based android malware detection under incomplete feature information",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5326,
    "paper_ids": [
      3125
    ],
    "papers_without_artifact_ids": [
      778,
      782
    ]
  },
  {
    "name": "Yueming Wu 0001",
    "display_name": "Yueming Wu",
    "affiliation": "HUST",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fire combining multistage filtering with taint analysis for scalable recurring vulnerability detection",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5327,
    "paper_ids": [
      3125
    ],
    "papers_without_artifact_ids": [
      1107
    ]
  },
  {
    "name": "Shihan Dou",
    "display_name": "Shihan Dou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5328,
    "paper_ids": [
      3125
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ying Zhang 0066",
    "display_name": "Ying Zhang",
    "affiliation": "Virginia Tech, Blacksburg, VA, USA",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "masterkey automated jailbreaking of large language model chatbots",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5329,
    "paper_ids": [
      3125
    ],
    "papers_without_artifact_ids": [
      739
    ]
  },
  {
    "name": "Wei Yuan 0001",
    "display_name": "Wei Yuan",
    "affiliation": "City University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automated mass malware factory the convergence of piggybacking and adversarial example in android malicious software generation",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "blackbox adversarial example attack towards fcg based android malware detection under incomplete feature information",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5330,
    "paper_ids": [
      3125
    ],
    "papers_without_artifact_ids": [
      778,
      782
    ]
  },
  {
    "name": "Xiaoyi Pang",
    "display_name": "Xiaoyi Pang",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5331,
    "paper_ids": [
      300
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chenxu Zhao",
    "display_name": "Chenxu Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5332,
    "paper_ids": [
      300
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yinggui Wang",
    "display_name": "Yinggui Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5333,
    "paper_ids": [
      300
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lei Wang 0251",
    "display_name": "Lei Wang",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5334,
    "paper_ids": [
      300
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muhui Jiang",
    "display_name": "Muhui Jiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5335,
    "paper_ids": [
      688
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kazi Samin Mubasshir",
    "display_name": "Kazi Samin Mubasshir",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Gotta Detect 'Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5336,
    "paper_ids": [
      1168
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yupei Liu",
    "display_name": "Yupei Liu",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Evaluating LLM-based Personal Information Extraction and Countermeasures",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "formalizing and benchmarking prompt injection attacks and defenses",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "pore provably robust recommender systems against data poisoning attacks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "security analysis of cameralidar fusion against blackbox attacks on autonomous vehicles",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5337,
    "paper_ids": [
      3163
    ],
    "papers_without_artifact_ids": [
      3164,
      3166,
      5284
    ]
  },
  {
    "name": "Yuqi Jia",
    "display_name": "Yuqi Jia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Evaluating LLM-based Personal Information Extraction and Countermeasures",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "formalizing and benchmarking prompt injection attacks and defenses",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5338,
    "paper_ids": [
      3163
    ],
    "papers_without_artifact_ids": [
      3164
    ]
  },
  {
    "name": "Yuncong Hu",
    "display_name": "Yuncong Hu",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DFS: Delegation-friendly zkSNARK and Private Delegation of Provers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ghostor toward a secure datasharing system from decentralized trust",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 5339,
    "paper_ids": [
      3230
    ],
    "papers_without_artifact_ids": [
      676
    ]
  },
  {
    "name": "Jie Xie",
    "display_name": "Jie Xie",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DFS: Delegation-friendly zkSNARK and Private Delegation of Provers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5340,
    "paper_ids": [
      3230
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kang Yang 0002",
    "display_name": "Kang Yang",
    "affiliation": "State Key Laboratory of Cryptology, Beijing, China",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DFS: Delegation-friendly zkSNARK and Private Delegation of Provers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lightweight authentication of web data via garblethenprove",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "mystique efficient conversions for zeroknowledge proofs with applications to machine learning",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5341,
    "paper_ids": [
      3230
    ],
    "papers_without_artifact_ids": [
      3231,
      3233
    ]
  },
  {
    "name": "Yuwen Zhang",
    "display_name": "Yuwen Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DFS: Delegation-friendly zkSNARK and Private Delegation of Provers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5342,
    "paper_ids": [
      3230
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christopher Tibaldo",
    "display_name": "Christopher Tibaldo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GNSS-WASP: GNSS Wide Area SPoofing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5343,
    "paper_ids": [
      1224
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Taisic Yun",
    "display_name": "Taisic Yun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5344,
    "paper_ids": [
      1123
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Suhwan Jeong",
    "display_name": "Suhwan Jeong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5345,
    "paper_ids": [
      1123
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yonghwa Lee",
    "display_name": "Yonghwa Lee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5346,
    "paper_ids": [
      1123
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seungjoo Kim",
    "display_name": "Seungjoo Kim",
    "affiliation": "Korea University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5347,
    "paper_ids": [
      1123
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hanna Foerster",
    "display_name": "Hanna Foerster",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LightShed: Defeating Perturbation-based Image Copyright Protections",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5348,
    "paper_ids": [
      2303
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sasha Behrouzi",
    "display_name": "Sasha Behrouzi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LightShed: Defeating Perturbation-based Image Copyright Protections",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5349,
    "paper_ids": [
      2303
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinsong Chen",
    "display_name": "Jinsong Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "revealing the black box of device search engine scanning assets strategies and ethical consideration",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 5350,
    "paper_ids": [
      232
    ],
    "papers_without_artifact_ids": [
      245
    ]
  },
  {
    "name": "Mengying Wu",
    "display_name": "Mengying Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "revealing the black box of device search engine scanning assets strategies and ethical consideration",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 5351,
    "paper_ids": [
      232
    ],
    "papers_without_artifact_ids": [
      245
    ]
  },
  {
    "name": "Baichao An",
    "display_name": "Baichao An",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5352,
    "paper_ids": [
      232
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhaofeng Yu",
    "display_name": "Zhaofeng Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Exploring and Exploiting the Resource Isolation Attack Surface of WebAssembly Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5353,
    "paper_ids": [
      5440
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dongyang Zhan",
    "display_name": "Dongyang Zhan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Exploring and Exploiting the Resource Isolation Attack Surface of WebAssembly Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5354,
    "paper_ids": [
      5440
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lin Ye",
    "display_name": "Lin Ye",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Exploring and Exploiting the Resource Isolation Attack Surface of WebAssembly Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5355,
    "paper_ids": [
      5440
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haining Yu",
    "display_name": "Haining Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Exploring and Exploiting the Resource Isolation Attack Surface of WebAssembly Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5356,
    "paper_ids": [
      5440
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hongli Zhang 0001",
    "display_name": "Hongli Zhang",
    "affiliation": "Boğaziçi University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Exploring and Exploiting the Resource Isolation Attack Surface of WebAssembly Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5357,
    "paper_ids": [
      5440
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhihong Tian",
    "display_name": "Zhihong Tian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Exploring and Exploiting the Resource Isolation Attack Surface of WebAssembly Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "statefuzz system callbased stateaware linux driver fuzzing",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5358,
    "paper_ids": [
      5440
    ],
    "papers_without_artifact_ids": [
      1897
    ]
  },
  {
    "name": "Yuxin (Myles) Liu",
    "display_name": "Yuxin (Myles) Liu",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scoop: Mitigation of Recapture Attacks on Provenance-Based Media Authentication",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5359,
    "paper_ids": [
      1176
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sharad Agarwal",
    "display_name": "Sharad Agarwal",
    "affiliation": "Microsoft Research",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ATC": 0,
      "NSDI": 4,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 2
      },
      "ATC": {},
      "NSDI": {
        "2021": 1,
        "2025": 1,
        "2010": 1,
        "2012": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 14.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scoop: Mitigation of Recapture Attacks on Provenance-Based Media Authentication",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "efficient multiwan transport for 5g with otter",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "hey mum i dropped my phone down the toilet investigating hi mum and dad sms scams in the united kingdom",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "old macdonald had a smart farm building a testbed to study cybersecurity in smart dairy farming",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "costeffective cloud edge traffic engineering with cascara",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "an operating system for the home",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "volley automated data placement for geodistributed cloud services",
        "conference": "NSDI",
        "year": 2010
      }
    ],
    "author_id": 5360,
    "paper_ids": [
      1176
    ],
    "papers_without_artifact_ids": [
      3538,
      5441,
      5442,
      5443,
      4639,
      4641
    ]
  },
  {
    "name": "Wenlong Meng",
    "display_name": "Wenlong Meng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lmsanitator defending prompttuning against taskagnostic backdoors",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5361,
    "paper_ids": [
      2328
    ],
    "papers_without_artifact_ids": [
      2329
    ]
  },
  {
    "name": "Shuguo Fan",
    "display_name": "Shuguo Fan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5362,
    "paper_ids": [
      2328
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chengkun Wei",
    "display_name": "Chengkun Wei",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 1,
      "CHES": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {
        "2024": 1
      },
      "CHES": {
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hydrarpc rpc in the cxl era",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "lmsanitator defending prompttuning against taskagnostic backdoors",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "cuzk accelerating zeroknowledge proof with a faster parallel multiscalar multiplication algorithm on gpus",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 5363,
    "paper_ids": [
      2328
    ],
    "papers_without_artifact_ids": [
      1934,
      2329,
      3328
    ]
  },
  {
    "name": "Yuwei Li 0002",
    "display_name": "Yuwei Li",
    "affiliation": "National University of Defense Technology, College of Electronic Engineering, Hefei, China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unifuzz a holistic and pragmatic metricsdriven platform for evaluating fuzzers",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5364,
    "paper_ids": [
      2328
    ],
    "papers_without_artifact_ids": [
      1558
    ]
  },
  {
    "name": "Yuanchao Zhang",
    "display_name": "Yuanchao Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "being transparent is merely the beginning enforcing purpose limitation with polynomial approximation",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5365,
    "paper_ids": [
      2328
    ],
    "papers_without_artifact_ids": [
      1578
    ]
  },
  {
    "name": "Mingyang Song",
    "display_name": "Mingyang Song",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5366,
    "paper_ids": [
      1561
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yifeng Zheng 0001",
    "display_name": "Yifeng Zheng",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "graphguard private timeconstrained pattern detection over streaming graphs in the cloud",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5367,
    "paper_ids": [
      1561
    ],
    "papers_without_artifact_ids": [
      5444
    ]
  },
  {
    "name": "Guoai Xu",
    "display_name": "Guoai Xu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploring covert thirdparty identifiers through external storage in the android new era",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5368,
    "paper_ids": [
      1561
    ],
    "papers_without_artifact_ids": [
      4349
    ]
  },
  {
    "name": "Taro Tsuchiya",
    "display_name": "Taro Tsuchiya",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Blockchain Address Poisoning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5369,
    "paper_ids": [
      3291
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiate Li",
    "display_name": "Jiate Li",
    "affiliation": "University of Southern California",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AGNNCert: Defending Graph Neural Networks against Arbitrary Perturbations with Deterministic Certification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5370,
    "paper_ids": [
      4367
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiachen Zhou 0001",
    "display_name": "Jiachen Zhou",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dormant: Defending against Pose-driven Human Image Animation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5371,
    "paper_ids": [
      1851
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingsi Wang",
    "display_name": "Mingsi Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dormant: Defending against Pose-driven Human Image Animation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5372,
    "paper_ids": [
      1851
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tianlin Li",
    "display_name": "Tianlin Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dormant: Defending against Pose-driven Human Image Animation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5373,
    "paper_ids": [
      1851
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guozhu Meng",
    "display_name": "Guozhu Meng",
    "affiliation": "Chinese Academy of Sciences",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dormant: Defending against Pose-driven Human Image Animation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sslwm a blackbox watermarking approach for encoders pretrained by selfsupervised learning",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "making them ask and answer jailbreaking large language models in few queries via disguise and reconstruction",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "differential testing of cross deep learning framework apis revealing inconsistencies and vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "aliasing backdoor attacks on pretrained models",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "drmi a dataset reduction technology based on mutual information for blackbox attacks",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5374,
    "paper_ids": [
      1851
    ],
    "papers_without_artifact_ids": [
      1858,
      1860,
      1867,
      1865,
      1869
    ]
  },
  {
    "name": "Yunsung Chung",
    "display_name": "Yunsung Chung",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Can Synthetic Images Replace Real Data? A Survey of Utility and Privacy of Synthetic Image Generation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5375,
    "paper_ids": [
      5445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunbei Zhang",
    "display_name": "Yunbei Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Can Synthetic Images Replace Real Data? A Survey of Utility and Privacy of Synthetic Image Generation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5376,
    "paper_ids": [
      5445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nassir Marrouche",
    "display_name": "Nassir Marrouche",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Can Synthetic Images Replace Real Data? A Survey of Utility and Privacy of Synthetic Image Generation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5377,
    "paper_ids": [
      5445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jihun Hamm",
    "display_name": "Jihun Hamm",
    "affiliation": "Tulane University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Can Synthetic Images Replace Real Data? A Survey of Utility and Privacy of Synthetic Image Generation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5378,
    "paper_ids": [
      5445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dorde Popovic",
    "display_name": "Dorde Popovic",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5379,
    "paper_ids": [
      4370
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Amin Sadeghi",
    "display_name": "Amin Sadeghi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5380,
    "paper_ids": [
      4370
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sanjay Chawla",
    "display_name": "Sanjay Chawla",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5381,
    "paper_ids": [
      4370
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shenyi Zhang",
    "display_name": "Shenyi Zhang",
    "affiliation": "Wuhan University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hijacking attacks against neural network by analyzing training data",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5382,
    "paper_ids": [
      1202
    ],
    "papers_without_artifact_ids": [
      562
    ]
  },
  {
    "name": "Yuchen Zhai",
    "display_name": "Yuchen Zhai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5383,
    "paper_ids": [
      1202
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shengnan Guo",
    "display_name": "Shengnan Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5384,
    "paper_ids": [
      1202
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zheng Fang 0014",
    "display_name": "Zheng Fang",
    "affiliation": "Wuhan University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hijacking attacks against neural network by analyzing training data",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5385,
    "paper_ids": [
      1202
    ],
    "papers_without_artifact_ids": [
      562
    ]
  },
  {
    "name": "Lingchen Zhao",
    "display_name": "Lingchen Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ring of gyges accountable anonymous broadcast via secretshared shuffle",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "more simplicity for trainers more opportunity for attackers blackbox attacks on speaker recognition systems by inferring feature extractor",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "hijacking attacks against neural network by analyzing training data",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5386,
    "paper_ids": [
      1202
    ],
    "papers_without_artifact_ids": [
      2525,
      565,
      562
    ]
  },
  {
    "name": "Dario Pasquini",
    "display_name": "Dario Pasquini",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LLMmap: Fingerprinting for Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reducing bias in modeling realworld password strength via deep learning and dynamic dictionaries",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5387,
    "paper_ids": [
      5446
    ],
    "papers_without_artifact_ids": [
      5447
    ]
  },
  {
    "name": "Evgenios M. Kornaropoulos",
    "display_name": "Evgenios M. Kornaropoulos",
    "affiliation": "George Mason University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LLMmap: Fingerprinting for Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5388,
    "paper_ids": [
      5446
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Giuseppe Ateniese",
    "display_name": "Giuseppe Ateniese",
    "affiliation": "George Mason University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "FAST": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      },
      "FAST": {
        "2007": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LLMmap: Fingerprinting for Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reducing bias in modeling realworld password strength via deep learning and dynamic dictionaries",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "design and implementation of verifiable audit trails for a versioning file system",
        "conference": "FAST",
        "year": 2007
      }
    ],
    "author_id": 5389,
    "paper_ids": [
      5446
    ],
    "papers_without_artifact_ids": [
      5447,
      4831
    ]
  },
  {
    "name": "Yuyang Zhang",
    "display_name": "Yuyang Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "USD: NSFW Content Detection for Text-to-Image Models via Scene Graph",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5390,
    "paper_ids": [
      5448
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kangjie Chen",
    "display_name": "Kangjie Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "USD: NSFW Content Detection for Text-to-Image Models via Scene Graph",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5391,
    "paper_ids": [
      5448
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xudong Jiang",
    "display_name": "Xudong Jiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "USD: NSFW Content Detection for Text-to-Image Models via Scene Graph",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5392,
    "paper_ids": [
      5448
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiahui Wen",
    "display_name": "Jiahui Wen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "USD: NSFW Content Detection for Text-to-Image Models via Scene Graph",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5393,
    "paper_ids": [
      5448
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yihui Jin",
    "display_name": "Yihui Jin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "USD: NSFW Content Detection for Text-to-Image Models via Scene Graph",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5394,
    "paper_ids": [
      5448
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ziyou Liang",
    "display_name": "Ziyou Liang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "USD: NSFW Content Detection for Text-to-Image Models via Scene Graph",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5395,
    "paper_ids": [
      5448
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yihao Huang 0001",
    "display_name": "Yihao Huang",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "USD: NSFW Content Detection for Text-to-Image Models via Scene Graph",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5396,
    "paper_ids": [
      5448
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Run Wang 0001",
    "display_name": "Run Wang",
    "affiliation": "Wuhan University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "USD: NSFW Content Detection for Text-to-Image Models via Scene Graph",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5397,
    "paper_ids": [
      5448
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lina Wang 0001",
    "display_name": "Lina Wang",
    "affiliation": "Wuhan University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "USD: NSFW Content Detection for Text-to-Image Models via Scene Graph",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5398,
    "paper_ids": [
      5448
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yinxiang Tao",
    "display_name": "Yinxiang Tao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ares: Comprehensive Path Hijacking Detection via Routing Tree",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5399,
    "paper_ids": [
      5449
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chengwan Zhang",
    "display_name": "Chengwan Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ares: Comprehensive Path Hijacking Detection via Routing Tree",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5400,
    "paper_ids": [
      5449
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Changqing An",
    "display_name": "Changqing An",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ares: Comprehensive Path Hijacking Detection via Routing Tree",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5401,
    "paper_ids": [
      5449
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuying Zhuang",
    "display_name": "Shuying Zhuang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ares: Comprehensive Path Hijacking Detection via Routing Tree",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5402,
    "paper_ids": [
      5449
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jilong Wang 0001",
    "display_name": "Jilong Wang",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NSDI": {
        "2025": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ares: Comprehensive Path Hijacking Detection via Routing Tree",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unlocking ecmp programmability for precise traffic control",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "detecting ephemeral optical events with optel",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 5403,
    "paper_ids": [
      5449
    ],
    "papers_without_artifact_ids": [
      701,
      5450
    ]
  },
  {
    "name": "Congcong Miao",
    "display_name": "Congcong Miao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NSDI": {
        "2025": 2,
        "2022": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ares: Comprehensive Path Hijacking Detection via Routing Tree",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unlocking ecmp programmability for precise traffic control",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "holmes localizing irregularities in llm training with megascale gpu clusters",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "detecting ephemeral optical events with optel",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 5404,
    "paper_ids": [
      5449
    ],
    "papers_without_artifact_ids": [
      701,
      4989,
      5450
    ]
  },
  {
    "name": "Arifu Onishi",
    "display_name": "Arifu Onishi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sound of Interference: Electromagnetic Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5405,
    "paper_ids": [
      4242
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "S. Hrushikesh Bhupathiraju",
    "display_name": "S. Hrushikesh Bhupathiraju",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sound of Interference: Electromagnetic Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "you cant see me physical removal attacks on lidarbased autonomous vehicles driving frameworks",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5406,
    "paper_ids": [
      4242
    ],
    "papers_without_artifact_ids": [
      4244
    ]
  },
  {
    "name": "Rishikesh Bhatt",
    "display_name": "Rishikesh Bhatt",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sound of Interference: Electromagnetic Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5407,
    "paper_ids": [
      4242
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Takeshi Sugawara 0001",
    "display_name": "Takeshi Sugawara",
    "affiliation": "Virginia Tech",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "CHES": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2025": 1
      },
      "CHES": {
        "2022": 1,
        "2021": 1,
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sound of Interference: Electromagnetic Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "invisible reflections leveraging infrared laser reflections to target traffic sign perception",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "mmm authenticated encryption with minimum secret state for masking",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "you cant see me physical removal attacks on lidarbased autonomous vehicles driving frameworks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "redshift manipulating signal propagation delay via continuouswave lasers",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "aeslbbb aes mode for lightweight and bbbsecure authenticated encryption",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "light commands laserbased audio injection attacks on voicecontrollable systems",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5408,
    "paper_ids": [
      4242
    ],
    "papers_without_artifact_ids": [
      4243,
      5451,
      4244,
      5452,
      5453,
      1510
    ]
  },
  {
    "name": "Gilad Moav",
    "display_name": "Gilad Moav",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DNS FLaRE: A Flush-Reload Attack on DNS Forwarders",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5409,
    "paper_ids": [
      3151
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Parjanya Vyas",
    "display_name": "Parjanya Vyas",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Ariadne: Navigating through the Labyrinth of Data-Driven Customization Inconsistencies in Android",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "auditing framework apis via inferred appside security specifications",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5410,
    "paper_ids": [
      1192
    ],
    "papers_without_artifact_ids": [
      1197
    ]
  },
  {
    "name": "Haseeb Ur Rehman Faheem",
    "display_name": "Haseeb Ur Rehman Faheem",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Ariadne: Navigating through the Labyrinth of Data-Driven Customization Inconsistencies in Android",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5411,
    "paper_ids": [
      1192
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yousra Aafer",
    "display_name": "Yousra Aafer",
    "affiliation": "University of Waterloo",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {
        "2017": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Ariadne: Navigating through the Labyrinth of Data-Driven Customization Inconsistencies in Android",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "auditing framework apis via inferred appside security specifications",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "profactory improving iot security via formalized protocol customization",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "android smarttvs vulnerability discovery via logguided fuzzing",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "analysis of seandroid policies combining mac and dac in android",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 5412,
    "paper_ids": [
      1192
    ],
    "papers_without_artifact_ids": [
      1197,
      26,
      2277,
      2271
    ]
  },
  {
    "name": "Jiaqi Luo",
    "display_name": "Jiaqi Luo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "instrumental music dissemination of southwest ethnic minorities based on big data technology",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 5413,
    "paper_ids": [
      233
    ],
    "papers_without_artifact_ids": [
      5454
    ]
  },
  {
    "name": "Zhengmin Yu",
    "display_name": "Zhengmin Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5414,
    "paper_ids": [
      233
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ke Li",
    "display_name": "Ke Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "memcloak practical access obfuscation for untrusted memory",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 5415,
    "paper_ids": [
      233
    ],
    "papers_without_artifact_ids": [
      5455
    ]
  },
  {
    "name": "Chengyuan Zhou",
    "display_name": "Chengyuan Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5416,
    "paper_ids": [
      233
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hao Chen 0003",
    "display_name": "Hao Chen",
    "affiliation": "University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {},
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5417,
    "paper_ids": [
      233
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kimberly Ruth",
    "display_name": "Kimberly Ruth",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A First Look at Governments' Enterprise Security Guidance",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5418,
    "paper_ids": [
      3329
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Raymond Buernor Obu",
    "display_name": "Raymond Buernor Obu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A First Look at Governments' Enterprise Security Guidance",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5419,
    "paper_ids": [
      3329
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ifeoluwa Shode",
    "display_name": "Ifeoluwa Shode",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A First Look at Governments' Enterprise Security Guidance",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5420,
    "paper_ids": [
      3329
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gavin Li",
    "display_name": "Gavin Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A First Look at Governments' Enterprise Security Guidance",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "certainty detecting dns manipulation at scale using tls certificates",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 5421,
    "paper_ids": [
      3329
    ],
    "papers_without_artifact_ids": [
      4298
    ]
  },
  {
    "name": "Carrie Gates",
    "display_name": "Carrie Gates",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A First Look at Governments' Enterprise Security Guidance",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5422,
    "paper_ids": [
      3329
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Grant Ho",
    "display_name": "Grant Ho",
    "affiliation": "University of Chicago",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "WOOT": 0,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 2
      },
      "ACSAC": {
        "2023": 1
      },
      "WOOT": {},
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A First Look at Governments' Enterprise Security Guidance",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an empirical analysis of enterprisewide mandatory password updates",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "no privacy among spies assessing the functionality and insecurity of consumer android spyware apps",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "hopper modeling and detecting lateral movement",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "driving 2fa adoption at scale optimizing twofactor authentication notification design patterns",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5423,
    "paper_ids": [
      3329
    ],
    "papers_without_artifact_ids": [
      4887,
      4546,
      4889,
      3218
    ]
  },
  {
    "name": "Xiangrui Xu 0001",
    "display_name": "Xiangrui Xu",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From Risk to Resilience: Towards Assessing and Mitigating the Risk of Data Reconstruction Attacks in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5424,
    "paper_ids": [
      4374
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhize Li 0001",
    "display_name": "Zhize Li",
    "affiliation": "Singapore Management University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From Risk to Resilience: Towards Assessing and Mitigating the Risk of Data Reconstruction Attacks in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5425,
    "paper_ids": [
      4374
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yufei Han 0001",
    "display_name": "Yufei Han",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "ACSAC": {
        "2021": 1,
        "2017": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From Risk to Resilience: Towards Assessing and Mitigating the Risk of Data Reconstruction Attacks in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lurking in the shadows unveiling stealthy backdoor attacks against personalized federated learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "humans vs machines in malware classification",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "towards stalkerware detection with precise warnings",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "predicting cyber threats with virtual security products",
        "conference": "ACSAC",
        "year": 2017
      },
      {
        "title": "marmite spreading malicious file reputation through download graphs",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 5426,
    "paper_ids": [
      4374
    ],
    "papers_without_artifact_ids": [
      4375,
      5404,
      5456,
      5457,
      2427
    ]
  },
  {
    "name": "Bin Wang 0062",
    "display_name": "Bin Wang",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From Risk to Resilience: Towards Assessing and Mitigating the Risk of Data Reconstruction Attacks in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a wolf in sheeps clothing practical blackbox adversarial attacks for evading learningbased windows malware detection in the wild",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5427,
    "paper_ids": [
      4374
    ],
    "papers_without_artifact_ids": [
      1550
    ]
  },
  {
    "name": "Wei Wang 0012",
    "display_name": "Wei Wang",
    "affiliation": "Xi'an Jiaotong University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From Risk to Resilience: Towards Assessing and Mitigating the Risk of Data Reconstruction Attacks in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lurking in the shadows unveiling stealthy backdoor attacks against personalized federated learning",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5428,
    "paper_ids": [
      4374
    ],
    "papers_without_artifact_ids": [
      4375
    ]
  },
  {
    "name": "Lorenzo Benetollo",
    "display_name": "Lorenzo Benetollo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Let's Move2EVM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5429,
    "paper_ids": [
      2410
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andreas Lackner",
    "display_name": "Andreas Lackner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Let's Move2EVM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5430,
    "paper_ids": [
      2410
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Markus Scherer",
    "display_name": "Markus Scherer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Let's Move2EVM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5431,
    "paper_ids": [
      2410
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Szu-Chun Huang",
    "display_name": "Szu-Chun Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trust but Verify: An Assessment of Vulnerability Tagging Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5432,
    "paper_ids": [
      3336
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Harm Griffioen",
    "display_name": "Harm Griffioen",
    "affiliation": "TU Delft",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trust but Verify: An Assessment of Vulnerability Tagging Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a different cup of ti the added value of commercial threat intelligence",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5433,
    "paper_ids": [
      3336
    ],
    "papers_without_artifact_ids": [
      3351
    ]
  },
  {
    "name": "Max van der Horst",
    "display_name": "Max van der Horst",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trust but Verify: An Assessment of Vulnerability Tagging Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "high stakes low certainty evaluating the efficacy of highlevel indicators of compromise in ransomware attribution",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 5434,
    "paper_ids": [
      3336
    ],
    "papers_without_artifact_ids": [
      3340
    ]
  },
  {
    "name": "John Y. Kim",
    "display_name": "John Y. Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AUTOVR: Automated UI Exploration for Detecting Sensitive Data Flow Exposures in Virtual Reality Apps",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5435,
    "paper_ids": [
      384
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yanjie Zhao",
    "display_name": "Yanjie Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AUTOVR: Automated UI Exploration for Detecting Sensitive Data Flow Exposures in Virtual Reality Apps",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5436,
    "paper_ids": [
      384
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Divyanshu Bhardwaj",
    "display_name": "Divyanshu Bhardwaj",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding How Users Prepare for and React to Smartphone Theft",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5437,
    "paper_ids": [
      1830
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sumair Ijaz Hashmi",
    "display_name": "Sumair Ijaz Hashmi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding How Users Prepare for and React to Smartphone Theft",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5438,
    "paper_ids": [
      1830
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maximilian Golla",
    "display_name": "Maximilian Golla",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 3
      },
      "PETS": {
        "2022": 1,
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 11.1,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding How Users Prepare for and React to Smartphone Theft",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how does connecting online activities to advertising inferences impact privacy perceptions",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "why arent we using passkeys obstacles companies face deploying fido2 passwordless authentication",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a twodecade retrospective analysis of a universitys vulnerability to attacks exploiting reused passwords",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "we may share the number of diaper changes a privacy and security analysis of mobile child care applications",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "as soon as its a risk i want to require mfa how administrators configure riskbased authentication",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "driving 2fa adoption at scale optimizing twofactor authentication notification design patterns",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "are privacy dashboards good for end users evaluating user perceptions and reactions to googles my activity",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "its stored hopefully on an encrypted server mitigating users misconceptions about fido2 biometric webauthn",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5439,
    "paper_ids": [
      1830
    ],
    "papers_without_artifact_ids": [
      864,
      5458,
      5459,
      4558,
      4441,
      3218,
      877,
      5460
    ]
  },
  {
    "name": "Shahrear Iqbal",
    "display_name": "Shahrear Iqbal",
    "affiliation": "National Research Council (NRC) of Canada, Fredericton, NB, Canada",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5440,
    "paper_ids": [
      4376
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xueyuan Han",
    "display_name": "Xueyuan Han",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      },
      "ATC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fetchbpf customizable prefetching policies in linux with ebpf",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "sigl securing software installations through deep graph learning",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5441,
    "paper_ids": [
      4376
    ],
    "papers_without_artifact_ids": [
      4378,
      5288
    ]
  },
  {
    "name": "Juliane Schmüser",
    "display_name": "Juliane Schmüser",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How Transparent is Usable Privacy and Security Research? A Meta-Study on Current Research Transparency Practices",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "security is not my field im a stats guy a qualitative root cause analysis of barriers to adversarial machine learning defenses in industry",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 8076,
    "paper_ids": [
      1242
    ],
    "papers_without_artifact_ids": [
      1251
    ]
  },
  {
    "name": "Jacques Suray",
    "display_name": "Jacques Suray",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How Transparent is Usable Privacy and Security Research? A Meta-Study on Current Research Transparency Practices",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "you have to read 50 different rfcs that contradict each other an interview study on the experiences of implementing cryptographic standards",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5443,
    "paper_ids": [
      1242
    ],
    "papers_without_artifact_ids": [
      1249
    ]
  },
  {
    "name": "Byron M. Lowens",
    "display_name": "Byron M. Lowens",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "How Transparent is Usable Privacy and Security Research? A Meta-Study on Current Research Transparency Practices",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how we define privacy literacy teaching experiences challenges of communityengaged privacy educators",
        "conference": "PETS",
        "year": 2026
      }
    ],
    "author_id": 5444,
    "paper_ids": [
      1242
    ],
    "papers_without_artifact_ids": [
      4379
    ]
  },
  {
    "name": "Jhih-Yi Hsieh",
    "display_name": "Jhih-Yi Hsieh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Vulnerability of Text-Matching in ML/AI Conference Reviewer Assignments to Collusions",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5445,
    "paper_ids": [
      5461
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aditi Raghunathan",
    "display_name": "Aditi Raghunathan",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Vulnerability of Text-Matching in ML/AI Conference Reviewer Assignments to Collusions",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5446,
    "paper_ids": [
      5461
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nihar B. Shah",
    "display_name": "Nihar B. Shah",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "FAST": {
        "2015": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Vulnerability of Text-Matching in ML/AI Conference Reviewer Assignments to Collusions",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "having your cake and eating it too jointly optimal erasure codes for io storage and networkbandwidth",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 5447,
    "paper_ids": [
      5461
    ],
    "papers_without_artifact_ids": [
      4619
    ]
  },
  {
    "name": "Xiang Li",
    "display_name": "Xiang Li",
    "affiliation": "George Mason University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rowhammer-Based Trojan Injection: One Bit Flip Is Sufficient for Backdooring DNNs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "peep with a mirror breaking the integrity of android app sandboxing via unprivileged cache side channel",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "scalog seamless reconfiguration and total order in a scalable shared log",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 5448,
    "paper_ids": [
      4385
    ],
    "papers_without_artifact_ids": [
      5462,
      2691
    ]
  },
  {
    "name": "Ying Meng",
    "display_name": "Ying Meng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rowhammer-Based Trojan Injection: One Bit Flip Is Sufficient for Backdooring DNNs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5449,
    "paper_ids": [
      4385
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fuyi Wang",
    "display_name": "Fuyi Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Boosting Gradient Leakage Attacks: Data Reconstruction in Realistic FL Settings",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5450,
    "paper_ids": [
      838
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yi-Min Lin",
    "display_name": "Yi-Min Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bots can Snoop: Uncovering and Mitigating Privacy Risks of Bots in Group Chats",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5451,
    "paper_ids": [
      3352
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonathan Weiping Li",
    "display_name": "Jonathan Weiping Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bots can Snoop: Uncovering and Mitigating Privacy Risks of Bots in Group Chats",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5452,
    "paper_ids": [
      3352
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tiffany Hyun-Jin Kim",
    "display_name": "Tiffany Hyun-Jin Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bots can Snoop: Uncovering and Mitigating Privacy Risks of Bots in Group Chats",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5453,
    "paper_ids": [
      3352
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu He",
    "display_name": "Yu He",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5454,
    "paper_ids": [
      301
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Boheng Li",
    "display_name": "Boheng Li",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5455,
    "paper_ids": [
      301
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei Dong 0007",
    "display_name": "Wei Dong",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5456,
    "paper_ids": [
      301
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yiming Li 0004",
    "display_name": "Yiming Li",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "explanation as a watermark towards harmless and multibit model ownership verification via watermarking feature attribution",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 5457,
    "paper_ids": [
      301
    ],
    "papers_without_artifact_ids": [
      308
    ]
  },
  {
    "name": "Erik Pohle",
    "display_name": "Erik Pohle",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MAESTRO: Multi-Party AES Using Lookup Tables",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5458,
    "paper_ids": [
      4395
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kunihiko Sadakane",
    "display_name": "Kunihiko Sadakane",
    "affiliation": "University of Tokyo",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MAESTRO: Multi-Party AES Using Lookup Tables",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5459,
    "paper_ids": [
      4395
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peter Scholl",
    "display_name": "Peter Scholl",
    "affiliation": "Aarhus University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MAESTRO: Multi-Party AES Using Lookup Tables",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5460,
    "paper_ids": [
      4395
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Tschudi",
    "display_name": "Daniel Tschudi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MAESTRO: Multi-Party AES Using Lookup Tables",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5461,
    "paper_ids": [
      4395
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Azade Rezaeezade",
    "display_name": "Azade Rezaeezade",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5462,
    "paper_ids": [
      1485
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Trevor Yap",
    "display_name": "Trevor Yap",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "peek into the blackbox interpretable neural network using sat equations in sidechannel analysis",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 5463,
    "paper_ids": [
      1485
    ],
    "papers_without_artifact_ids": [
      1491
    ]
  },
  {
    "name": "Nicolas Bailluet",
    "display_name": "Nicolas Bailluet",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Nothing is Unreachable: Automated Synthesis of Robust Code-Reuse Gadget Chains for Arbitrary Exploitation Primitives",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5464,
    "paper_ids": [
      5463
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Emmanuel Fleury",
    "display_name": "Emmanuel Fleury",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Nothing is Unreachable: Automated Synthesis of Robust Code-Reuse Gadget Chains for Arbitrary Exploitation Primitives",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5465,
    "paper_ids": [
      5463
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Isabelle Puaut",
    "display_name": "Isabelle Puaut",
    "affiliation": "IRISA Rennes",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Nothing is Unreachable: Automated Synthesis of Robust Code-Reuse Gadget Chains for Arbitrary Exploitation Primitives",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5466,
    "paper_ids": [
      5463
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Erven Rohou",
    "display_name": "Erven Rohou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Nothing is Unreachable: Automated Synthesis of Robust Code-Reuse Gadget Chains for Arbitrary Exploitation Primitives",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5467,
    "paper_ids": [
      5463
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Paolo Celada",
    "display_name": "Paolo Celada",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Hercules Droidot and the murder on the JNI Express",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5468,
    "paper_ids": [
      14
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lingming Zhang",
    "display_name": "Lingming Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5469,
    "paper_ids": [
      1539
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Binbin Zhao",
    "display_name": "Binbin Zhao",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mock optimizing kernel fuzzing mutation with contextaware dependency",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "miner a hybrid datadriven approach for rest api fuzzing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "uvscan detecting thirdparty component usage violations in iot firmware",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "mpinspector a systematic and automatic approach for evaluating the security of iot messaging protocols",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5470,
    "paper_ids": [
      1539
    ],
    "papers_without_artifact_ids": [
      1545,
      1552,
      1555,
      1560
    ]
  },
  {
    "name": "Jiacheng Xu",
    "display_name": "Jiacheng Xu",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "SC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "SC": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mock optimizing kernel fuzzing mutation with contextaware dependency",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "critical code guided directed greybox fuzzing for commits",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "miner a hybrid datadriven approach for rest api fuzzing",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5471,
    "paper_ids": [
      1539
    ],
    "papers_without_artifact_ids": [
      1545,
      1549,
      1552
    ]
  },
  {
    "name": "Peiyu Liu 0003",
    "display_name": "Peiyu Liu",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "critical code guided directed greybox fuzzing for commits",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "exploring chatgpts capabilities on vulnerability management",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5472,
    "paper_ids": [
      1539
    ],
    "papers_without_artifact_ids": [
      1549,
      1551
    ]
  },
  {
    "name": "Jianhai Chen",
    "display_name": "Jianhai Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "detecting kernel memory bugs through inconsistent memory management intention inferences",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5473,
    "paper_ids": [
      1539
    ],
    "papers_without_artifact_ids": [
      1548
    ]
  },
  {
    "name": "Bo Zhang 0119",
    "display_name": "Bo Zhang",
    "affiliation": "Northwestern Polytechnical University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "V-ORAM: A Versatile and Adaptive ORAM Framework with Service Transformation for Dynamic Workloads",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5474,
    "paper_ids": [
      1562
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Helei Cui",
    "display_name": "Helei Cui",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "V-ORAM: A Versatile and Adaptive ORAM Framework with Service Transformation for Dynamic Workloads",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5475,
    "paper_ids": [
      1562
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhiwen Yu 0001",
    "display_name": "Zhiwen Yu",
    "affiliation": "NWPU",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "V-ORAM: A Versatile and Adaptive ORAM Framework with Service Transformation for Dynamic Workloads",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5476,
    "paper_ids": [
      1562
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bin Guo 0001",
    "display_name": "Bin Guo",
    "affiliation": "NWPU",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "V-ORAM: A Versatile and Adaptive ORAM Framework with Service Transformation for Dynamic Workloads",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5477,
    "paper_ids": [
      1562
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Philipp Mackensen",
    "display_name": "Philipp Mackensen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Kintsugi: Secure Hotpatching for Code-Shadowing Real-Time Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vulnerability where art thou an investigation of vulnerability management in android smartphone chipsets",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "spatialdomain wireless jamming with reconfigurable intelligent surfaces",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 5478,
    "paper_ids": [
      3249
    ],
    "papers_without_artifact_ids": [
      3248,
      3250
    ]
  },
  {
    "name": "Christian Niesler",
    "display_name": "Christian Niesler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Kintsugi: Secure Hotpatching for Code-Shadowing Real-Time Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "clepsydracache preventing cache attacks with timebased evictions",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5479,
    "paper_ids": [
      3249
    ],
    "papers_without_artifact_ids": [
      1476
    ]
  },
  {
    "name": "Roberto Blanco",
    "display_name": "Roberto Blanco",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Kintsugi: Secure Hotpatching for Code-Shadowing Real-Time Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5480,
    "paper_ids": [
      3249
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Felix Linker",
    "display_name": "Felix Linker",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Formal Analysis of Apple's iMessage PQ3 Protocol",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "soap a social authentication protocol",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5481,
    "paper_ids": [
      444
    ],
    "papers_without_artifact_ids": [
      451
    ]
  },
  {
    "name": "Eric Wagner 0003",
    "display_name": "Eric Wagner",
    "affiliation": "RWTH Aachen University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "powerduck a goose data set of cyberattacks in substations",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5482,
    "paper_ids": [
      2983
    ],
    "papers_without_artifact_ids": [
      2985
    ]
  },
  {
    "name": "Luisa Lux",
    "display_name": "Luisa Lux",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5483,
    "paper_ids": [
      2983
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lichao Wu",
    "display_name": "Lichao Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "CHES": {
        "2022": 2,
        "2021": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GenHuzz: An Efficient Generative Hardware Fuzzer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the best of two worlds deep learningassisted template attack",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "exploring feature selection scenarios for deep learningbased sidechannel analysis",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "reinforcement learning for hyperparameter tuning in deep learningbased sidechannel analysis",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 5484,
    "paper_ids": [
      2304
    ],
    "papers_without_artifact_ids": [
      3022,
      3023,
      3025
    ]
  },
  {
    "name": "Mohamadreza Rostami",
    "display_name": "Mohamadreza Rostami",
    "affiliation": "Technical University of Darmstadt",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GenHuzz: An Efficient Generative Hardware Fuzzer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "whisperfuzz whitebox fuzzing for detecting and locating timing vulnerabilities in processors",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5485,
    "paper_ids": [
      2304
    ],
    "papers_without_artifact_ids": [
      2310
    ]
  },
  {
    "name": "Huimin Li 0004",
    "display_name": "Huimin Li",
    "affiliation": "TU Delft",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GenHuzz: An Efficient Generative Hardware Fuzzer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5486,
    "paper_ids": [
      2304
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jeyavijayan Rajendran",
    "display_name": "Jeyavijayan Rajendran",
    "affiliation": "Texas A&M University, Kingsville, TX, USA",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 2,
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GenHuzz: An Efficient Generative Hardware Fuzzer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "llmpirate llms for blackbox hardware ip piracy",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "attackgnn redteaming gnns in hardware security using reinforcement learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "whisperfuzz whitebox fuzzing for detecting and locating timing vulnerabilities in processors",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "functeller how well does efpga hide functionality",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "hypfuzz formalassisted processor fuzzing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "thehuzz instruction fuzzing of processors using goldenreference models for finding softwareexploitable vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5487,
    "paper_ids": [
      2304
    ],
    "papers_without_artifact_ids": [
      5464,
      5465,
      2310,
      5228,
      2315,
      2317
    ]
  },
  {
    "name": "Dañiel Gerhardt",
    "display_name": "Dañiel Gerhardt",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AirTag-Facilitated Stalking Protection: Evaluating Unwanted Tracking Notifications and Tracker Locating Features",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "investigating verification behavior and perceptions of visual digital certificates",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 8077,
    "paper_ids": [
      1831
    ],
    "papers_without_artifact_ids": [
      1833
    ]
  },
  {
    "name": "Matthias Fassl",
    "display_name": "Matthias Fassl",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AirTag-Facilitated Stalking Protection: Evaluating Unwanted Tracking Notifications and Tracker Locating Features",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "comparing user perceptions of antistalkerware apps with the technical reality",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "exploring authentication for securitysensitive tasks on smart home voice assistants",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5489,
    "paper_ids": [
      1831
    ],
    "papers_without_artifact_ids": [
      1834,
      1838
    ]
  },
  {
    "name": "Carolyn Guthoff",
    "display_name": "Carolyn Guthoff",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AirTag-Facilitated Stalking Protection: Evaluating Unwanted Tracking Notifications and Tracker Locating Features",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5490,
    "paper_ids": [
      1831
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ali Teymourian",
    "display_name": "Ali Teymourian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Come Together - Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis Framework",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5491,
    "paper_ids": [
      5466
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrew M. Webb 0001",
    "display_name": "Andrew M. Webb",
    "affiliation": "University of Kentucky",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Come Together - Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis Framework",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5492,
    "paper_ids": [
      5466
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Taha Gharaibeh",
    "display_name": "Taha Gharaibeh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Come Together - Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis Framework",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5493,
    "paper_ids": [
      5466
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arushi Ghildiyal",
    "display_name": "Arushi Ghildiyal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Come Together - Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis Framework",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5494,
    "paper_ids": [
      5466
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ibrahim Baggili",
    "display_name": "Ibrahim Baggili",
    "affiliation": "Louisiana State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Come Together - Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis Framework",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5495,
    "paper_ids": [
      5466
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Deepthi Mungara",
    "display_name": "Deepthi Mungara",
    "affiliation": "Paderborn University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Security and Privacy Advice for UPI Users in India",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5496,
    "paper_ids": [
      2430
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Harshini Sri Ramulu",
    "display_name": "Harshini Sri Ramulu",
    "affiliation": "Paderborn University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Security and Privacy Advice for UPI Users in India",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "security and privacy software creators perspectives on unintended consequences",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5497,
    "paper_ids": [
      2430
    ],
    "papers_without_artifact_ids": [
      2433
    ]
  },
  {
    "name": "Lakshmi Likhitha Mankali",
    "display_name": "Lakshmi Likhitha Mankali",
    "affiliation": "New York University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GlitchFHE: Attacking Fully Homomorphic Encryption Using Fault Injection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "insight attacking industryadopted learning resilient logic locking techniques using explainable graph neural network",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5498,
    "paper_ids": [
      2516
    ],
    "papers_without_artifact_ids": [
      3118
    ]
  },
  {
    "name": "Mohammed Nabeel 0001",
    "display_name": "Mohammed Nabeel",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GlitchFHE: Attacking Fully Homomorphic Encryption Using Fault Injection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5499,
    "paper_ids": [
      2516
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Faiq Raees",
    "display_name": "Faiq Raees",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GlitchFHE: Attacking Fully Homomorphic Encryption Using Fault Injection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5500,
    "paper_ids": [
      2516
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tongwei Ren",
    "display_name": "Tongwei Ren",
    "affiliation": "Nanjing University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "REVDECODE: Enhancing Binary Function Matching with Context-Aware Graph Representations and Relevance Decoding",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5501,
    "paper_ids": [
      3235
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ronghan Che",
    "display_name": "Ronghan Che",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "REVDECODE: Enhancing Binary Function Matching with Context-Aware Graph Representations and Relevance Decoding",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5502,
    "paper_ids": [
      3235
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guin Gilman",
    "display_name": "Guin Gilman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "REVDECODE: Enhancing Binary Function Matching with Context-Aware Graph Representations and Relevance Decoding",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5503,
    "paper_ids": [
      3235
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lorenzo De Carli",
    "display_name": "Lorenzo De Carli",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "REVDECODE: Enhancing Binary Function Matching with Context-Aware Graph Representations and Relevance Decoding",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "beyond typosquatting an indepth look at package confusion",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5504,
    "paper_ids": [
      3235
    ],
    "papers_without_artifact_ids": [
      5467
    ]
  },
  {
    "name": "Hanrui Jiang",
    "display_name": "Hanrui Jiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5505,
    "paper_ids": [
      4332
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chao Lin 0003",
    "display_name": "Chao Lin",
    "affiliation": "Rochester Inst. of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5506,
    "paper_ids": [
      4332
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bowen Hu",
    "display_name": "Bowen Hu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Red Bleed: A Pragmatic Near-Infrared Presentation Attack on Facial Biometric Authentication Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5507,
    "paper_ids": [
      5468
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kuo Wang",
    "display_name": "Kuo Wang",
    "affiliation": "Washington State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Red Bleed: A Pragmatic Near-Infrared Presentation Attack on Facial Biometric Authentication Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5508,
    "paper_ids": [
      5468
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chip-Hong Chang",
    "display_name": "Chip-Hong Chang",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Red Bleed: A Pragmatic Near-Infrared Presentation Attack on Facial Biometric Authentication Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5509,
    "paper_ids": [
      5468
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stavros Volos",
    "display_name": "Stavros Volos",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2025": 1
      },
      "ATC": {
        "2023": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Dorami: Privilege Separating Security Monitor on RISC-V TEEs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "confidential computing within an ai accelerator",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "visor privacypreserving video analytics as a cloud service",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5510,
    "paper_ids": [
      2468
    ],
    "papers_without_artifact_ids": [
      4232,
      678
    ]
  },
  {
    "name": "Youngjoon Kim 0001",
    "display_name": "Youngjoon Kim",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Logs In, Patches Out: Automated Vulnerability Repair via Tree-of-Thought LLM Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5511,
    "paper_ids": [
      1124
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sunguk Shin 0001",
    "display_name": "Sunguk Shin",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Logs In, Patches Out: Automated Vulnerability Repair via Tree-of-Thought LLM Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5512,
    "paper_ids": [
      1124
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiwon Yoon 0001",
    "display_name": "Jiwon Yoon",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Logs In, Patches Out: Automated Vulnerability Repair via Tree-of-Thought LLM Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5513,
    "paper_ids": [
      1124
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xinghao Peng",
    "display_name": "Xinghao Peng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated Soundness and Completeness Vetting of Polygon zkEVM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5514,
    "paper_ids": [
      366
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhiyuan Sun",
    "display_name": "Zhiyuan Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated Soundness and Completeness Vetting of Polygon zkEVM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "panda security analysis of algorand smart contracts",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5515,
    "paper_ids": [
      366
    ],
    "papers_without_artifact_ids": [
      374
    ]
  },
  {
    "name": "Kunsong Zhao",
    "display_name": "Kunsong Zhao",
    "affiliation": "The Hong Kong Polytechnic University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated Soundness and Completeness Vetting of Polygon zkEVM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5516,
    "paper_ids": [
      366
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinan Jiang",
    "display_name": "Jinan Jiang",
    "affiliation": "The Hong Kong Polytechnic University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated Soundness and Completeness Vetting of Polygon zkEVM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5517,
    "paper_ids": [
      366
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Finn de Ridder",
    "display_name": "Finn de Ridder",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Posthammer: Pervasive Browser-based Rowhammer Attacks with Postponed Refresh Commands",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "smash synchronized manysided rowhammer attacks from javascript",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5518,
    "paper_ids": [
      925
    ],
    "papers_without_artifact_ids": [
      96
    ]
  },
  {
    "name": "Abdul Rahman Taleb",
    "display_name": "Abdul Rahman Taleb",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Tale of Two Worlds, a Formal Story of WireGuard Hybridization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5519,
    "paper_ids": [
      3138
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuichi Katsumata",
    "display_name": "Shuichi Katsumata",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 4
      },
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring Signatures",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how to compare bandwidth constrained twoparty secure messaging protocols a quest for a more efficient and secure postquantum protocol",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "exploring how to authenticate application messages in mls more efficient postquantum and anonymous blocklistable",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "bundled authenticated key exchange a concrete treatment of signals handshake protocol and postquantum security",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "exposing private user behaviors of collaborative filtering via model inversion techniques",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 5520,
    "paper_ids": [
      5469
    ],
    "papers_without_artifact_ids": [
      5470,
      5471,
      5472,
      4519
    ]
  },
  {
    "name": "Guilhem Niot",
    "display_name": "Guilhem Niot",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring Signatures",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5521,
    "paper_ids": [
      5469
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ida Tucker",
    "display_name": "Ida Tucker",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring Signatures",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5522,
    "paper_ids": [
      5469
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thom Wiggers",
    "display_name": "Thom Wiggers",
    "affiliation": "PQShield",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring Signatures",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bundled authenticated key exchange a concrete treatment of signals handshake protocol and postquantum security",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 5523,
    "paper_ids": [
      5469
    ],
    "papers_without_artifact_ids": [
      5472
    ]
  },
  {
    "name": "Christodoulos Pappas",
    "display_name": "Christodoulos Pappas",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hobbit: Space-Efficient zkSNARK with Optimal Prover Time",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5524,
    "paper_ids": [
      2416
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xin Zhang 0110",
    "display_name": "Xin Zhang",
    "affiliation": "Jilin University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "practical opcodebased fault attack on aesni",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 5525,
    "paper_ids": [
      1396
    ],
    "papers_without_artifact_ids": [
      1692
    ]
  },
  {
    "name": "Haiyang Xue",
    "display_name": "Haiyang Xue",
    "affiliation": "Singapore Management University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improved secure twoparty computation from a geometric perspective",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 5526,
    "paper_ids": [
      1396
    ],
    "papers_without_artifact_ids": [
      3261
    ]
  },
  {
    "name": "Jiayang Li",
    "display_name": "Jiayang Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5527,
    "paper_ids": [
      183
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kun Gao 0006",
    "display_name": "Kun Gao",
    "affiliation": "University of Technology Sydney",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reinforcement unlearning",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 5528,
    "paper_ids": [
      183
    ],
    "papers_without_artifact_ids": [
      1573
    ]
  },
  {
    "name": "Juyang Bai",
    "display_name": "Juyang Bai",
    "affiliation": "Johns Hopkins University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Phantom: Privacy-Preserving Deep Neural Network Model Obfuscation in Heterogeneous TEE and GPU System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5529,
    "paper_ids": [
      5473
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Md Hafizul Islam Chowdhuryy",
    "display_name": "Md Hafizul Islam Chowdhuryy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Phantom: Privacy-Preserving Deep Neural Network Model Obfuscation in Heterogeneous TEE and GPU System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5530,
    "paper_ids": [
      5473
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jingtao Li",
    "display_name": "Jingtao Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Phantom: Privacy-Preserving Deep Neural Network Model Obfuscation in Heterogeneous TEE and GPU System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5531,
    "paper_ids": [
      5473
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fan Yao 0001",
    "display_name": "Fan Yao",
    "affiliation": "Shenzhen University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Phantom: Privacy-Preserving Deep Neural Network Model Obfuscation in Heterogeneous TEE and GPU System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "invalidatecompare a timerfree gpu cache attack primitive",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "deephammer depleting the intelligence of deep neural networks through targeted chain of bit flips",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5532,
    "paper_ids": [
      5473
    ],
    "papers_without_artifact_ids": [
      5474,
      5475
    ]
  },
  {
    "name": "Chaitali Chakrabarti",
    "display_name": "Chaitali Chakrabarti",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Phantom: Privacy-Preserving Deep Neural Network Model Obfuscation in Heterogeneous TEE and GPU System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5533,
    "paper_ids": [
      5473
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Deliang Fan",
    "display_name": "Deliang Fan",
    "affiliation": "Arizona State University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Phantom: Privacy-Preserving Deep Neural Network Model Obfuscation in Heterogeneous TEE and GPU System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deepdup an adversarial weight duplication attack framework to crush deep neural network in multitenant fpga",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "deephammer depleting the intelligence of deep neural networks through targeted chain of bit flips",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5534,
    "paper_ids": [
      5473
    ],
    "papers_without_artifact_ids": [
      5476,
      5475
    ]
  },
  {
    "name": "Cristian Munteanu 0001",
    "display_name": "Cristian Munteanu",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Catch-22: Uncovering Compromised Hosts using SSH Public Keys",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5535,
    "paper_ids": [
      2928
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bonan Ruan",
    "display_name": "Bonan Ruan",
    "affiliation": "National University of Singapore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fuzzing the PHP Interpreter via Dataflow Fusion",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5536,
    "paper_ids": [
      2571
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiahao Liu 0005",
    "display_name": "Jiahao Liu",
    "affiliation": "National University of Singapore",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fuzzing the PHP Interpreter via Dataflow Fusion",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "uictx understanding ui behaviors with code contexts for mobile applications",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "provguard detecting sdn control policy manipulation via contextual semantics of provenance graphs",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 5537,
    "paper_ids": [
      2571
    ],
    "papers_without_artifact_ids": [
      2795,
      2796
    ]
  },
  {
    "name": "Roland H. C. Yap",
    "display_name": "Roland H. C. Yap",
    "affiliation": "National University of Singapore",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fuzzing the PHP Interpreter via Dataflow Fusion",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hardening binaries against more memory errors",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 5538,
    "paper_ids": [
      2571
    ],
    "papers_without_artifact_ids": [
      5477
    ]
  },
  {
    "name": "Xiangpu Song",
    "display_name": "Xiangpu Song",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5539,
    "paper_ids": [
      2488
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianliang Wu 0002",
    "display_name": "Jianliang Wu",
    "affiliation": "Simon Fraser University",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 2,
        "2021": 1
      },
      "PETS": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 11.1,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "veribin adaptive verification of patches at the binary level",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "why am i seeing double an investigation of device management flaws in voice assistant platforms",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "a thorough security analysis of ble proximity tracking protocols",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "finding traceability attacks in the bluetooth low energy specification and its implementations",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "are you spying on me largescale analysis on iot data exposure through companion apps",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "profactory improving iot security via formalized protocol customization",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "lightblue automatic profileaware debloating of bluetooth stacks",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "blesa spoofing attacks against reconnections in bluetooth low energy",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5540,
    "paper_ids": [
      2488
    ],
    "papers_without_artifact_ids": [
      1775,
      1735,
      2489,
      1777,
      608,
      26,
      27,
      30
    ]
  },
  {
    "name": "Yingpei Zeng",
    "display_name": "Yingpei Zeng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5541,
    "paper_ids": [
      2488
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hao Pan",
    "display_name": "Hao Pan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5542,
    "paper_ids": [
      2488
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shanqing Guo",
    "display_name": "Shanqing Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 2,
        "2025": 2
      },
      "ACSAC": {
        "2024": 1,
        "2018": 1,
        "2019": 1
      }
    },
    "artifact_rate": 12.5,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a thorough security analysis of ble proximity tracking protocols",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "dissecting open edge computing platforms ecosystem usage and security risks",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "lost in conversion exploit data structure conversion with attribute loss to break android systems",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "label inference attacks against vertical federated learning",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "seeing is living rethinking the security of facial liveness verification in the deepfake era",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "how to prove your model belongs to you a blindwatermark based framework to protect intellectual property of dnn",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "mapping to bits efficiently detecting type confusion errors",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 5543,
    "paper_ids": [
      2488
    ],
    "papers_without_artifact_ids": [
      2489,
      907,
      5478,
      1556,
      1557,
      213,
      4238
    ]
  },
  {
    "name": "Hao Guo",
    "display_name": "Hao Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "EUROSYS": 1,
      "ATC": 1,
      "FAST": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2026": 2
      },
      "OSDI": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SEAF: Secure Evaluation on Activation Functions with Dynamic Precision for Secure Two-Party Inference",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "discardbased garbage collection for distributed logstructured storage systems in bytedance",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "odinann direct insert for consistently stable performance in billionscale graphbased vector search",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "improved secure twoparty computation from a geometric perspective",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "volley accelerating writeread orders in disaggregated storage",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "singularfs a billionscale distributed file system using a single metadata server",
        "conference": "ATC",
        "year": 2023
      }
    ],
    "author_id": 1655,
    "paper_ids": [
      5479
    ],
    "papers_without_artifact_ids": [
      1043,
      1374,
      3261,
      1376,
      1057
    ]
  },
  {
    "name": "Zhaoqian Liu",
    "display_name": "Zhaoqian Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SEAF: Secure Evaluation on Activation Functions with Dynamic Precision for Secure Two-Party Inference",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5544,
    "paper_ids": [
      5479
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ximing Fu",
    "display_name": "Ximing Fu",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SEAF: Secure Evaluation on Activation Functions with Dynamic Precision for Secure Two-Party Inference",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5545,
    "paper_ids": [
      5479
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhusen Liu",
    "display_name": "Zhusen Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SEAF: Secure Evaluation on Activation Functions with Dynamic Precision for Secure Two-Party Inference",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5546,
    "paper_ids": [
      5479
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Antoine Delignat-Lavaud",
    "display_name": "Antoine Delignat-Lavaud",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "WOOT": 0,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "WOOT": {},
      "NSDI": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Transparent Attested DNS for Confidential Computing Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "iaccf individual accountability for permissioned ledgers",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 5547,
    "paper_ids": [
      4231
    ],
    "papers_without_artifact_ids": [
      1393
    ]
  },
  {
    "name": "Kapil Vaswani",
    "display_name": "Kapil Vaswani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 1,
      "FAST": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      },
      "ATC": {
        "2023": 1
      },
      "FAST": {
        "2019": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Transparent Attested DNS for Confidential Computing Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "confidential computing within an ai accelerator",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "dice a formally verified implementation of dice measured boot",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "speicher securing lsmbased keyvalue stores using shielded execution",
        "conference": "FAST",
        "year": 2019
      }
    ],
    "author_id": 5548,
    "paper_ids": [
      4231
    ],
    "papers_without_artifact_ids": [
      4232,
      5480,
      2138
    ]
  },
  {
    "name": "Manuel Costa",
    "display_name": "Manuel Costa",
    "affiliation": "Microsoft Research",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0,
      "NSDI": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SOSP": {},
      "NSDI": {
        "2022": 1,
        "2005": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Transparent Attested DNS for Confidential Computing Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "iaccf individual accountability for permissioned ledgers",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "debunking some myths about structured and unstructured overlays",
        "conference": "NSDI",
        "year": 2005
      }
    ],
    "author_id": 5549,
    "paper_ids": [
      4231
    ],
    "papers_without_artifact_ids": [
      1393,
      5481
    ]
  },
  {
    "name": "Sylvan Clebsch",
    "display_name": "Sylvan Clebsch",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Transparent Attested DNS for Confidential Computing Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "iaccf individual accountability for permissioned ledgers",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 5550,
    "paper_ids": [
      4231
    ],
    "papers_without_artifact_ids": [
      1393
    ]
  },
  {
    "name": "Christoph M. Wintersteiger",
    "display_name": "Christoph M. Wintersteiger",
    "affiliation": "Microsoft Research",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Transparent Attested DNS for Confidential Computing Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "iaccf individual accountability for permissioned ledgers",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 5551,
    "paper_ids": [
      4231
    ],
    "papers_without_artifact_ids": [
      1393
    ]
  },
  {
    "name": "Hannes Weissteiner",
    "display_name": "Hannes Weissteiner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "counterseveillance performancecounter attacks on amd sevsnp",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "teecorrelate an informationpreserving defense against performancecounter attacks on tees",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 5552,
    "paper_ids": [
      338
    ],
    "papers_without_artifact_ids": [
      339,
      342
    ]
  },
  {
    "name": "Arslan Mumtaz",
    "display_name": "Arslan Mumtaz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LEO-Range: Physical Layer Design for Secure Ranging with Low Earth Orbiting Satellites",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5553,
    "paper_ids": [
      1225
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mridula Singh",
    "display_name": "Mridula Singh",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LEO-Range: Physical Layer Design for Secure Ranging with Low Earth Orbiting Satellites",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5554,
    "paper_ids": [
      1225
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenqiang Ruan",
    "display_name": "Wenqiang Ruan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HawkEye: Statically and Accurately Profiling the Communication Cost of Models in Multi-party Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "digit semantics based optimization for practical password cracking tools",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 5555,
    "paper_ids": [
      4400
    ],
    "papers_without_artifact_ids": [
      4402
    ]
  },
  {
    "name": "Xin Lin",
    "display_name": "Xin Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SC": {},
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HawkEye: Statically and Accurately Profiling the Communication Cost of Models in Multi-party Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a measurement study on linux container security attacks and countermeasures",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 5556,
    "paper_ids": [
      4400
    ],
    "papers_without_artifact_ids": [
      1461
    ]
  },
  {
    "name": "Ruisheng Zhou",
    "display_name": "Ruisheng Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HawkEye: Statically and Accurately Profiling the Communication Cost of Models in Multi-party Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5557,
    "paper_ids": [
      4400
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guopeng Lin",
    "display_name": "Guopeng Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HawkEye: Statically and Accurately Profiling the Communication Cost of Models in Multi-party Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5558,
    "paper_ids": [
      4400
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shui Yu",
    "display_name": "Shui Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HawkEye: Statically and Accurately Profiling the Communication Cost of Models in Multi-party Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5559,
    "paper_ids": [
      4400
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yining Wang",
    "display_name": "Yining Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5560,
    "paper_ids": [
      234
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mi Zhang 0001",
    "display_name": "Mi Zhang",
    "affiliation": "Fudan University",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 2,
        "2022": 2,
        "2025": 1
      },
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rethinking whitebox watermarks on deep learning models under neural structural obfuscation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "exorcising wraith protecting lidarbased object detector in automated driving system from appearing attacks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "hidden trigger backdoor attack on nlp models via linguistic style manipulation",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "exploring the security boundary of data reconstruction via neuron exclusivity analysis",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "understanding the threats of trojaned quantized neural network in model supply chains",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "justinians gaavernor robust distributed learning with gradient aggregation agent",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5561,
    "paper_ids": [
      234
    ],
    "papers_without_artifact_ids": [
      249,
      251,
      256,
      4214,
      257,
      263
    ]
  },
  {
    "name": "Junjie Sun",
    "display_name": "Junjie Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5562,
    "paper_ids": [
      234
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chenyue Wang",
    "display_name": "Chenyue Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5563,
    "paper_ids": [
      234
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hui Xue 0001",
    "display_name": "Hui Xue",
    "affiliation": "Boğaziçi University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5564,
    "paper_ids": [
      234
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jialing Tao",
    "display_name": "Jialing Tao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5565,
    "paper_ids": [
      234
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ranjie Duan",
    "display_name": "Ranjie Duan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5566,
    "paper_ids": [
      234
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiexi Liu 0005",
    "display_name": "Jiexi Liu",
    "affiliation": "Alibaba Group, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5567,
    "paper_ids": [
      234
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuchuan Meng",
    "display_name": "Yuchuan Meng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply Chains",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5568,
    "paper_ids": [
      235
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tim Leonhard Storm",
    "display_name": "Tim Leonhard Storm",
    "affiliation": "Paderborn University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STEK Sharing is Not Caring: Bypassing TLS Authentication in Web Servers using Session Tickets",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5569,
    "paper_ids": [
      957
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Felix Matthias Cramer",
    "display_name": "Felix Matthias Cramer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STEK Sharing is Not Caring: Bypassing TLS Authentication in Web Servers using Session Tickets",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5570,
    "paper_ids": [
      957
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maximilian Radoy",
    "display_name": "Maximilian Radoy",
    "affiliation": "Paderborn University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STEK Sharing is Not Caring: Bypassing TLS Authentication in Web Servers using Session Tickets",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5571,
    "paper_ids": [
      957
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kevin Nam",
    "display_name": "Kevin Nam",
    "affiliation": "Seoul National University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SLOTHE : Lazy Approximation of Non-Arithmetic Neural Network Functions over Encrypted Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lohen layerwise optimizations for neural network inferences over encrypted data with high performance or accuracy",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 5572,
    "paper_ids": [
      3016
    ],
    "papers_without_artifact_ids": [
      3017
    ]
  },
  {
    "name": "Youyeon Joo",
    "display_name": "Youyeon Joo",
    "affiliation": "Seoul National University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SLOTHE : Lazy Approximation of Non-Arithmetic Neural Network Functions over Encrypted Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lohen layerwise optimizations for neural network inferences over encrypted data with high performance or accuracy",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 5573,
    "paper_ids": [
      3016
    ],
    "papers_without_artifact_ids": [
      3017
    ]
  },
  {
    "name": "Seungjin Ha",
    "display_name": "Seungjin Ha",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SLOTHE : Lazy Approximation of Non-Arithmetic Neural Network Functions over Encrypted Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lohen layerwise optimizations for neural network inferences over encrypted data with high performance or accuracy",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 5574,
    "paper_ids": [
      3016
    ],
    "papers_without_artifact_ids": [
      3017
    ]
  },
  {
    "name": "Rajdeep Ghosh 0005",
    "display_name": "Rajdeep Ghosh",
    "affiliation": "Indian Institute of Technology Kharagpur (IIT KGP), India",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I wasn't sure if this is indeed a security risk\": Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5575,
    "paper_ids": [
      4163
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shiladitya De",
    "display_name": "Shiladitya De",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I wasn't sure if this is indeed a security risk\": Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5576,
    "paper_ids": [
      4163
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Karthik Ramakrishnan",
    "display_name": "Karthik Ramakrishnan",
    "affiliation": "Univ. of California - Riverside",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Evaluating Privacy Policies under Modern Privacy Laws At Scale: An LLM-Based Automated Approach",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5577,
    "paper_ids": [
      2471
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tianhao Bai",
    "display_name": "Tianhao Bai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5578,
    "paper_ids": [
      236
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Feng Xue",
    "display_name": "Feng Xue",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5579,
    "paper_ids": [
      236
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yijun Sun",
    "display_name": "Yijun Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "zkGPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1658,
    "paper_ids": [
      1902
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tao Lu",
    "display_name": "Tao Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "zkGPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cuzk accelerating zeroknowledge proof with a faster parallel multiscalar multiplication algorithm on gpus",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 5580,
    "paper_ids": [
      1902
    ],
    "papers_without_artifact_ids": [
      3328
    ]
  },
  {
    "name": "Kai Chen",
    "display_name": "Kai Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "zkGPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5581,
    "paper_ids": [
      1902
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhanbo Wang",
    "display_name": "Zhanbo Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TETD: Trusted Execution in Trust Domains",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5582,
    "paper_ids": [
      2153
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiaxin Zhan",
    "display_name": "Jiaxin Zhan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TETD: Trusted Execution in Trust Domains",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5583,
    "paper_ids": [
      2153
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ning Hu",
    "display_name": "Ning Hu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TETD: Trusted Execution in Trust Domains",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5584,
    "paper_ids": [
      2153
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuyang Gong",
    "display_name": "Yuyang Gong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Topic-FlipRAG: Topic-Orientated Adversarial Opinion Manipulation Attacks to Retrieval-Augmented Generation Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5585,
    "paper_ids": [
      599
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhuo Chen",
    "display_name": "Zhuo Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NSDI": {
        "2013": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Topic-FlipRAG: Topic-Orientated Adversarial Opinion Manipulation Attacks to Retrieval-Augmented Generation Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "walkiemarkie indoor pathway mapping made easy",
        "conference": "NSDI",
        "year": 2013
      }
    ],
    "author_id": 5586,
    "paper_ids": [
      599
    ],
    "papers_without_artifact_ids": [
      4825
    ]
  },
  {
    "name": "Jiawei Liu 0002",
    "display_name": "Jiawei Liu",
    "affiliation": "Wuhan University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Topic-FlipRAG: Topic-Orientated Adversarial Opinion Manipulation Attacks to Retrieval-Augmented Generation Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5587,
    "paper_ids": [
      599
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Miaokun Chen",
    "display_name": "Miaokun Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Topic-FlipRAG: Topic-Orientated Adversarial Opinion Manipulation Attacks to Retrieval-Augmented Generation Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5588,
    "paper_ids": [
      599
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fengchang Yu",
    "display_name": "Fengchang Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Topic-FlipRAG: Topic-Orientated Adversarial Opinion Manipulation Attacks to Retrieval-Augmented Generation Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5589,
    "paper_ids": [
      599
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei Lu 0019",
    "display_name": "Wei Lu",
    "affiliation": "Xidian University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Topic-FlipRAG: Topic-Orientated Adversarial Opinion Manipulation Attacks to Retrieval-Augmented Generation Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5590,
    "paper_ids": [
      599
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaozhong Liu 0001",
    "display_name": "Xiaozhong Liu",
    "affiliation": "Worcester Polytechnic Institute",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Topic-FlipRAG: Topic-Orientated Adversarial Opinion Manipulation Attacks to Retrieval-Augmented Generation Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sherlock on specs building lte conformance tests through automated reasoning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "seeing the forest for the trees understanding security hazards in the 3gpp ecosystem through intelligent analysis on change requests",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5591,
    "paper_ids": [
      599
    ],
    "papers_without_artifact_ids": [
      609,
      610
    ]
  },
  {
    "name": "Zekun Sun",
    "display_name": "Zekun Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pretender: Universal Active Defense against Diffusion Finetuning Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5592,
    "paper_ids": [
      1540
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zijian Liu",
    "display_name": "Zijian Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pretender: Universal Active Defense against Diffusion Finetuning Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5593,
    "paper_ids": [
      1540
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Na Ruan",
    "display_name": "Na Ruan",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Pretender: Universal Active Defense against Diffusion Finetuning Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5594,
    "paper_ids": [
      1540
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marcos Bajo",
    "display_name": "Marcos Bajo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Await() a Second: Evading Control Flow Integrity by Hijacking C++ Coroutines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5595,
    "paper_ids": [
      849
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yihan Ma 0001",
    "display_name": "Yihan Ma",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From Meme to Threat: On the Hateful Meme Understanding and Induced Hateful Content Generation in Open-Source Vision Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5596,
    "paper_ids": [
      184
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ravishka Rathnasuriya",
    "display_name": "Ravishka Rathnasuriya",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Efficiency Robustness of Dynamic Deep Learning Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5597,
    "paper_ids": [
      5482
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tingxi Li",
    "display_name": "Tingxi Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Efficiency Robustness of Dynamic Deep Learning Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5598,
    "paper_ids": [
      5482
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zexin Xu",
    "display_name": "Zexin Xu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Efficiency Robustness of Dynamic Deep Learning Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5599,
    "paper_ids": [
      5482
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zihe Song",
    "display_name": "Zihe Song",
    "affiliation": "The University of Texas at Dallas",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Efficiency Robustness of Dynamic Deep Learning Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5600,
    "paper_ids": [
      5482
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mirazul Haque",
    "display_name": "Mirazul Haque",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Efficiency Robustness of Dynamic Deep Learning Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5601,
    "paper_ids": [
      5482
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simin Chen",
    "display_name": "Simin Chen",
    "affiliation": "Columbia university",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Efficiency Robustness of Dynamic Deep Learning Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5602,
    "paper_ids": [
      5482
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei Yang 0013",
    "display_name": "Wei Yang",
    "affiliation": "University of Texas at Dallas",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2017": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Efficiency Robustness of Dynamic Deep Learning Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "malware detection in adversarial settings exploiting feature evolutions and confusions in android apps",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 5603,
    "paper_ids": [
      5482
    ],
    "papers_without_artifact_ids": [
      5483
    ]
  },
  {
    "name": "Wengrui Zheng",
    "display_name": "Wengrui Zheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Provably Robust Multi-bit Watermarking for AI-generated Text",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5604,
    "paper_ids": [
      1903
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dong Yin",
    "display_name": "Dong Yin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Provably Robust Multi-bit Watermarking for AI-generated Text",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secretshared shuffle with malicious security",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5605,
    "paper_ids": [
      1903
    ],
    "papers_without_artifact_ids": [
      2959
    ]
  },
  {
    "name": "Yanze Jiang",
    "display_name": "Yanze Jiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Provably Robust Multi-bit Watermarking for AI-generated Text",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5606,
    "paper_ids": [
      1903
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhihua Tian",
    "display_name": "Zhihua Tian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Provably Robust Multi-bit Watermarking for AI-generated Text",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5607,
    "paper_ids": [
      1903
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yihao Peng",
    "display_name": "Yihao Peng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AutoLabel: Automated Fine-Grained Log Labeling for Cyber Attack Dataset Generation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5608,
    "paper_ids": [
      5484
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tongxin Zhang",
    "display_name": "Tongxin Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AutoLabel: Automated Fine-Grained Log Labeling for Cyber Attack Dataset Generation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5609,
    "paper_ids": [
      5484
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jieshao Lai",
    "display_name": "Jieshao Lai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AutoLabel: Automated Fine-Grained Log Labeling for Cyber Attack Dataset Generation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5610,
    "paper_ids": [
      5484
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuxuan Zhang",
    "display_name": "Yuxuan Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AutoLabel: Automated Fine-Grained Log Labeling for Cyber Attack Dataset Generation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5611,
    "paper_ids": [
      5484
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yiming Wu",
    "display_name": "Yiming Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AutoLabel: Automated Fine-Grained Log Labeling for Cyber Attack Dataset Generation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5612,
    "paper_ids": [
      5484
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hai Wan",
    "display_name": "Hai Wan",
    "affiliation": "Sun Yat-sen University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AutoLabel: Automated Fine-Grained Log Labeling for Cyber Attack Dataset Generation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5613,
    "paper_ids": [
      5484
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xibin Zhao",
    "display_name": "Xibin Zhao",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AutoLabel: Automated Fine-Grained Log Labeling for Cyber Attack Dataset Generation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5614,
    "paper_ids": [
      5484
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sparsha Gowda",
    "display_name": "Sparsha Gowda",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Context Matters: Qualitative Insights into Developers' Approaches and Challenges with Software Composition Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5615,
    "paper_ids": [
      2264
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lucas Craig",
    "display_name": "Lucas Craig",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Disparate Privacy Vulnerability: Targeted Attribute Inference Attacks and Defenses",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5616,
    "paper_ids": [
      2530
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cassidy Gibson",
    "display_name": "Cassidy Gibson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Analyzing the AI Nudification Application Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "analyzing the monetization ecosystem of stalkerware",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "who are you i really wanna know detecting audio deepfakes through vocal tract reconstruction",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5617,
    "paper_ids": [
      2210
    ],
    "papers_without_artifact_ids": [
      2214,
      2215
    ]
  },
  {
    "name": "Natalie Grace Brigham",
    "display_name": "Natalie Grace Brigham",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Analyzing the AI Nudification Application Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "violation of my body perceptions of aigenerated nonconsensual intimate imagery",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5618,
    "paper_ids": [
      2210
    ],
    "papers_without_artifact_ids": [
      3210
    ]
  },
  {
    "name": "Matej Bölcskei",
    "display_name": "Matej Bölcskei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "zenhammer rowhammer attacks on amd zenbased platforms",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 8078,
    "paper_ids": [
      926
    ],
    "papers_without_artifact_ids": [
      930
    ]
  },
  {
    "name": "Tian Dong",
    "display_name": "Tian Dong",
    "affiliation": "The University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Depth Gives a False Sense of Privacy: LLM Internal States Inversion",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the philosophers stone trojaning plugins of large language models",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 5620,
    "paper_ids": [
      3300
    ],
    "papers_without_artifact_ids": [
      1572
    ]
  },
  {
    "name": "Yan Meng 0001",
    "display_name": "Yan Meng",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Depth Gives a False Sense of Privacy: LLM Internal States Inversion",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the philosophers stone trojaning plugins of large language models",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "your microphone array retains your identity a robust voice liveness detection system for smart speakers",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5621,
    "paper_ids": [
      3300
    ],
    "papers_without_artifact_ids": [
      1572,
      3240
    ]
  },
  {
    "name": "Shaofeng Li 0001",
    "display_name": "Shaofeng Li",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Depth Gives a False Sense of Privacy: LLM Internal States Inversion",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the philosophers stone trojaning plugins of large language models",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "yes onebitflip matters universal dnn model inference depletion with runtime code fault injection",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5622,
    "paper_ids": [
      3300
    ],
    "papers_without_artifact_ids": [
      1572,
      1398
    ]
  },
  {
    "name": "Zhen Liu 0008",
    "display_name": "Zhen Liu",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Depth Gives a False Sense of Privacy: LLM Internal States Inversion",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the philosophers stone trojaning plugins of large language models",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 5623,
    "paper_ids": [
      3300
    ],
    "papers_without_artifact_ids": [
      1572
    ]
  },
  {
    "name": "Haojin Zhu",
    "display_name": "Haojin Zhu",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 12.5,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Depth Gives a False Sense of Privacy: LLM Internal States Inversion",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the philosophers stone trojaning plugins of large language models",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "a formal approach to multilayered privileges for enclaves",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "a duty to forget a right to be assured exposing vulnerabilities in machine unlearning services",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "yes onebitflip matters universal dnn model inference depletion with runtime code fault injection",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "policycomp counterpart comparison of privacy policies uncovers overbroad personal data collection practices",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "your microphone array retains your identity a robust voice liveness detection system for smart speakers",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "ios your os everybodys os vetting and analyzing network services of ios applications",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5624,
    "paper_ids": [
      3300
    ],
    "papers_without_artifact_ids": [
      1572,
      3301,
      1575,
      1398,
      3302,
      3240,
      1581
    ]
  },
  {
    "name": "Cheng-Long Wang 0003",
    "display_name": "Cheng-Long Wang",
    "affiliation": "King Abdullah University of Science and Technology, Jeddah, Saudi Arabia",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Lifecycle Unlearning Commitment Management: Measuring Sample-level Unlearning Completeness",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "inductive graph unlearning",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5625,
    "paper_ids": [
      463
    ],
    "papers_without_artifact_ids": [
      3324
    ]
  },
  {
    "name": "Qi Li",
    "display_name": "Qi Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Lifecycle Unlearning Commitment Management: Measuring Sample-level Unlearning Completeness",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5626,
    "paper_ids": [
      463
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhengyu Liu",
    "display_name": "Zhengyu Liu",
    "affiliation": "Johns Hopkins University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The DOMino Effect: Detecting and Exploiting DOM Clobbering Gadgets via Concolic Execution with Symbolic DOM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5627,
    "paper_ids": [
      464
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Theo Lee",
    "display_name": "Theo Lee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The DOMino Effect: Detecting and Exploiting DOM Clobbering Gadgets via Concolic Execution with Symbolic DOM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5628,
    "paper_ids": [
      464
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianjia Yu",
    "display_name": "Jianjia Yu",
    "affiliation": "Johns Hopkins University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The DOMino Effect: Detecting and Exploiting DOM Clobbering Gadgets via Concolic Execution with Symbolic DOM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rendering contention channel made practical in web browsers",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5629,
    "paper_ids": [
      464
    ],
    "papers_without_artifact_ids": [
      253
    ]
  },
  {
    "name": "Zifeng Kang",
    "display_name": "Zifeng Kang",
    "affiliation": "Johns Hopkins University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The DOMino Effect: Detecting and Exploiting DOM Clobbering Gadgets via Concolic Execution with Symbolic DOM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5630,
    "paper_ids": [
      464
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zheyuan He",
    "display_name": "Zheyuan He",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "FAST": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "FAST": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "maat analyzing and optimizing overcharge on blockchain storage",
        "conference": "FAST",
        "year": 2025
      }
    ],
    "author_id": 5631,
    "paper_ids": [
      774
    ],
    "papers_without_artifact_ids": [
      775
    ]
  },
  {
    "name": "Jiahao Luo",
    "display_name": "Jiahao Luo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5632,
    "paper_ids": [
      774
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junhan Duan",
    "display_name": "Junhan Duan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5633,
    "paper_ids": [
      774
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuwei Song",
    "display_name": "Shuwei Song",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "FAST": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "maat analyzing and optimizing overcharge on blockchain storage",
        "conference": "FAST",
        "year": 2025
      }
    ],
    "author_id": 5634,
    "paper_ids": [
      774
    ],
    "papers_without_artifact_ids": [
      775
    ]
  },
  {
    "name": "Xiaosong Zhang 0001",
    "display_name": "Xiaosong Zhang",
    "affiliation": "UESTC",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "FAST": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "FAST": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "maat analyzing and optimizing overcharge on blockchain storage",
        "conference": "FAST",
        "year": 2025
      }
    ],
    "author_id": 5635,
    "paper_ids": [
      774
    ],
    "papers_without_artifact_ids": [
      775
    ]
  },
  {
    "name": "Tianshi Xu",
    "display_name": "Tianshi Xu",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5636,
    "paper_ids": [
      4307
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiangrui Yu",
    "display_name": "Jiangrui Yu",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5637,
    "paper_ids": [
      4307
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yi Chen",
    "display_name": "Yi Chen",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0,
      "CHES": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SOSP": {},
      "CHES": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "xboot freexor gates for ckks with applications to transciphering",
        "conference": "CHES",
        "year": 2025
      }
    ],
    "author_id": 5638,
    "paper_ids": [
      4307
    ],
    "papers_without_artifact_ids": [
      4245
    ]
  },
  {
    "name": "Chenqi Lin",
    "display_name": "Chenqi Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5639,
    "paper_ids": [
      4307
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Runsheng Wang",
    "display_name": "Runsheng Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5640,
    "paper_ids": [
      4307
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Meng Li 0004",
    "display_name": "Meng Li",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5641,
    "paper_ids": [
      4307
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Huaxin Tang",
    "display_name": "Huaxin Tang",
    "affiliation": "University of Surrey",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure Caches for Compartmentalized Software",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5642,
    "paper_ids": [
      4310
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Williams Zhang Cen",
    "display_name": "Williams Zhang Cen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure Caches for Compartmentalized Software",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "teeshirt scalable leakagefree cache hierarchies for tees",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5643,
    "paper_ids": [
      4310
    ],
    "papers_without_artifact_ids": [
      4311
    ]
  },
  {
    "name": "Chengyu Wang 0001",
    "display_name": "Chengyu Wang",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5644,
    "paper_ids": [
      4394
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaodan Li",
    "display_name": "Xiaodan Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5645,
    "paper_ids": [
      4394
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenmeng Zhou",
    "display_name": "Wenmeng Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5646,
    "paper_ids": [
      4394
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vincent Diemunsch",
    "display_name": "Vincent Diemunsch",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Comprehensive Formal Security Analysis of OPC UA",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5647,
    "paper_ids": [
      3207
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuan Su",
    "display_name": "Yuan Su",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5648,
    "paper_ids": [
      3309
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuyi Wang 0001",
    "display_name": "Yuyi Wang",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "thunderdome timelockfree rationallysecure virtual channels",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 5649,
    "paper_ids": [
      3309
    ],
    "papers_without_artifact_ids": [
      5485
    ]
  },
  {
    "name": "Chengyi Dong",
    "display_name": "Chengyi Dong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5650,
    "paper_ids": [
      3309
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jalen Chuang",
    "display_name": "Jalen Chuang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FLOP: Breaking the Apple M3 CPU via False Load Output Predictions",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5651,
    "paper_ids": [
      1501
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Meng Hao 0001",
    "display_name": "Meng Hao",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Keyword Private Information Retrieval from Key-to-Index Mappings",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "distributed function secret sharing and applications",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "unbalanced circuitpsi from oblivious keyvalue retrieval",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "scalable zeroknowledge proofs for nonlinear functions in machine learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "efficient private and robust federated learning",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 5652,
    "paper_ids": [
      3257
    ],
    "papers_without_artifact_ids": [
      5486,
      742,
      743,
      746
    ]
  },
  {
    "name": "Liqiang Peng",
    "display_name": "Liqiang Peng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Keyword Private Information Retrieval from Key-to-Index Mappings",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improved secure twoparty computation from a geometric perspective",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "unbalanced circuitpsi from oblivious keyvalue retrieval",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5653,
    "paper_ids": [
      3257
    ],
    "papers_without_artifact_ids": [
      3261,
      742
    ]
  },
  {
    "name": "Lei Zhang 0006",
    "display_name": "Lei Zhang",
    "affiliation": "The Hong Kong Polytechnic Univ.",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Keyword Private Information Retrieval from Key-to-Index Mappings",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5654,
    "paper_ids": [
      3257
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hongwei Li 0001",
    "display_name": "Hongwei Li",
    "affiliation": "UESTC",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 3,
        "2025": 1
      },
      "ACSAC": {
        "2021": 1,
        "2020": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practical Keyword Private Information Retrieval from Key-to-Index Mappings",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "distributed function secret sharing and applications",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "unbalanced circuitpsi from oblivious keyvalue retrieval",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "scalable zeroknowledge proofs for nonlinear functions in machine learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "instruction backdoor attacks against customized llms",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "efficient private and robust federated learning",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "secure and verifiable inference in deep neural networks",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 5655,
    "paper_ids": [
      3257
    ],
    "papers_without_artifact_ids": [
      5486,
      742,
      743,
      200,
      746,
      4420
    ]
  },
  {
    "name": "Diksha Goel",
    "display_name": "Diksha Goel",
    "affiliation": "CSIRO's Data61, Australia",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5656,
    "paper_ids": [
      1568
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minjune Kim",
    "display_name": "Minjune Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5657,
    "paper_ids": [
      1568
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gang Li 0009",
    "display_name": "Gang Li",
    "affiliation": "Deakin University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "guardspark finegrained purposeaware access control for secure data sharing and analysis in spark",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 5658,
    "paper_ids": [
      1568
    ],
    "papers_without_artifact_ids": [
      2245
    ]
  },
  {
    "name": "Yang Li 0182",
    "display_name": "Yang Li",
    "affiliation": "Australian National University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5659,
    "paper_ids": [
      1568
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Robin Doss",
    "display_name": "Robin Doss",
    "affiliation": "Deakin University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5660,
    "paper_ids": [
      1568
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bo Li 0026",
    "display_name": "Bo Li",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2025": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "provably unlearnable data examples",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "textguard provable defense against backdoor attacks on text classification",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "ace a model poisoning attack on contribution evaluation methods in federated learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "how to cover up anomalous accesses to electronic health records",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "diffsmooth certifiably robust learning via diffusion models and local smoothing",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5661,
    "paper_ids": [
      1568
    ],
    "papers_without_artifact_ids": [
      1574,
      3280,
      3327,
      1533,
      4142
    ]
  },
  {
    "name": "Liming Zhu 0001",
    "display_name": "Liming Zhu",
    "affiliation": "CSIRO Data61, Sydney, NSW, Australia",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0,
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {},
      "PETS": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "provably unlearnable data examples",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "privacy bills of materials pribom a transparent privacy information inventory for collaborative privacy notice generation in mobile app development",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 5662,
    "paper_ids": [
      1568
    ],
    "papers_without_artifact_ids": [
      1574,
      5487
    ]
  },
  {
    "name": "Yang Yang 0026",
    "display_name": "Yang Yang",
    "affiliation": "Fuzhou University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "prisrv privacyenhanced and highly usable service discovery in wireless communications",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5663,
    "paper_ids": [
      445
    ],
    "papers_without_artifact_ids": [
      3071
    ]
  },
  {
    "name": "Guomin Yang",
    "display_name": "Guomin Yang",
    "affiliation": "Singapore Management University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "impact tracing identifying the culprit of misinformation in encrypted messaging systems",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "siniel distributed privacypreserving zksnark",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "prisrv privacyenhanced and highly usable service discovery in wireless communications",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5664,
    "paper_ids": [
      445
    ],
    "papers_without_artifact_ids": [
      4365,
      4418,
      3071
    ]
  },
  {
    "name": "Minming Huang",
    "display_name": "Minming Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "prisrv privacyenhanced and highly usable service discovery in wireless communications",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5665,
    "paper_ids": [
      445
    ],
    "papers_without_artifact_ids": [
      3071
    ]
  },
  {
    "name": "Zilin Shen",
    "display_name": "Zilin Shen",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5666,
    "paper_ids": [
      445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "HweeHwa Pang",
    "display_name": "HweeHwa Pang",
    "affiliation": "Singapore Management University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "prisrv privacyenhanced and highly usable service discovery in wireless communications",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5667,
    "paper_ids": [
      445
    ],
    "papers_without_artifact_ids": [
      3071
    ]
  },
  {
    "name": "Xueluan Gong",
    "display_name": "Xueluan Gong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "urvfl undetectable data reconstruction attack on vertical federated learning",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "catch you and i can revealing source voiceprint against voice conversion",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5668,
    "paper_ids": [
      2564
    ],
    "papers_without_artifact_ids": [
      5431,
      5488
    ]
  },
  {
    "name": "Mingzhe Li",
    "display_name": "Mingzhe Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5669,
    "paper_ids": [
      2564
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yilin Zhang",
    "display_name": "Yilin Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5670,
    "paper_ids": [
      2564
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fengyuan Ran",
    "display_name": "Fengyuan Ran",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5671,
    "paper_ids": [
      2564
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chen Chen 0115",
    "display_name": "Chen Chen",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5672,
    "paper_ids": [
      2564
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yanjiao Chen",
    "display_name": "Yanjiao Chen",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 3,
        "2025": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "raconteur a knowledgeable insightful and portable llmpowered shell command explainer",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "barbie robust backdoor detection based on latent separability",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "catch you and i can revealing source voiceprint against voice conversion",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "villain backdoor attacks against vertical split learning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "vcloak intelligibility naturalness timbrepreserving realtime voice anonymization",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5673,
    "paper_ids": [
      2564
    ],
    "papers_without_artifact_ids": [
      4247,
      5489,
      5488,
      5490,
      5491
    ]
  },
  {
    "name": "Kwok-Yan Lam",
    "display_name": "Kwok-Yan Lam",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5674,
    "paper_ids": [
      2564
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinzhu Yan",
    "display_name": "Jinzhu Yan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CertTA: Certified Robustness Made Practical for Learning-Based Traffic Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "brainonswitch towards advanced intelligent network data plane via nndriven traffic analysis at linespeed",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 5675,
    "paper_ids": [
      2495
    ],
    "papers_without_artifact_ids": [
      560
    ]
  },
  {
    "name": "Yuyang Xie",
    "display_name": "Yuyang Xie",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CertTA: Certified Robustness Made Practical for Learning-Based Traffic Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5676,
    "paper_ids": [
      2495
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shiyu Liang",
    "display_name": "Shiyu Liang",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CertTA: Certified Robustness Made Practical for Learning-Based Traffic Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5677,
    "paper_ids": [
      2495
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lin Liu 0018",
    "display_name": "Lin Liu",
    "affiliation": "National University of Defense Technology, College of Computer, Changsha, Hunan, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CertTA: Certified Robustness Made Practical for Learning-Based Traffic Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5678,
    "paper_ids": [
      2495
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weifei Jin",
    "display_name": "Weifei Jin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5679,
    "paper_ids": [
      1569
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junjie Su",
    "display_name": "Junjie Su",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5680,
    "paper_ids": [
      1569
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yedi Zhang",
    "display_name": "Yedi Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "songbsab a dual prevention approach against singing voice conversion based illegal song covers",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "slmiasr speakerlevel membership inference attacks against speaker recognition systems",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "qfa2sr queryfree adversarial transfer attacks to speaker recognition systems",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5681,
    "paper_ids": [
      1569
    ],
    "papers_without_artifact_ids": [
      3126,
      5492,
      5493
    ]
  },
  {
    "name": "Jie Lu 0009",
    "display_name": "Jie Lu",
    "affiliation": "University of Michigan-Dearborn",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SOSP": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZIPPER: Static Taint Analysis for PHP Applications with Precision and Efficiency",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "file hijacking vulnerability the elephant in the room",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5682,
    "paper_ids": [
      3362
    ],
    "papers_without_artifact_ids": [
      3365
    ]
  },
  {
    "name": "Shizhe Cui",
    "display_name": "Shizhe Cui",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZIPPER: Static Taint Analysis for PHP Applications with Precision and Efficiency",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5683,
    "paper_ids": [
      3362
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chenghang Shi",
    "display_name": "Chenghang Shi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZIPPER: Static Taint Analysis for PHP Applications with Precision and Efficiency",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5684,
    "paper_ids": [
      3362
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qin Mai",
    "display_name": "Qin Mai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZIPPER: Static Taint Analysis for PHP Applications with Precision and Efficiency",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5685,
    "paper_ids": [
      3362
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunpei Zhang",
    "display_name": "Yunpei Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ZIPPER: Static Taint Analysis for PHP Applications with Precision and Efficiency",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5686,
    "paper_ids": [
      3362
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xin Yao 0002",
    "display_name": "Xin Yao",
    "affiliation": "Central South University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EchoLLM: LLM-Augmented Acoustic Eavesdropping Attack on Bone Conduction Headphones with mmWave Radar",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5687,
    "paper_ids": [
      3967
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kecheng Huang",
    "display_name": "Kecheng Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "FAST": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EchoLLM: LLM-Augmented Acoustic Eavesdropping Attack on Bone Conduction Headphones with mmWave Radar",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hasis a hardwareassisted singleindex store for hybrid transactional and analytical processing",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "removing doublelogging with passive data persistence in lsmtree based relational databases",
        "conference": "FAST",
        "year": 2022
      }
    ],
    "author_id": 5688,
    "paper_ids": [
      3967
    ],
    "papers_without_artifact_ids": [
      5494,
      5495
    ]
  },
  {
    "name": "Jiawei Guo",
    "display_name": "Jiawei Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EchoLLM: LLM-Augmented Acoustic Eavesdropping Attack on Bone Conduction Headphones with mmWave Radar",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5689,
    "paper_ids": [
      3967
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jie Tang",
    "display_name": "Jie Tang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EchoLLM: LLM-Augmented Acoustic Eavesdropping Attack on Bone Conduction Headphones with mmWave Radar",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5690,
    "paper_ids": [
      3967
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ming Zhao 0007",
    "display_name": "Ming Zhao",
    "affiliation": "Central South University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EchoLLM: LLM-Augmented Acoustic Eavesdropping Attack on Bone Conduction Headphones with mmWave Radar",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5691,
    "paper_ids": [
      3967
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Atilla Akkus",
    "display_name": "Atilla Akkus",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5692,
    "paper_ids": [
      185
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Masoud Poorghaffar Aghdam",
    "display_name": "Masoud Poorghaffar Aghdam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5693,
    "paper_ids": [
      185
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingjie Li 0007",
    "display_name": "Mingjie Li",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5694,
    "paper_ids": [
      185
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junjie Chu 0002",
    "display_name": "Junjie Chu",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5695,
    "paper_ids": [
      185
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sinem Sav",
    "display_name": "Sinem Sav",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2023": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacypreserving federated recurrent neural networks",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "scalable privacypreserving distributed learning",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 5696,
    "paper_ids": [
      185
    ],
    "papers_without_artifact_ids": [
      3401,
      3402
    ]
  },
  {
    "name": "Carolina Ortega Pérez",
    "display_name": "Carolina Ortega Pérez",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8079,
    "paper_ids": [
      5496
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alaa Daffalla",
    "display_name": "Alaa Daffalla",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a framework for abusability analysis the case of passkeys in interpersonal threat models",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "account security interfaces important unintuitive and untrustworthy",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5698,
    "paper_ids": [
      5496
    ],
    "papers_without_artifact_ids": [
      2546,
      4284
    ]
  },
  {
    "name": "Zihao Wang",
    "display_name": "Zihao Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ATC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      },
      "ATC": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sharpness-Aware Initialization: Improving Differentially Private Machine Learning from First Principles",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gradient shaping enhancing backdoor attack against reverse engineering",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "dpadapter improving differentially private deep learning through noise tolerance pretraining",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "tossing in the dark practical bitflipping on graybox deep neural networks for runtime trojan injection",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5699,
    "paper_ids": [
      600
    ],
    "papers_without_artifact_ids": [
      603,
      606,
      604
    ]
  },
  {
    "name": "Rui Zhu",
    "display_name": "Rui Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "ATC": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sharpness-Aware Initialization: Improving Differentially Private Machine Learning from First Principles",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gradient shaping enhancing backdoor attack against reverse engineering",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "dpadapter improving differentially private deep learning through noise tolerance pretraining",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5700,
    "paper_ids": [
      600
    ],
    "papers_without_artifact_ids": [
      603,
      606
    ]
  },
  {
    "name": "Dongruo Zhou",
    "display_name": "Dongruo Zhou",
    "affiliation": "Indiana University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sharpness-Aware Initialization: Improving Differentially Private Machine Learning from First Principles",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dpadapter improving differentially private deep learning through noise tolerance pretraining",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5701,
    "paper_ids": [
      600
    ],
    "papers_without_artifact_ids": [
      606
    ]
  },
  {
    "name": "Yanting Wang 0001",
    "display_name": "Yanting Wang",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TracLLM: A Generic Framework for Attributing Long Context LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5702,
    "paper_ids": [
      3325
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Runpeng Geng",
    "display_name": "Runpeng Geng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TracLLM: A Generic Framework for Attributing Long Context LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "poisonedrag knowledge corruption attacks to retrievalaugmented generation of large language models",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "formalizing and benchmarking prompt injection attacks and defenses",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5703,
    "paper_ids": [
      3325
    ],
    "papers_without_artifact_ids": [
      3326,
      3164
    ]
  },
  {
    "name": "Ravan Nazaraliyev",
    "display_name": "Ravan Nazaraliyev",
    "affiliation": "University of California, Riverside",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Not so Refreshing: Attacking GPUs using RFM Rowhammer Mitigation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5704,
    "paper_ids": [
      4411
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yicheng Zhang 0004",
    "display_name": "Yicheng Zhang",
    "affiliation": "George Mason University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Not so Refreshing: Attacking GPUs using RFM Rowhammer Mitigation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "that doesnt go there attacks on shared state in multiuser augmented reality applications",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "going through the motions arvr keylogging from user head motions",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "its all in your headset sidechannel attacks on arvr systems",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5705,
    "paper_ids": [
      4411
    ],
    "papers_without_artifact_ids": [
      4413,
      4414,
      4415
    ]
  },
  {
    "name": "Sankha Baran Dutta",
    "display_name": "Sankha Baran Dutta",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Not so Refreshing: Attacking GPUs using RFM Rowhammer Mitigation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5706,
    "paper_ids": [
      4411
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrés Márquez 0001",
    "display_name": "Andrés Márquez",
    "affiliation": "University of Kentucky",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Not so Refreshing: Attacking GPUs using RFM Rowhammer Mitigation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8080,
    "paper_ids": [
      4411
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kevin J. Barker",
    "display_name": "Kevin J. Barker",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SC": {},
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Not so Refreshing: Attacking GPUs using RFM Rowhammer Mitigation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mgg accelerating graph neural networks with finegrained intrakernel communicationcomputation pipelining on multigpu platforms",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 5708,
    "paper_ids": [
      4411
    ],
    "papers_without_artifact_ids": [
      1679
    ]
  },
  {
    "name": "Minhao Bai",
    "display_name": "Minhao Bai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Shimmer: a Provably Secure Steganography Based on Entropy Collecting Mechanism",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5709,
    "paper_ids": [
      4427
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kaiyi Pang",
    "display_name": "Kaiyi Pang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Shimmer: a Provably Secure Steganography Based on Entropy Collecting Mechanism",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5710,
    "paper_ids": [
      4427
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Philipp Beer",
    "display_name": "Philipp Beer",
    "affiliation": "TU Wien",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TapTrap: Animation-Driven Tapjacking on Android",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5711,
    "paper_ids": [
      2438
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yash Vekaria",
    "display_name": "Yash Vekaria",
    "affiliation": "University of California, Davis",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Big Help or Big Brother? Auditing Tracking, Profiling, and Personalization in Generative AI Assistants",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5712,
    "paper_ids": [
      807
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aurelio Loris Canino",
    "display_name": "Aurelio Loris Canino",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Big Help or Big Brother? Auditing Tracking, Profiling, and Personalization in Generative AI Assistants",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5713,
    "paper_ids": [
      807
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonathan Levitsky",
    "display_name": "Jonathan Levitsky",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Big Help or Big Brother? Auditing Tracking, Profiling, and Personalization in Generative AI Assistants",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5714,
    "paper_ids": [
      807
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alex Ciechonski",
    "display_name": "Alex Ciechonski",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Big Help or Big Brother? Auditing Tracking, Profiling, and Personalization in Generative AI Assistants",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5715,
    "paper_ids": [
      807
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Patricia Callejo",
    "display_name": "Patricia Callejo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Big Help or Big Brother? Auditing Tracking, Profiling, and Personalization in Generative AI Assistants",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5716,
    "paper_ids": [
      807
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nicola Ruaro",
    "display_name": "Nicola Ruaro",
    "affiliation": "University of California, Santa Barbara",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Approve Once, Regret Forever: On the Exploitation of Ethereum's Approve-TransferFrom Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "not your type detecting storage collision vulnerabilities in ethereum smart contracts",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "guideenricher protecting the anonymity of ethereum mixing service users with deep reinforcement learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "confusum contractum confused deputy vulnerabilities in ethereum smart contracts",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5717,
    "paper_ids": [
      1152
    ],
    "papers_without_artifact_ids": [
      1155,
      1157,
      1159
    ]
  },
  {
    "name": "Fabio Gritti",
    "display_name": "Fabio Gritti",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Approve Once, Regret Forever: On the Exploitation of Ethereum's Approve-TransferFrom Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "not your type detecting storage collision vulnerabilities in ethereum smart contracts",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "confusum contractum confused deputy vulnerabilities in ethereum smart contracts",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5718,
    "paper_ids": [
      1152
    ],
    "papers_without_artifact_ids": [
      1155,
      1159
    ]
  },
  {
    "name": "Dongyu Meng",
    "display_name": "Dongyu Meng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Approve Once, Regret Forever: On the Exploitation of Ethereum's Approve-TransferFrom Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5719,
    "paper_ids": [
      1152
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingming Zhang 0010",
    "display_name": "Mingming Zhang",
    "affiliation": "Zhongguancun Laboratory, Beijing, China",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Misty Registry: An Empirical Study of Flawed Domain Registry Operation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "crossorigin web attacks via http2 server push and signed http exchange",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "breakspf how shared infrastructures magnify spf vulnerabilities across the internet",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "cross the zone toward a covert domain hijacking via shared dns infrastructure",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "a largescale and longitudinal measurement study of dkim deployment",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5720,
    "paper_ids": [
      902
    ],
    "papers_without_artifact_ids": [
      906,
      910,
      913,
      917
    ]
  },
  {
    "name": "Chengxi Xu",
    "display_name": "Chengxi Xu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Misty Registry: An Empirical Study of Flawed Domain Registry Operation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cross the zone toward a covert domain hijacking via shared dns infrastructure",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "rethinking the security threats of stale dns glue records",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5721,
    "paper_ids": [
      902
    ],
    "papers_without_artifact_ids": [
      913,
      912
    ]
  },
  {
    "name": "Gurur Öndarö",
    "display_name": "Gurur Öndarö",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "S/MINE: Collecting and Analyzing S/MIME Certificates at Scale",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "landscape exploring ldap weaknesses and data leaks at internet scale",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 8081,
    "paper_ids": [
      4429
    ],
    "papers_without_artifact_ids": [
      4431
    ]
  },
  {
    "name": "Jonas Kaspereit",
    "display_name": "Jonas Kaspereit",
    "affiliation": "FH Münster",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "S/MINE: Collecting and Analyzing S/MIME Certificates at Scale",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "landscape exploring ldap weaknesses and data leaks at internet scale",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5723,
    "paper_ids": [
      4429
    ],
    "papers_without_artifact_ids": [
      4431
    ]
  },
  {
    "name": "Samson Umezulike",
    "display_name": "Samson Umezulike",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "S/MINE: Collecting and Analyzing S/MIME Certificates at Scale",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5724,
    "paper_ids": [
      4429
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christoph Saatjohann",
    "display_name": "Christoph Saatjohann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "S/MINE: Collecting and Analyzing S/MIME Certificates at Scale",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "landscape exploring ldap weaknesses and data leaks at internet scale",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "contenttype multipartoracle tapping into format oracles in email endtoend encryption",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5725,
    "paper_ids": [
      4429
    ],
    "papers_without_artifact_ids": [
      4431,
      4432
    ]
  },
  {
    "name": "Yecheng Sun",
    "display_name": "Yecheng Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "regexscalpel regular expression denial of service redos defense by localizeandfix",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5726,
    "paper_ids": [
      3363
    ],
    "papers_without_artifact_ids": [
      3129
    ]
  },
  {
    "name": "Zhiwu Xu 0001",
    "display_name": "Zhiwu Xu",
    "affiliation": "Shenzhen University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "regexscalpel regular expression denial of service redos defense by localizeandfix",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "redoshunter a combined static and dynamic approach for regular expression dos detection",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5727,
    "paper_ids": [
      3363
    ],
    "papers_without_artifact_ids": [
      3129,
      3367
    ]
  },
  {
    "name": "Hengyu Yang",
    "display_name": "Hengyu Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5728,
    "paper_ids": [
      3363
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Huina Chao",
    "display_name": "Huina Chao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5729,
    "paper_ids": [
      3363
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cen Zhang",
    "display_name": "Cen Zhang",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automataguided controlflowsensitive fuzz driver generation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "apicraft fuzz driver generation for closedsource sdk libraries",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "muzz threadaware greybox fuzzing for effective bug hunting in multithreaded programs",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5730,
    "paper_ids": [
      3363
    ],
    "papers_without_artifact_ids": [
      786,
      3130,
      3133
    ]
  },
  {
    "name": "Huiyu Fang",
    "display_name": "Huiyu Fang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Further Study on Frequency Estimation under Local Differential Privacy",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5731,
    "paper_ids": [
      5497
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Liquan Chen",
    "display_name": "Liquan Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Further Study on Frequency Estimation under Local Differential Privacy",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5732,
    "paper_ids": [
      5497
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Suhui Liu",
    "display_name": "Suhui Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Further Study on Frequency Estimation under Local Differential Privacy",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fease fast and expressive asymmetric searchable encryption",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5733,
    "paper_ids": [
      5497
    ],
    "papers_without_artifact_ids": [
      5130
    ]
  },
  {
    "name": "Hao Li 0092",
    "display_name": "Hao Li",
    "affiliation": "Institute of Software, Chinese Academy of Sciences, Beijing, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enhanced Label-Only Membership Inference Attacks with Fewer Queries",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5734,
    "paper_ids": [
      186
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Siyuan Wu",
    "display_name": "Siyuan Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enhanced Label-Only Membership Inference Attacks with Fewer Queries",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5735,
    "paper_ids": [
      186
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yutong Ye 0002",
    "display_name": "Yutong Ye",
    "affiliation": "Illinois Institute of Technology",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enhanced Label-Only Membership Inference Attacks with Fewer Queries",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "revisiting embased estimation for locally differentially private protocols",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 5736,
    "paper_ids": [
      186
    ],
    "papers_without_artifact_ids": [
      899
    ]
  },
  {
    "name": "Min Zhang 0043",
    "display_name": "Min Zhang",
    "affiliation": "Chinese Academy of Sciences, Institute of Software, Trusted Computing and Information Assurance Laboratory, Beijing, China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enhanced Label-Only Membership Inference Attacks with Fewer Queries",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "revisiting embased estimation for locally differentially private protocols",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 5737,
    "paper_ids": [
      186
    ],
    "papers_without_artifact_ids": [
      899
    ]
  },
  {
    "name": "Dengguo Feng",
    "display_name": "Dengguo Feng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {},
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enhanced Label-Only Membership Inference Attacks with Fewer Queries",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "revisiting embased estimation for locally differentially private protocols",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 5738,
    "paper_ids": [
      186
    ],
    "papers_without_artifact_ids": [
      899
    ]
  },
  {
    "name": "George Pavlides",
    "display_name": "George Pavlides",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More is Less: Extra Features in Contactless Payments Break Security",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5739,
    "paper_ids": [
      5498
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anna Clee",
    "display_name": "Anna Clee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More is Less: Extra Features in Contactless Payments Break Security",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "who pays whom anonymous emvcompliant contactless payments",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 5740,
    "paper_ids": [
      5498
    ],
    "papers_without_artifact_ids": [
      3140
    ]
  },
  {
    "name": "Ioana Boureanu",
    "display_name": "Ioana Boureanu",
    "affiliation": "University of Surrey",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More is Less: Extra Features in Contactless Payments Break Security",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "who pays whom anonymous emvcompliant contactless payments",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "how fast do you heal a taxonomy for postcompromise security in securechannel establishment",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5741,
    "paper_ids": [
      5498
    ],
    "papers_without_artifact_ids": [
      3140,
      3141
    ]
  },
  {
    "name": "Tom Chothia",
    "display_name": "Tom Chothia",
    "affiliation": "University of Birmingham",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "EUROSYS": 0,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "EUROSYS": {},
      "ACSAC": {
        "2017": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More is Less: Extra Features in Contactless Payments Break Security",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "who pays whom anonymous emvcompliant contactless payments",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "traks a universal key management scheme for ertms",
        "conference": "ACSAC",
        "year": 2017
      },
      {
        "title": "spinner semiautomatic detection of pinning without hostname verification",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 5742,
    "paper_ids": [
      5498
    ],
    "papers_without_artifact_ids": [
      3140,
      5317,
      5219
    ]
  },
  {
    "name": "Anish Chand",
    "display_name": "Anish Chand",
    "affiliation": "Louisiana State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Doubly Dangerous: Evading Phishing Reporting Systems by Leveraging Email Tracking Techniques",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5743,
    "paper_ids": [
      1115
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chongqi Guan",
    "display_name": "Chongqi Guan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Cyber-Physical Deception Through Coordinated IoT Honeypots",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5744,
    "paper_ids": [
      5499
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guohong Cao",
    "display_name": "Guohong Cao",
    "affiliation": "Pennsylvania State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Cyber-Physical Deception Through Coordinated IoT Honeypots",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5745,
    "paper_ids": [
      5499
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohamed Suliman 0002",
    "display_name": "Mohamed Suliman",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards a Re-evaluation of Data Forging Attacks in Practice",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5746,
    "paper_ids": [
      3368
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Swanand Ravindra Kadhe",
    "display_name": "Swanand Ravindra Kadhe",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards a Re-evaluation of Data Forging Attacks in Practice",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5747,
    "paper_ids": [
      3368
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nathalie Baracaldo",
    "display_name": "Nathalie Baracaldo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards a Re-evaluation of Data Forging Attacks in Practice",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5748,
    "paper_ids": [
      3368
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Douglas J. Leith",
    "display_name": "Douglas J. Leith",
    "affiliation": "Trinity College Dublin",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards a Re-evaluation of Data Forging Attacks in Practice",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5749,
    "paper_ids": [
      3368
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Torsten Krauß",
    "display_name": "Torsten Krauß",
    "affiliation": "University of Würzburg",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      },
      "NDSS": {
        "2024": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TwinBreak: Jailbreaking LLM Security Alignments based on Twin Prompts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "crowdguard federated backdoor detection in federated learning",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "automatic adversarial adaption for stealthy poisoning attacks in federated learning",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "clearstamp a humanvisible and robust modelownership proof based on transposed model training",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "verify your labels trustworthy predictions and datasets via confidence scores",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 8082,
    "paper_ids": [
      4301
    ],
    "papers_without_artifact_ids": [
      2308,
      4302,
      4304,
      4305
    ]
  },
  {
    "name": "Hamid Dashtbani",
    "display_name": "Hamid Dashtbani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TwinBreak: Jailbreaking LLM Security Alignments based on Twin Prompts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5751,
    "paper_ids": [
      4301
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minghang Li",
    "display_name": "Minghang Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TockOwl: Asynchronous Consensus with Fault and Network Adaptability",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5752,
    "paper_ids": [
      3920
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhipeng Wang 0009",
    "display_name": "Zhipeng Wang",
    "affiliation": "University of Manchester",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TockOwl: Asynchronous Consensus with Fault and Network Adaptability",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5753,
    "paper_ids": [
      3920
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bohang Wei",
    "display_name": "Bohang Wei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TockOwl: Asynchronous Consensus with Fault and Network Adaptability",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5754,
    "paper_ids": [
      3920
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hang Ruan",
    "display_name": "Hang Ruan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TockOwl: Asynchronous Consensus with Fault and Network Adaptability",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "image encryption algorithm based on internet of things technology",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 5755,
    "paper_ids": [
      3920
    ],
    "papers_without_artifact_ids": [
      5500
    ]
  },
  {
    "name": "Shihong Xiong",
    "display_name": "Shihong Xiong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TockOwl: Asynchronous Consensus with Fault and Network Adaptability",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5756,
    "paper_ids": [
      3920
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhenyang Ding",
    "display_name": "Zhenyang Ding",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TockOwl: Asynchronous Consensus with Fault and Network Adaptability",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5757,
    "paper_ids": [
      3920
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zeren Luo",
    "display_name": "Zeren Luo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unsafe LLM-Based Search: Quantitative Analysis and Mitigation of Safety Risks in AI Web Search",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5758,
    "paper_ids": [
      3370
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zifan Peng",
    "display_name": "Zifan Peng",
    "affiliation": "Guangzhou",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unsafe LLM-Based Search: Quantitative Analysis and Mitigation of Safety Risks in AI Web Search",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5759,
    "paper_ids": [
      3370
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yule Liu",
    "display_name": "Yule Liu",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unsafe LLM-Based Search: Quantitative Analysis and Mitigation of Safety Risks in AI Web Search",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5760,
    "paper_ids": [
      3370
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhen Sun 0001",
    "display_name": "Zhen Sun",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unsafe LLM-Based Search: Quantitative Analysis and Mitigation of Safety Risks in AI Web Search",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5761,
    "paper_ids": [
      3370
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingchen Li",
    "display_name": "Mingchen Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unsafe LLM-Based Search: Quantitative Analysis and Mitigation of Safety Risks in AI Web Search",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5762,
    "paper_ids": [
      3370
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shubham Agarwal 0006",
    "display_name": "Shubham Agarwal",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I have no idea how to make it safer\": Studying Security and Privacy Mindsets of Browser Extension Developers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5763,
    "paper_ids": [
      1186
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rafael Mrowczynski",
    "display_name": "Rafael Mrowczynski",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I have no idea how to make it safer\": Studying Security and Privacy Mindsets of Browser Extension Developers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the unusual suspects studying reasons for lacking updates in wordpress",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "to cloud or not to cloud a qualitative study on selfhosters motivation operation and security mindset",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5764,
    "paper_ids": [
      1186
    ],
    "papers_without_artifact_ids": [
      1187,
      1832
    ]
  },
  {
    "name": "Maria Hellenthal",
    "display_name": "Maria Hellenthal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I have no idea how to make it safer\": Studying Security and Privacy Mindsets of Browser Extension Developers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the unusual suspects studying reasons for lacking updates in wordpress",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 5765,
    "paper_ids": [
      1186
    ],
    "papers_without_artifact_ids": [
      1187
    ]
  },
  {
    "name": "Nureddin Kamadan",
    "display_name": "Nureddin Kamadan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5766,
    "paper_ids": [
      1502
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Feng Qian 0006",
    "display_name": "Feng Qian",
    "affiliation": "Nankai University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RollingEvidence: Autoregressive Video Evidence via Rolling Shutter Effect",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5767,
    "paper_ids": [
      3598
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lingfeng Zhang 0004",
    "display_name": "Lingfeng Zhang",
    "affiliation": "Ant Group, Hangzhou, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RollingEvidence: Autoregressive Video Evidence via Rolling Shutter Effect",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5768,
    "paper_ids": [
      3598
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shiqi Xu",
    "display_name": "Shiqi Xu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RollingEvidence: Autoregressive Video Evidence via Rolling Shutter Effect",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5769,
    "paper_ids": [
      3598
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhijun Yu",
    "display_name": "Zhijun Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RollingEvidence: Autoregressive Video Evidence via Rolling Shutter Effect",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5770,
    "paper_ids": [
      3598
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuke Hu",
    "display_name": "Yuke Hu",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Membership Inference Attacks Against Vision-Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5771,
    "paper_ids": [
      187
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhihao Liu",
    "display_name": "Zhihao Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Membership Inference Attacks Against Vision-Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5772,
    "paper_ids": [
      187
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiping Yu",
    "display_name": "Jiping Yu",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GraphAce: Secure Two-Party Graph Analysis Achieving Communication Efficiency",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5773,
    "paper_ids": [
      2816
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kun Chen 0004",
    "display_name": "Kun Chen",
    "affiliation": "University of Virginia",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GraphAce: Secure Two-Party Graph Analysis Achieving Communication Efficiency",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5774,
    "paper_ids": [
      2816
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunyi Chen 0001",
    "display_name": "Yunyi Chen",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GraphAce: Secure Two-Party Graph Analysis Achieving Communication Efficiency",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5775,
    "paper_ids": [
      2816
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaoyu Fan",
    "display_name": "Xiaoyu Fan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GraphAce: Secure Two-Party Graph Analysis Achieving Communication Efficiency",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5776,
    "paper_ids": [
      2816
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Longxiang Wang",
    "display_name": "Longxiang Wang",
    "affiliation": "City University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ALERT: Machine Learning-Enhanced Risk Estimation for Databases Supporting Encrypted Queries",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5777,
    "paper_ids": [
      2523
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lei Xu 0019",
    "display_name": "Lei Xu",
    "affiliation": "Nanjing University of Science and Technology, School of Science, China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ALERT: Machine Learning-Enhanced Risk Estimation for Databases Supporting Encrypted Queries",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "boomerang metadataprivate messaging under hardware trust",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 5778,
    "paper_ids": [
      2523
    ],
    "papers_without_artifact_ids": [
      319
    ]
  },
  {
    "name": "Yufei Chen 0001",
    "display_name": "Yufei Chen",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ALERT: Machine Learning-Enhanced Risk Estimation for Databases Supporting Encrypted Queries",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "teacher model fingerprinting attacks against transfer learning",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5779,
    "paper_ids": [
      2523
    ],
    "papers_without_artifact_ids": [
      207
    ]
  },
  {
    "name": "Ying Zou 0029",
    "display_name": "Ying Zou",
    "affiliation": "Nanjing University of Science and Technology, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ALERT: Machine Learning-Enhanced Risk Estimation for Databases Supporting Encrypted Queries",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5780,
    "paper_ids": [
      2523
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shaowei Wang 0003",
    "display_name": "Shaowei Wang",
    "affiliation": "Guangzhou University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Beyond Statistical Estimation: Differentially Private Individual Computation via Shuffling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5781,
    "paper_ids": [
      3048
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jin Li 0002",
    "display_name": "Jin Li",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Beyond Statistical Estimation: Differentially Private Individual Computation via Shuffling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "birds of a feather flock together how set bias helps to deanonymize you via revealed intersection sizes",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "how to make private distributed cardinality estimation practical and get differential privacy for free",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5782,
    "paper_ids": [
      3048
    ],
    "papers_without_artifact_ids": [
      3886,
      3373
    ]
  },
  {
    "name": "Zhili Zhou 0001",
    "display_name": "Zhili Zhou",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Beyond Statistical Estimation: Differentially Private Individual Computation via Shuffling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5783,
    "paper_ids": [
      3048
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Han Wu",
    "display_name": "Han Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Beyond Statistical Estimation: Differentially Private Individual Computation via Shuffling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5784,
    "paper_ids": [
      3048
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiaxu Zhao 0004",
    "display_name": "Jiaxu Zhao",
    "affiliation": "Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "leveraging semantic relations in code and data to enhance taint analysis of embedded systems",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5785,
    "paper_ids": [
      3364
    ],
    "papers_without_artifact_ids": [
      3366
    ]
  },
  {
    "name": "Naijia Jiang",
    "display_name": "Naijia Jiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5786,
    "paper_ids": [
      3364
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nanyu Zhong",
    "display_name": "Nanyu Zhong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "leveraging semantic relations in code and data to enhance taint analysis of embedded systems",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5787,
    "paper_ids": [
      3364
    ],
    "papers_without_artifact_ids": [
      3366
    ]
  },
  {
    "name": "Bingwei Peng",
    "display_name": "Bingwei Peng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "leveraging semantic relations in code and data to enhance taint analysis of embedded systems",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5788,
    "paper_ids": [
      3364
    ],
    "papers_without_artifact_ids": [
      3366
    ]
  },
  {
    "name": "Kunpeng Jian",
    "display_name": "Kunpeng Jian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "srfuzzer an automatic fuzzing framework for physical soho router devices to discover multitype vulnerabilities",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 5789,
    "paper_ids": [
      3364
    ],
    "papers_without_artifact_ids": [
      1901
    ]
  },
  {
    "name": "Kunpeng Zhang",
    "display_name": "Kunpeng Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input Generators",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "shapfuzz efficient fuzzing via shapleyguided byte selection",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5790,
    "paper_ids": [
      950
    ],
    "papers_without_artifact_ids": [
      1576
    ]
  },
  {
    "name": "Xin Xia 0001",
    "display_name": "Xin Xia",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input Generators",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5791,
    "paper_ids": [
      950
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tiantian Gong",
    "display_name": "Tiantian Gong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Recover from Excessive Faults in Partially-Synchronous BFT SMR",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "frontrunning attack in sharded blockchains and fair crossshard consensus",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5792,
    "paper_ids": [
      2573
    ],
    "papers_without_artifact_ids": [
      2577
    ]
  },
  {
    "name": "Gustavo Franco Camilo",
    "display_name": "Gustavo Franco Camilo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Recover from Excessive Faults in Partially-Synchronous BFT SMR",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5793,
    "paper_ids": [
      2573
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kartik Nayak",
    "display_name": "Kartik Nayak",
    "affiliation": "Duke University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Recover from Excessive Faults in Partially-Synchronous BFT SMR",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "private proofofstake blockchains using differentiallyprivate stake distortion",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5794,
    "paper_ids": [
      2573
    ],
    "papers_without_artifact_ids": [
      5501
    ]
  },
  {
    "name": "Andrew Lewis-Pye",
    "display_name": "Andrew Lewis-Pye",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Recover from Excessive Faults in Partially-Synchronous BFT SMR",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5795,
    "paper_ids": [
      2573
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jost Rossel",
    "display_name": "Jost Rossel",
    "affiliation": "Paderborn University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Security Implications of Malicious G-Codes in 3D Printing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5796,
    "paper_ids": [
      958
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nico Wördenweber",
    "display_name": "Nico Wördenweber",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Security Implications of Malicious G-Codes in 3D Printing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8083,
    "paper_ids": [
      958
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seung Ho Na",
    "display_name": "Seung Ho Na",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2021": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "closing the loophole rethinking reconstruction attacks in federated learning from a privacy standpoint",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "reinhardt realtime reconfigurable hardware architecture for regular expression matching in dpi",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 5798,
    "paper_ids": [
      4336
    ],
    "papers_without_artifact_ids": [
      4340,
      4341
    ]
  },
  {
    "name": "Kimin Lee",
    "display_name": "Kimin Lee",
    "affiliation": "KAIST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5799,
    "paper_ids": [
      4336
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Klim Kireev",
    "display_name": "Klim Kireev",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Characterizing and Detecting Propaganda-Spreading Accounts on Telegram",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5800,
    "paper_ids": [
      968
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yevhen Mykhno",
    "display_name": "Yevhen Mykhno",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Characterizing and Detecting Propaganda-Spreading Accounts on Telegram",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5801,
    "paper_ids": [
      968
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rebekah Overdorf",
    "display_name": "Rebekah Overdorf",
    "affiliation": "Ruhr-University Bochum",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Characterizing and Detecting Propaganda-Spreading Accounts on Telegram",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5802,
    "paper_ids": [
      968
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael McLoughlin",
    "display_name": "Michael McLoughlin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards Practical, End-to-End Formally Verified X.509 Certificate Validators with Verdict",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5803,
    "paper_ids": [
      717
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rory Brennan-Jones",
    "display_name": "Rory Brennan-Jones",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards Practical, End-to-End Formally Verified X.509 Certificate Validators with Verdict",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5804,
    "paper_ids": [
      717
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Paul Hitchcox",
    "display_name": "Paul Hitchcox",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Towards Practical, End-to-End Formally Verified X.509 Certificate Validators with Verdict",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5805,
    "paper_ids": [
      717
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xueqian Lu",
    "display_name": "Xueqian Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5806,
    "paper_ids": [
      3187
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Avital Shafran",
    "display_name": "Avital Shafran",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5807,
    "paper_ids": [
      1842
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lushan Song",
    "display_name": "Lushan Song",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5808,
    "paper_ids": [
      3323
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qizhi Zhang 0007",
    "display_name": "Qizhi Zhang",
    "affiliation": "ByteDance Inc., Shenzhen, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5809,
    "paper_ids": [
      3323
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu Lin",
    "display_name": "Yu Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5810,
    "paper_ids": [
      3323
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haoyu Niu",
    "display_name": "Haoyu Niu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5811,
    "paper_ids": [
      3323
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daode Zhang",
    "display_name": "Daode Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5812,
    "paper_ids": [
      3323
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zheng Qu",
    "display_name": "Zheng Qu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5813,
    "paper_ids": [
      3323
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jue Hong",
    "display_name": "Jue Hong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5814,
    "paper_ids": [
      3323
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Quanwei Cai 0003",
    "display_name": "Quanwei Cai",
    "affiliation": "Bytedance Inc., Security Research",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5815,
    "paper_ids": [
      3323
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haolin Wu 0001",
    "display_name": "Haolin Wu",
    "affiliation": "Boğaziçi University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5816,
    "paper_ids": [
      734
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chang Liu 0089",
    "display_name": "Chang Liu",
    "affiliation": "University of Science and Technology of China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "detecting voice cloning attacks via timbre watermarking",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5817,
    "paper_ids": [
      734
    ],
    "papers_without_artifact_ids": [
      740
    ]
  },
  {
    "name": "Ruiying Du",
    "display_name": "Ruiying Du",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "formal analysis and patching of blesc pairing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "liveness is not enough enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5818,
    "paper_ids": [
      734
    ],
    "papers_without_artifact_ids": [
      4436,
      1425
    ]
  },
  {
    "name": "Yu Zhang 0036",
    "display_name": "Yu Zhang",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5819,
    "paper_ids": [
      734
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qing Guo 0005",
    "display_name": "Qing Guo",
    "affiliation": "Nankai University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diffloc wifi hidden camera localization based on electromagnetic diffraction",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 5820,
    "paper_ids": [
      734
    ],
    "papers_without_artifact_ids": [
      738
    ]
  },
  {
    "name": "Jie Zhang 0073",
    "display_name": "Jie Zhang",
    "affiliation": "A*STAR, CFAR, Singapore",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 3
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the ghost navigator revisiting the hidden vulnerability of localization in autonomous driving",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "diffloc wifi hidden camera localization based on electromagnetic diffraction",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "detecting voice cloning attacks via timbre watermarking",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5821,
    "paper_ids": [
      734
    ],
    "papers_without_artifact_ids": [
      737,
      738,
      740
    ]
  },
  {
    "name": "Tuan Dinh Hoang",
    "display_name": "Tuan Dinh Hoang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5822,
    "paper_ids": [
      2332
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Taekkyung Oh",
    "display_name": "Taekkyung Oh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "void a fast and light voice liveness detection system",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5823,
    "paper_ids": [
      2332
    ],
    "papers_without_artifact_ids": [
      1128
    ]
  },
  {
    "name": "Yuhui Zhu",
    "display_name": "Yuhui Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Exploiting Inaccurate Branch History in Side-Channel Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5824,
    "paper_ids": [
      5502
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alessandro Biondi 0001",
    "display_name": "Alessandro Biondi",
    "affiliation": "Scuola Superiore Sant'Anna",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Exploiting Inaccurate Branch History in Side-Channel Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5825,
    "paper_ids": [
      5502
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Saiid El Hajj Chehade",
    "display_name": "Saiid El Hajj Chehade",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Double-Edged Shield: On the Fingerprintability of Customized Ad Blockers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5826,
    "paper_ids": [
      969
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Pape",
    "display_name": "David Pape",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Prompt Obfuscation for Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5827,
    "paper_ids": [
      3266
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sina Mavali",
    "display_name": "Sina Mavali",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Prompt Obfuscation for Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5828,
    "paper_ids": [
      3266
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei Peng",
    "display_name": "Wei Peng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Shadows in Cipher Spaces: Exploiting Tweak Repetition in Hardware Memory Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5829,
    "paper_ids": [
      367
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yinshuai Li",
    "display_name": "Yinshuai Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Shadows in Cipher Spaces: Exploiting Tweak Repetition in Hardware Memory Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5830,
    "paper_ids": [
      367
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yushu Zhang 0001",
    "display_name": "Yushu Zhang",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Atkscopes: Multiresolution Adversarial Perturbation as a Unified Attack on Perceptual Hashing and Beyond",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5831,
    "paper_ids": [
      4363
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuanyuan Sun",
    "display_name": "Yuanyuan Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {},
      "FAST": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Atkscopes: Multiresolution Adversarial Perturbation as a Unified Attack on Perceptual Hashing and Beyond",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hotring a hotspotaware inmemory keyvalue store",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 5832,
    "paper_ids": [
      4363
    ],
    "papers_without_artifact_ids": [
      5503
    ]
  },
  {
    "name": "Shuren Qi",
    "display_name": "Shuren Qi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Atkscopes: Multiresolution Adversarial Perturbation as a Unified Attack on Perceptual Hashing and Beyond",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5833,
    "paper_ids": [
      4363
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenying Wen",
    "display_name": "Wenying Wen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Atkscopes: Multiresolution Adversarial Perturbation as a Unified Attack on Perceptual Hashing and Beyond",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5834,
    "paper_ids": [
      4363
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuming Fang",
    "display_name": "Yuming Fang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Atkscopes: Multiresolution Adversarial Perturbation as a Unified Attack on Perceptual Hashing and Beyond",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5835,
    "paper_ids": [
      4363
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jelle Vos",
    "display_name": "Jelle Vos",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficient Batchable Secure Outsourced Computation: Depth-Aware Arithmetization of Common Primitives for BFV & BGV",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacypreserving membership queries for federated anomaly detection",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 5836,
    "paper_ids": [
      1131
    ],
    "papers_without_artifact_ids": [
      4438
    ]
  },
  {
    "name": "Catherine Han",
    "display_name": "Catherine Han",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Characterizing the MrDeepFakes Sexual Deepfake Marketplace",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the price is not right comparing privacy in free and paid apps",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 5837,
    "paper_ids": [
      3330
    ],
    "papers_without_artifact_ids": [
      3928
    ]
  },
  {
    "name": "Anne Li",
    "display_name": "Anne Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Characterizing the MrDeepFakes Sexual Deepfake Marketplace",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5838,
    "paper_ids": [
      3330
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Deepak Kumar 0006",
    "display_name": "Deepak Kumar",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Characterizing the MrDeepFakes Sexual Deepfake Marketplace",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "designing toxic content classification for a diversity of perspectives",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5839,
    "paper_ids": [
      3330
    ],
    "papers_without_artifact_ids": [
      3333
    ]
  },
  {
    "name": "Jabari Kwesi",
    "display_name": "Jabari Kwesi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploring User Security and Privacy Attitudes and Concerns Toward the Use of General-Purpose LLM Chatbots for Mental Health",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5840,
    "paper_ids": [
      3262
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiaxun Cao",
    "display_name": "Jiaxun Cao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploring User Security and Privacy Attitudes and Concerns Toward the Use of General-Purpose LLM Chatbots for Mental Health",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5841,
    "paper_ids": [
      3262
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Riya Manchanda",
    "display_name": "Riya Manchanda",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploring User Security and Privacy Attitudes and Concerns Toward the Use of General-Purpose LLM Chatbots for Mental Health",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5842,
    "paper_ids": [
      3262
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu Nong",
    "display_name": "Yu Nong",
    "affiliation": "University at Buffalo",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "APPATCH: Automated Adaptive Prompting Large Language Models for Real-World Software Vulnerability Patching",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5843,
    "paper_ids": [
      1203
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haoran Yang 0002",
    "display_name": "Haoran Yang",
    "affiliation": "Washington State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "APPATCH: Automated Adaptive Prompting Large Language Models for Real-World Software Vulnerability Patching",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5844,
    "paper_ids": [
      1203
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chuhan Wang",
    "display_name": "Chuhan Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2024": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "reqsminer automated discovery of cdn forwarding request inconsistencies and dos attacks with grammarbased fuzzing",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "breakspf how shared infrastructures magnify spf vulnerabilities across the internet",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "a largescale and longitudinal measurement study of dkim deployment",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "weak links in authentication chains a largescale analysis of email sender spoofing attacks",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5845,
    "paper_ids": [
      903
    ],
    "papers_without_artifact_ids": [
      908,
      910,
      917,
      259
    ]
  },
  {
    "name": "Chenkai Wang 0001",
    "display_name": "Chenkai Wang",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "true attacks attack attempts or benign triggers an empirical measurement of network alerts in a security operations center",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5846,
    "paper_ids": [
      903
    ],
    "papers_without_artifact_ids": [
      1531
    ]
  },
  {
    "name": "Songyi Yang",
    "display_name": "Songyi Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5847,
    "paper_ids": [
      903
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sophia Liu",
    "display_name": "Sophia Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5848,
    "paper_ids": [
      903
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simeon Hoffmann",
    "display_name": "Simeon Hoffmann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5849,
    "paper_ids": [
      109
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Moritz Bley",
    "display_name": "Moritz Bley",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5850,
    "paper_ids": [
      109
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuqin Yan",
    "display_name": "Yuqin Yan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Relocate-Vote: Using Sparsity Information to Exploit Ciphertext Side-Channels",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "stream processing with adaptive edgeenhanced confidential computing",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 5851,
    "paper_ids": [
      1687
    ],
    "papers_without_artifact_ids": [
      1690
    ]
  },
  {
    "name": "Wei Huang 0027",
    "display_name": "Wei Huang",
    "affiliation": "University of Toronto",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Relocate-Vote: Using Sparsity Information to Exploit Ciphertext Side-Channels",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "stream processing with adaptive edgeenhanced confidential computing",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 5852,
    "paper_ids": [
      1687
    ],
    "papers_without_artifact_ids": [
      1690
    ]
  },
  {
    "name": "Marvin Kowalewski",
    "display_name": "Marvin Kowalewski",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scanned and Scammed: Insecurity by ObsQRity? Measuring User Susceptibility and Awareness of QR Code-Based Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "proofofvax studying user preferences and perception of covid vaccination certificates",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "fast easy convenient studying adoption and perception of digital covid certificates",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5853,
    "paper_ids": [
      4439
    ],
    "papers_without_artifact_ids": [
      4440,
      4442
    ]
  },
  {
    "name": "Leona Lassak",
    "display_name": "Leona Lassak",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2022": 2,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scanned and Scammed: Insecurity by ObsQRity? Measuring User Susceptibility and Awareness of QR Code-Based Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "balancing privacy and data utilization a comparative vignette study on user acceptance of data trustees in germany and the us",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "why arent we using passkeys obstacles companies face deploying fido2 passwordless authentication",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "fast easy convenient studying adoption and perception of digital covid certificates",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "exploring user authentication with windows hello in a small business environment",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "its stored hopefully on an encrypted server mitigating users misconceptions about fido2 biometric webauthn",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5854,
    "paper_ids": [
      4439
    ],
    "papers_without_artifact_ids": [
      5504,
      5458,
      4442,
      5505,
      5460
    ]
  },
  {
    "name": "Markus Dürmuth",
    "display_name": "Markus Dürmuth",
    "affiliation": "University of Hannover",
    "artifact_count": 1,
    "total_papers": 11,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "ACSAC": 1,
      "PETS": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2022": 3,
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "PETS": {
        "2022": 1,
        "2021": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 9.1,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scanned and Scammed: Insecurity by ObsQRity? Measuring User Susceptibility and Awareness of QR Code-Based Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "balancing privacy and data utilization a comparative vignette study on user acceptance of data trustees in germany and the us",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "batman hacked my password a subtitlebased analysis of password depiction in movies",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "proofofvax studying user preferences and perception of covid vaccination certificates",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "as soon as its a risk i want to require mfa how administrators configure riskbased authentication",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "fast easy convenient studying adoption and perception of digital covid certificates",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "exploring user authentication with windows hello in a small business environment",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "sok managing longitudinal privacy of publicly shared personal online data",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "are privacy dashboards good for end users evaluating user perceptions and reactions to googles my activity",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "more than just good passwords a study on usability and security perceptions of riskbased authentication",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "you still use the password after all exploring fido2 security keys in a small company",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 8084,
    "paper_ids": [
      4439
    ],
    "papers_without_artifact_ids": [
      5504,
      5506,
      4440,
      4441,
      4442,
      5505,
      3082,
      877,
      5507,
      4443
    ]
  },
  {
    "name": "Danlei Xiao",
    "display_name": "Danlei Xiao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Parallelizing Universal Atomic Swaps for Multi-Chain Cryptocurrency Exchanges",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5856,
    "paper_ids": [
      3107
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chuan Zhang 0003",
    "display_name": "Chuan Zhang",
    "affiliation": "Beijing Institute of Technology, Beijing, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Parallelizing Universal Atomic Swaps for Multi-Chain Cryptocurrency Exchanges",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5857,
    "paper_ids": [
      3107
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haotian Deng",
    "display_name": "Haotian Deng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Parallelizing Universal Atomic Swaps for Multi-Chain Cryptocurrency Exchanges",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5858,
    "paper_ids": [
      3107
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinwen Liang",
    "display_name": "Jinwen Liang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Parallelizing Universal Atomic Swaps for Multi-Chain Cryptocurrency Exchanges",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5859,
    "paper_ids": [
      3107
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Licheng Wang",
    "display_name": "Licheng Wang",
    "affiliation": "BUPT",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Parallelizing Universal Atomic Swaps for Multi-Chain Cryptocurrency Exchanges",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5860,
    "paper_ids": [
      3107
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lan Gao 0001",
    "display_name": "Lan Gao",
    "affiliation": "University of Chicago",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I Cannot Write This Because It Violates Our Content Policy\": Understanding Content Moderation Policies and User Experiences in Generative AI Products",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploring design opportunities for familybased privacy education in informal learning spaces",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "i dont know if were doing good i dont know if were doing bad investigating how practitioners scope motivate and conduct privacy work when developing ai products",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5861,
    "paper_ids": [
      3377
    ],
    "papers_without_artifact_ids": [
      5508,
      5509
    ]
  },
  {
    "name": "Oscar Chen",
    "display_name": "Oscar Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I Cannot Write This Because It Violates Our Content Policy\": Understanding Content Moderation Policies and User Experiences in Generative AI Products",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5862,
    "paper_ids": [
      3377
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rachel Lee",
    "display_name": "Rachel Lee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I Cannot Write This Because It Violates Our Content Policy\": Understanding Content Moderation Policies and User Experiences in Generative AI Products",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5863,
    "paper_ids": [
      3377
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chenhao Tan",
    "display_name": "Chenhao Tan",
    "affiliation": "University of Chicago",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I Cannot Write This Because It Violates Our Content Policy\": Understanding Content Moderation Policies and User Experiences in Generative AI Products",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5864,
    "paper_ids": [
      3377
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marshini Chetty",
    "display_name": "Marshini Chetty",
    "affiliation": "University of Chicago",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2022": 2,
        "2025": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"I Cannot Write This Because It Violates Our Content Policy\": Understanding Content Moderation Policies and User Experiences in Generative AI Products",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a survey of cybersecurity professionals perceptions and experiences of safety and belonging in the community",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "how and why people use virtual private networks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "investigating how university students in the united states encounter and deal with misinformation in private whatsapp chats during covid19",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "i have too much respect for my elders understanding south african mobile users perceptions of privacy and current behaviors on facebook and whatsapp",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 5865,
    "paper_ids": [
      3377
    ],
    "papers_without_artifact_ids": [
      1270,
      3381,
      5510,
      5511
    ]
  },
  {
    "name": "Wei-Che Kao",
    "display_name": "Wei-Che Kao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BLuEMan: A Stateful Simulation-based Fuzzing Framework for Open-Source RTOS Bluetooth Low Energy Protocol Stacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5866,
    "paper_ids": [
      5512
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yen-Chia Chen",
    "display_name": "Yen-Chia Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BLuEMan: A Stateful Simulation-based Fuzzing Framework for Open-Source RTOS Bluetooth Low Energy Protocol Stacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5867,
    "paper_ids": [
      5512
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu-Sheng Lin",
    "display_name": "Yu-Sheng Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BLuEMan: A Stateful Simulation-based Fuzzing Framework for Open-Source RTOS Bluetooth Low Energy Protocol Stacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5868,
    "paper_ids": [
      5512
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu-Cheng Yang",
    "display_name": "Yu-Cheng Yang",
    "affiliation": "Yale University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BLuEMan: A Stateful Simulation-based Fuzzing Framework for Open-Source RTOS Bluetooth Low Energy Protocol Stacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5869,
    "paper_ids": [
      5512
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chi-Yu Li 0001",
    "display_name": "Chi-Yu Li",
    "affiliation": "National Chiao Tung University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BLuEMan: A Stateful Simulation-based Fuzzing Framework for Open-Source RTOS Bluetooth Low Energy Protocol Stacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5870,
    "paper_ids": [
      5512
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chun-Ying Huang",
    "display_name": "Chun-Ying Huang",
    "affiliation": "National Chiao Tung University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BLuEMan: A Stateful Simulation-based Fuzzing Framework for Open-Source RTOS Bluetooth Low Energy Protocol Stacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5871,
    "paper_ids": [
      5512
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hany Ragab",
    "display_name": "Hany Ragab",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ghostrace exploiting and mitigating speculative race conditions",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "rage against the machine clear a systematic analysis of machine clears and their implications for transient execution attacks",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5872,
    "paper_ids": [
      90
    ],
    "papers_without_artifact_ids": [
      92,
      95
    ]
  },
  {
    "name": "Wenhao Wu",
    "display_name": "Wenhao Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Lemon: Network-Wide DDoS Detection with Routing-Oblivious Per-Flow Measurement",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5873,
    "paper_ids": [
      5513
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhenyu Li 0001",
    "display_name": "Zhenyu Li",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {},
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Lemon: Network-Wide DDoS Detection with Routing-Oblivious Per-Flow Measurement",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hoda a highperformance open vswitch dataplane with multiple specialized data paths",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "tecc towards efficient quic tunneling via collaborative transmission control",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 5874,
    "paper_ids": [
      5513
    ],
    "papers_without_artifact_ids": [
      5514,
      5515
    ]
  },
  {
    "name": "Xilai Liu",
    "display_name": "Xilai Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Lemon: Network-Wide DDoS Detection with Routing-Oblivious Per-Flow Measurement",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5875,
    "paper_ids": [
      5513
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhaohua Wang",
    "display_name": "Zhaohua Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Lemon: Network-Wide DDoS Detection with Routing-Oblivious Per-Flow Measurement",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5876,
    "paper_ids": [
      5513
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Heng Pan",
    "display_name": "Heng Pan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Lemon: Network-Wide DDoS Detection with Routing-Oblivious Per-Flow Measurement",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hoda a highperformance open vswitch dataplane with multiple specialized data paths",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 5877,
    "paper_ids": [
      5513
    ],
    "papers_without_artifact_ids": [
      5514
    ]
  },
  {
    "name": "Guangxing Zhang",
    "display_name": "Guangxing Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Lemon: Network-Wide DDoS Detection with Routing-Oblivious Per-Flow Measurement",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5878,
    "paper_ids": [
      5513
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gaogang Xie",
    "display_name": "Gaogang Xie",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {},
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Lemon: Network-Wide DDoS Detection with Routing-Oblivious Per-Flow Measurement",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "from address blocks to authorized prefixes redesigning rpki rov with a hierarchical hashing scheme for fast and memoryefficient validation",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "hoda a highperformance open vswitch dataplane with multiple specialized data paths",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 5879,
    "paper_ids": [
      5513
    ],
    "papers_without_artifact_ids": [
      5516,
      5514
    ]
  },
  {
    "name": "Tianchang Yang",
    "display_name": "Tianchang Yang",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oranalyst systematic testing framework for open ran implementations",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5880,
    "paper_ids": [
      2295
    ],
    "papers_without_artifact_ids": [
      2167
    ]
  },
  {
    "name": "Ali Ranjbar",
    "display_name": "Ali Ranjbar",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oranalyst systematic testing framework for open ran implementations",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "hermes unlocking security analysis of cellular network protocols by synthesizing finite state machines from natural language specifications",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5881,
    "paper_ids": [
      2295
    ],
    "papers_without_artifact_ids": [
      2167,
      2298
    ]
  },
  {
    "name": "Md. Sultan Mahmud",
    "display_name": "Md. Sultan Mahmud",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5882,
    "paper_ids": [
      2295
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weizhi Shao",
    "display_name": "Weizhi Shao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Framework for Designing Provably Secure Steganography",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5883,
    "paper_ids": [
      4428
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yaofei Wang",
    "display_name": "Yaofei Wang",
    "affiliation": "Hefei University of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5884,
    "paper_ids": [
      5517
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gang Pei",
    "display_name": "Gang Pei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5885,
    "paper_ids": [
      5517
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kejiang Chen",
    "display_name": "Kejiang Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diffloc wifi hidden camera localization based on electromagnetic diffraction",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 5886,
    "paper_ids": [
      5517
    ],
    "papers_without_artifact_ids": [
      738
    ]
  },
  {
    "name": "Jinyang Ding",
    "display_name": "Jinyang Ding",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5887,
    "paper_ids": [
      5517
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chao Pan",
    "display_name": "Chao Pan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5888,
    "paper_ids": [
      5517
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weilong Pang",
    "display_name": "Weilong Pang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5889,
    "paper_ids": [
      5517
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Donghui Hu",
    "display_name": "Donghui Hu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5890,
    "paper_ids": [
      5517
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weiming Zhang 0001",
    "display_name": "Weiming Zhang",
    "affiliation": "USTC",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the ghost navigator revisiting the hidden vulnerability of localization in autonomous driving",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "detecting voice cloning attacks via timbre watermarking",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5891,
    "paper_ids": [
      5517
    ],
    "papers_without_artifact_ids": [
      737,
      740
    ]
  },
  {
    "name": "Anubhav Bhatla",
    "display_name": "Anubhav Bhatla",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: So, You Think You Know All About Secure Randomized Caches?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5892,
    "paper_ids": [
      5518
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hari Rohit Bhavsar",
    "display_name": "Hari Rohit Bhavsar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: So, You Think You Know All About Secure Randomized Caches?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5893,
    "paper_ids": [
      5518
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sayandeep Saha",
    "display_name": "Sayandeep Saha",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "CHES": {
        "2024": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: So, You Think You Know All About Secure Randomized Caches?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "systematic evaluation of randomized cache designs against cache occupancy",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "prime masking vs faults exponential security amplification against selected classes of attacks",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "carry your fault a fault propagation attack on sidechannel protected lwebased kem",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 5894,
    "paper_ids": [
      5518
    ],
    "papers_without_artifact_ids": [
      2384,
      2391,
      1798
    ]
  },
  {
    "name": "Biswabandan Panda",
    "display_name": "Biswabandan Panda",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: So, You Think You Know All About Secure Randomized Caches?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5895,
    "paper_ids": [
      5518
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Armin Sarabi",
    "display_name": "Armin Sarabi",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Ransomware Decade: The Creation of a Fine-Grained Dataset and a Longitudinal Study",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5896,
    "paper_ids": [
      5519
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ziyuan Huang 0004",
    "display_name": "Ziyuan Huang",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Ransomware Decade: The Creation of a Fine-Grained Dataset and a Longitudinal Study",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5897,
    "paper_ids": [
      5519
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chenlan Wang 0001",
    "display_name": "Chenlan Wang",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Ransomware Decade: The Creation of a Fine-Grained Dataset and a Longitudinal Study",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5898,
    "paper_ids": [
      5519
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tai Karir",
    "display_name": "Tai Karir",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Ransomware Decade: The Creation of a Fine-Grained Dataset and a Longitudinal Study",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5899,
    "paper_ids": [
      5519
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingyan Liu",
    "display_name": "Mingyan Liu",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Ransomware Decade: The Creation of a Fine-Grained Dataset and a Longitudinal Study",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5900,
    "paper_ids": [
      5519
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xinhui Shao",
    "display_name": "Xinhui Shao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ldr secure and efficient linux driver runtime for embedded tee systems",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5901,
    "paper_ids": [
      1875
    ],
    "papers_without_artifact_ids": [
      2475
    ]
  },
  {
    "name": "Huaiyu Yan",
    "display_name": "Huaiyu Yan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ldr secure and efficient linux driver runtime for embedded tee systems",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5902,
    "paper_ids": [
      1875
    ],
    "papers_without_artifact_ids": [
      2475
    ]
  },
  {
    "name": "Yumeng Wei",
    "display_name": "Yumeng Wei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5903,
    "paper_ids": [
      1875
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lan Luo",
    "display_name": "Lan Luo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ldr secure and efficient linux driver runtime for embedded tee systems",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 5904,
    "paper_ids": [
      1875
    ],
    "papers_without_artifact_ids": [
      2475
    ]
  },
  {
    "name": "Zixia Liu",
    "display_name": "Zixia Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5905,
    "paper_ids": [
      1875
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Filipo Sharevski",
    "display_name": "Filipo Sharevski",
    "affiliation": "DePaul University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "\"Helps me Take the Post With a Grain of Salt: \" Soft Moderation Effects on Accuracy Perceptions and Sharing Intentions of Inauthentic Political Content on X",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "assessing suspicious emails with banner warnings among blind and lowvision users in realistic settings",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "designing and conducting usability research on social media misinformation with low vision or blind users",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5906,
    "paper_ids": [
      5520
    ],
    "papers_without_artifact_ids": [
      5521,
      5522
    ]
  },
  {
    "name": "Verena Distler",
    "display_name": "Verena Distler",
    "affiliation": "Aalto University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "\"Helps me Take the Post With a Grain of Salt: \" Soft Moderation Effects on Accuracy Perceptions and Sharing Intentions of Inauthentic Political Content on X",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "what motivates and discourages employees in phishing interventions an exploration of expectancyvalue theory",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5907,
    "paper_ids": [
      5520
    ],
    "papers_without_artifact_ids": [
      3938
    ]
  },
  {
    "name": "Florian Alt",
    "display_name": "Florian Alt",
    "affiliation": "LMU Munich",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "\"Helps me Take the Post With a Grain of Salt: \" Soft Moderation Effects on Accuracy Perceptions and Sharing Intentions of Inauthentic Political Content on X",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i do not need that feature understanding users awareness and control of privacy permissions on android smartphones",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5908,
    "paper_ids": [
      5520
    ],
    "papers_without_artifact_ids": [
      5523
    ]
  },
  {
    "name": "Guilhem Lacombe",
    "display_name": "Guilhem Lacombe",
    "affiliation": "VERIMAG, Université Grenoble-Alpes",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Attacker Control and Bug Prioritization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5909,
    "paper_ids": [
      4268
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aakanksha Saha",
    "display_name": "Aakanksha Saha",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5910,
    "paper_ids": [
      2279
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Doguhan Yeke",
    "display_name": "Doguhan Yeke",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5911,
    "paper_ids": [
      1732
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kartik Anand Pant",
    "display_name": "Kartik Anand Pant",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5912,
    "paper_ids": [
      1732
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muslum Ozgur Ozmen",
    "display_name": "Muslum Ozgur Ozmen",
    "affiliation": "Arizona State University",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "PETS": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 3,
        "2022": 1,
        "2025": 1
      },
      "PETS": {
        "2025": 1,
        "2024": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 11.1,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "why am i seeing double an investigation of device management flaws in voice assistant platforms",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "the dark side of ecommerce dropshipping abuse as a business model",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "physical sidechannel attacks against intermittent devices",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "sain improving ics attack detection sensitivity via stateaware invariants",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "patchverif discovering faulty patches in robotic vehicles",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "discovering adversarial driving maneuvers against autonomous vehicles",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "zbcan a zerobyte can defense system",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "behind the tube exploitative monetization of content on youtube",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5913,
    "paper_ids": [
      1732
    ],
    "papers_without_artifact_ids": [
      1735,
      1736,
      1737,
      1739,
      1743,
      1744,
      1745,
      1749
    ]
  },
  {
    "name": "Hyungsub Kim",
    "display_name": "Hyungsub Kim",
    "affiliation": "Indiana University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2,
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "patchverif discovering faulty patches in robotic vehicles",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "discovering adversarial driving maneuvers against autonomous vehicles",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "m2mon building an mmiobased security reference monitor for unmanned vehicles",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5914,
    "paper_ids": [
      1732
    ],
    "papers_without_artifact_ids": [
      1743,
      1744,
      1780
    ]
  },
  {
    "name": "James M. Goppert",
    "display_name": "James M. Goppert",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5915,
    "paper_ids": [
      1732
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Inseok Hwang 0002",
    "display_name": "Inseok Hwang",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5916,
    "paper_ids": [
      1732
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xingyu He",
    "display_name": "Xingyu He",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Addressing Sensitivity Distinction in Local Differential Privacy: A General Utility-Optimized Framework",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5917,
    "paper_ids": [
      3372
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Youwen Zhu",
    "display_name": "Youwen Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Addressing Sensitivity Distinction in Local Differential Privacy: A General Utility-Optimized Framework",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5918,
    "paper_ids": [
      3372
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rongke Liu",
    "display_name": "Rongke Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Addressing Sensitivity Distinction in Local Differential Privacy: A General Utility-Optimized Framework",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5919,
    "paper_ids": [
      3372
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gaoning Pan",
    "display_name": "Gaoning Pan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Addressing Sensitivity Distinction in Local Differential Privacy: A General Utility-Optimized Framework",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "urvfl undetectable data reconstruction attack on vertical federated learning",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "miner a hybrid datadriven approach for rest api fuzzing",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5920,
    "paper_ids": [
      3372
    ],
    "papers_without_artifact_ids": [
      5431,
      1552
    ]
  },
  {
    "name": "Ryunosuke Kobayashi",
    "display_name": "Ryunosuke Kobayashi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Invisible but Detected: Physical Adversarial Shadow Attack and Defense on LiDAR Object Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5921,
    "paper_ids": [
      4444
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuna Tanaka",
    "display_name": "Yuna Tanaka",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Invisible but Detected: Physical Adversarial Shadow Attack and Defense on LiDAR Object Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5922,
    "paper_ids": [
      4444
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Go Tsuruoka",
    "display_name": "Go Tsuruoka",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Invisible but Detected: Physical Adversarial Shadow Attack and Defense on LiDAR Object Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5923,
    "paper_ids": [
      4444
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qinrun Dai",
    "display_name": "Qinrun Dai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Lancet: A Formalization Framework for Crash and Exploit Pathology",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5924,
    "paper_ids": [
      1873
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kirby Linvill",
    "display_name": "Kirby Linvill",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Lancet: A Formalization Framework for Crash and Exploit Pathology",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5925,
    "paper_ids": [
      1873
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gowtham Kaki",
    "display_name": "Gowtham Kaki",
    "affiliation": "University of Colorado Boulder",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Lancet: A Formalization Framework for Crash and Exploit Pathology",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5926,
    "paper_ids": [
      1873
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jennifer Miller",
    "display_name": "Jennifer Miller",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5927,
    "paper_ids": [
      822
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Manas Ghandat",
    "display_name": "Manas Ghandat",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5928,
    "paper_ids": [
      822
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hongkai Chen",
    "display_name": "Hongkai Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5929,
    "paper_ids": [
      822
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abdelouahab Benchikh",
    "display_name": "Abdelouahab Benchikh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5930,
    "paper_ids": [
      822
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yiwei Hu",
    "display_name": "Yiwei Hu",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Automated Vulnerability Repair: Methods, Tools, and Assessments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5931,
    "paper_ids": [
      1097
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhen Li 0027",
    "display_name": "Zhen Li",
    "affiliation": "Hebei University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Automated Vulnerability Repair: Methods, Tools, and Assessments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5932,
    "paper_ids": [
      1097
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kedie Shu",
    "display_name": "Kedie Shu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Automated Vulnerability Repair: Methods, Tools, and Assessments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5933,
    "paper_ids": [
      1097
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shenghua Guan",
    "display_name": "Shenghua Guan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Automated Vulnerability Repair: Methods, Tools, and Assessments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5934,
    "paper_ids": [
      1097
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shouhuai Xu",
    "display_name": "Shouhuai Xu",
    "affiliation": "UCCS",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 2,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "ACSAC": {
        "2021": 1,
        "2018": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Automated Vulnerability Repair: Methods, Tools, and Assessments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "nearultrasound inaudible trojan nuit exploiting your speaker to attack your microphone",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "can we leverage predictive uncertainty to detect dataset shift and adversarial examples in android malware detection",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "icsd an automatic system for insecure code snippet detection in stack overflow over heterogeneous information network",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 5935,
    "paper_ids": [
      1097
    ],
    "papers_without_artifact_ids": [
      5524,
      5525,
      5526
    ]
  },
  {
    "name": "Fan Zhang",
    "display_name": "Fan Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      },
      "ATC": {},
      "CHES": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Qelect: Lattice-based Single Secret Leader Election Made Practical",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "practical opcodebased fault attack on aesni",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "phishpedia a hybrid deep learning based approach to visually identify phishing webpages",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5936,
    "paper_ids": [
      4189
    ],
    "papers_without_artifact_ids": [
      1692,
      4426
    ]
  },
  {
    "name": "Amin Setayesh",
    "display_name": "Amin Setayesh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Treebeard: A Scalable and Fault Tolerant ORAM Datastore",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5937,
    "paper_ids": [
      5527
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cheran Mahalingam",
    "display_name": "Cheran Mahalingam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Treebeard: A Scalable and Fault Tolerant ORAM Datastore",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5938,
    "paper_ids": [
      5527
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Emily Chen",
    "display_name": "Emily Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Treebeard: A Scalable and Fault Tolerant ORAM Datastore",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5939,
    "paper_ids": [
      5527
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sujaya Maiyya",
    "display_name": "Sujaya Maiyya",
    "affiliation": "University of Waterloo",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Treebeard: A Scalable and Fault Tolerant ORAM Datastore",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "quoram a quorumreplicated fault tolerant oram datastore",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 5940,
    "paper_ids": [
      5527
    ],
    "papers_without_artifact_ids": [
      3494
    ]
  },
  {
    "name": "Haibo Cheng 0001",
    "display_name": "Haibo Cheng",
    "affiliation": "Boğaziçi University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practically Secure Honey Password Vaults: New Design and New Evaluation against Online Guessing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "incrementally updateable honey password vaults",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5941,
    "paper_ids": [
      5528
    ],
    "papers_without_artifact_ids": [
      2290
    ]
  },
  {
    "name": "Fugeng Huang",
    "display_name": "Fugeng Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practically Secure Honey Password Vaults: New Design and New Evaluation against Online Guessing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5942,
    "paper_ids": [
      5528
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiahong Yang 0003",
    "display_name": "Jiahong Yang",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practically Secure Honey Password Vaults: New Design and New Evaluation against Online Guessing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5943,
    "paper_ids": [
      5528
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenting Li 0002",
    "display_name": "Wenting Li",
    "affiliation": "Beijing Institute of Graphic Communication, School of Information Engineering, China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practically Secure Honey Password Vaults: New Design and New Evaluation against Online Guessing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "incrementally updateable honey password vaults",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5944,
    "paper_ids": [
      5528
    ],
    "papers_without_artifact_ids": [
      2290
    ]
  },
  {
    "name": "Ping Wang 0003",
    "display_name": "Ping Wang",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 2
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practically Secure Honey Password Vaults: New Design and New Evaluation against Online Guessing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "research on the security of visual reasoning captcha",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "incrementally updateable honey password vaults",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5945,
    "paper_ids": [
      5528
    ],
    "papers_without_artifact_ids": [
      5529,
      2290
    ]
  },
  {
    "name": "Ali Zohaib",
    "display_name": "Ali Zohaib",
    "affiliation": "University of Massachusetts Amherst",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5946,
    "paper_ids": [
      885
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qiang Zao",
    "display_name": "Qiang Zao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5947,
    "paper_ids": [
      885
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abdulrahman Alaraj",
    "display_name": "Abdulrahman Alaraj",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "weaponizing middleboxes for tcp reflected amplification",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 5948,
    "paper_ids": [
      885
    ],
    "papers_without_artifact_ids": [
      2483
    ]
  },
  {
    "name": "Xiao Zhan",
    "display_name": "Xiao Zhan",
    "affiliation": "Universitat Politècnica de València & University of Cambridge",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Malicious LLM-Based Conversational AI Makes Users Reveal Personal Information",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "who cares contextual privacy judgments from owner and bystander perspectives in different smart home situations",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "my best friends husband sees and knows everything a crosscontextual and crosscountry approach to understanding smart home privacy",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 5949,
    "paper_ids": [
      4450
    ],
    "papers_without_artifact_ids": [
      5530,
      4029
    ]
  },
  {
    "name": "William Seymour",
    "display_name": "William Seymour",
    "affiliation": "King's College London",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Malicious LLM-Based Conversational AI Makes Users Reveal Personal Information",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "voice app developer experiences with alexa and google assistant juggling risks liability and security",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5950,
    "paper_ids": [
      4450
    ],
    "papers_without_artifact_ids": [
      4452
    ]
  },
  {
    "name": "Kaiyuan Zhang 0002",
    "display_name": "Kaiyuan Zhang",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "censor defense against gradient inversion via orthogonal subspace bayesian sampling",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "rethinking the invisible protection against unauthorized image usage in stable diffusion",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "your exploit is mine instantly synthesizing counterattack smart contract",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5951,
    "paper_ids": [
      3031
    ],
    "papers_without_artifact_ids": [
      3032,
      4455,
      393
    ]
  },
  {
    "name": "Hanxi Guo",
    "display_name": "Hanxi Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5952,
    "paper_ids": [
      3031
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuetian Chen",
    "display_name": "Yuetian Chen",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5953,
    "paper_ids": [
      3031
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shengwei An",
    "display_name": "Shengwei An",
    "affiliation": "Virginia Tech",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "ACSAC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "censor defense against gradient inversion via orthogonal subspace bayesian sampling",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "exploring inherent backdoors in deep learning models",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "rethinking the invisible protection against unauthorized image usage in stable diffusion",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "pelican exploiting backdoors of naturally trained deep learning models in binary code analysis",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "hardlabel blackbox universal adversarial patch attack",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5954,
    "paper_ids": [
      3031
    ],
    "papers_without_artifact_ids": [
      3032,
      4454,
      4455,
      4458,
      4456
    ]
  },
  {
    "name": "Yuntao Du 0002",
    "display_name": "Yuntao Du",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5955,
    "paper_ids": [
      3031
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Charles Fleming",
    "display_name": "Charles Fleming",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {},
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ulixes facial recognition privacy with adversarial machine learning",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 5956,
    "paper_ids": [
      3031
    ],
    "papers_without_artifact_ids": [
      5531
    ]
  },
  {
    "name": "Minhao Jin",
    "display_name": "Minhao Jin",
    "affiliation": "Princeton University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Robustifying ML-powered Network Classifiers with PANTS",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5957,
    "paper_ids": [
      5532
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maria Apostolaki",
    "display_name": "Maria Apostolaki",
    "affiliation": "Princeton University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 4,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NSDI": {
        "2024": 2,
        "2019": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Robustifying ML-powered Network Classifiers with PANTS",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a layered formal methods approach to answering queuerelated queries",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "trustsketch trustworthy sketchbased telemetry on cloud hosts",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "tango secure collaborative route control across the public internet",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "reverie low pass filterbased switch buffer sharing for datacenters with rdma and tcp traffic",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "blink fast connectivity recovery entirely in the data plane",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 5958,
    "paper_ids": [
      5532
    ],
    "papers_without_artifact_ids": [
      5533,
      4480,
      3175,
      4782,
      5408
    ]
  },
  {
    "name": "Shiyu Sun",
    "display_name": "Shiyu Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DISPATCH: Unraveling Security Patches from Entangled Code Changes",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "what if is not enough fixing null pointer dereference with contextual check",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 5959,
    "paper_ids": [
      548
    ],
    "papers_without_artifact_ids": [
      568
    ]
  },
  {
    "name": "Yunlong Xing",
    "display_name": "Yunlong Xing",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DISPATCH: Unraveling Security Patches from Entangled Code Changes",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "what if is not enough fixing null pointer dereference with contextual check",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "cross container attacks the bewildered ebpf on clouds",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5960,
    "paper_ids": [
      548
    ],
    "papers_without_artifact_ids": [
      568,
      572
    ]
  },
  {
    "name": "Mark DenHoed",
    "display_name": "Mark DenHoed",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Synthesis of Code-Reuse Attacks from p-code Programs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5961,
    "paper_ids": [
      5534
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tom Melham",
    "display_name": "Tom Melham",
    "affiliation": "University of Oxford",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Synthesis of Code-Reuse Attacks from p-code Programs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5962,
    "paper_ids": [
      5534
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhen Guo",
    "display_name": "Zhen Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Persistent Backdoor Attacks in Continual Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5963,
    "paper_ids": [
      5535
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abhinav Kumar 0007",
    "display_name": "Abhinav Kumar",
    "affiliation": "University of Massachusetts",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Persistent Backdoor Attacks in Continual Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5964,
    "paper_ids": [
      5535
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Reza Tourani",
    "display_name": "Reza Tourani",
    "affiliation": "Saint Louis University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Persistent Backdoor Attacks in Continual Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5965,
    "paper_ids": [
      5535
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jin Ma",
    "display_name": "Jin Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "No Way to Sign Out? Unpacking Non-Compliance with Google Play's App Account Deletion Requirements",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5966,
    "paper_ids": [
      1455
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Salish Kumar",
    "display_name": "Salish Kumar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "No Way to Sign Out? Unpacking Non-Compliance with Google Play's App Account Deletion Requirements",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5967,
    "paper_ids": [
      1455
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Meni Orenbach",
    "display_name": "Meni Orenbach",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BlueGuard: Accelerated Host and Guest Introspection Using DPUs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5968,
    "paper_ids": [
      3084
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rami Ailabouni",
    "display_name": "Rami Ailabouni",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BlueGuard: Accelerated Host and Guest Introspection Using DPUs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5969,
    "paper_ids": [
      3084
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nael Masalha",
    "display_name": "Nael Masalha",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BlueGuard: Accelerated Host and Guest Introspection Using DPUs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5970,
    "paper_ids": [
      3084
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thanh Nguyen",
    "display_name": "Thanh Nguyen",
    "affiliation": "University of Oregon",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BlueGuard: Accelerated Host and Guest Introspection Using DPUs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5971,
    "paper_ids": [
      3084
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ahmad Saleh",
    "display_name": "Ahmad Saleh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BlueGuard: Accelerated Host and Guest Introspection Using DPUs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5972,
    "paper_ids": [
      3084
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Frank Block",
    "display_name": "Frank Block",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BlueGuard: Accelerated Host and Guest Introspection Using DPUs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5973,
    "paper_ids": [
      3084
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ofir Arkin",
    "display_name": "Ofir Arkin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BlueGuard: Accelerated Host and Guest Introspection Using DPUs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5974,
    "paper_ids": [
      3084
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ahmad Atamli",
    "display_name": "Ahmad Atamli",
    "affiliation": "University of Oxford",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BlueGuard: Accelerated Host and Guest Introspection Using DPUs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5975,
    "paper_ids": [
      3084
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jifan Xiao",
    "display_name": "Jifan Xiao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Robust, Efficient, and Widely Available Greybox Fuzzing for COTS Binaries with System Call Pattern Feedback",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5976,
    "paper_ids": [
      4343
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peng Jiang 0007",
    "display_name": "Peng Jiang",
    "affiliation": "Beijing Institute of Technology, School of Cyberspace Science and Technology, Beijing, China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Robust, Efficient, and Widely Available Greybox Fuzzing for COTS Binaries with System Call Pattern Feedback",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "auditing frameworks need resource isolation a systematic study on the super producer threat to system auditing and its mitigation",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5977,
    "paper_ids": [
      4343
    ],
    "papers_without_artifact_ids": [
      5536
    ]
  },
  {
    "name": "Zixi Zhao",
    "display_name": "Zixi Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Robust, Efficient, and Widely Available Greybox Fuzzing for COTS Binaries with System Call Pattern Feedback",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5978,
    "paper_ids": [
      4343
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ruizhe Huang",
    "display_name": "Ruizhe Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Robust, Efficient, and Widely Available Greybox Fuzzing for COTS Binaries with System Call Pattern Feedback",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards efficient hugepageaware memory deduplication",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "auditing frameworks need resource isolation a systematic study on the super producer threat to system auditing and its mitigation",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5979,
    "paper_ids": [
      4343
    ],
    "papers_without_artifact_ids": [
      5537,
      5536
    ]
  },
  {
    "name": "Ding Li 0001",
    "display_name": "Ding Li",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 11,
    "total_papers_by_conf": {
      "USENIXSEC": 7,
      "SOSP": 1,
      "ACSAC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 2,
        "2025": 2,
        "2021": 2
      },
      "SOSP": {
        "2023": 1
      },
      "ACSAC": {
        "2019": 1,
        "2020": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 9.1,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Robust, Efficient, and Widely Available Greybox Fuzzing for COTS Binaries with System Call Pattern Feedback",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i can tell your secrets inferring privacy attributes from miniapp interaction history in superapps",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "nodlink an online system for finegrained apt attack detection and investigation",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "famos robust privacypreserving authentication on payment apps via federated multimodal contrastive learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "towards efficient hugepageaware memory deduplication",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "auditing frameworks need resource isolation a systematic study on the super producer threat to system auditing and its mitigation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "distdet a costeffective distributed cyber threat detection system",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "sigl securing software installations through deep graph learning",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "seal storageefficient causality analysis on enterprise logs with queryfriendly compression",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "this is why we cant cache nice things lightningfast threat hunting using suspicionbased hierarchical storage",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "progressive processing of systembehavioral query",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 5980,
    "paper_ids": [
      4343
    ],
    "papers_without_artifact_ids": [
      4344,
      4348,
      5438,
      5537,
      5536,
      783,
      5288,
      3057,
      3247,
      5421
    ]
  },
  {
    "name": "Sandro Rüegge",
    "display_name": "Sandro Rüegge",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Branch Privilege Injection: Compromising Spectre v2 Hardware Mitigations by Exploiting Branch Predictor Race Conditions",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8085,
    "paper_ids": [
      927
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhengyuan Su",
    "display_name": "Zhengyuan Su",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FABLE: Batched Evaluation on Confidential Lookup Tables in 2PC",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5982,
    "paper_ids": [
      3298
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simon Beyzerov",
    "display_name": "Simon Beyzerov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FABLE: Batched Evaluation on Confidential Lookup Tables in 2PC",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5983,
    "paper_ids": [
      3298
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haris Smajlovic",
    "display_name": "Haris Smajlovic",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Shechi: A Secure Distributed Computation Compiler Based on Multiparty Homomorphic Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5984,
    "paper_ids": [
      5538
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Froelicher",
    "display_name": "David Froelicher",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Shechi: A Secure Distributed Computation Compiler Based on Multiparty Homomorphic Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scalable privacypreserving distributed learning",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 5985,
    "paper_ids": [
      5538
    ],
    "papers_without_artifact_ids": [
      3402
    ]
  },
  {
    "name": "Ariya Shajii",
    "display_name": "Ariya Shajii",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Shechi: A Secure Distributed Computation Compiler Based on Multiparty Homomorphic Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5986,
    "paper_ids": [
      5538
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bonnie Berger",
    "display_name": "Bonnie Berger",
    "affiliation": "Massachusetts Inst. of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Shechi: A Secure Distributed Computation Compiler Based on Multiparty Homomorphic Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5987,
    "paper_ids": [
      5538
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hyunghoon Cho",
    "display_name": "Hyunghoon Cho",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Shechi: A Secure Distributed Computation Compiler Based on Multiparty Homomorphic Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5988,
    "paper_ids": [
      5538
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ibrahim Numanagic",
    "display_name": "Ibrahim Numanagic",
    "affiliation": "University of Victoria",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Shechi: A Secure Distributed Computation Compiler Based on Multiparty Homomorphic Encryption",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5989,
    "paper_ids": [
      5538
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ruoyu Song 0001",
    "display_name": "Ruoyu Song",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "discovering adversarial driving maneuvers against autonomous vehicles",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 5990,
    "paper_ids": [
      1733
    ],
    "papers_without_artifact_ids": [
      1744
    ]
  },
  {
    "name": "Jean-Philippe Monteuuis",
    "display_name": "Jean-Philippe Monteuuis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5991,
    "paper_ids": [
      1733
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kotaiba Alachkar",
    "display_name": "Kotaiba Alachkar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "EvilEDR: Repurposing EDR as an Offensive Tool",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5992,
    "paper_ids": [
      3337
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dirk Gaastra",
    "display_name": "Dirk Gaastra",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "EvilEDR: Repurposing EDR as an Offensive Tool",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5993,
    "paper_ids": [
      3337
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eduardo Barbaro",
    "display_name": "Eduardo Barbaro",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "EvilEDR: Repurposing EDR as an Offensive Tool",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5994,
    "paper_ids": [
      3337
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ahmed Lekssays",
    "display_name": "Ahmed Lekssays",
    "affiliation": "Qatar Computing Research Institute",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LLMxCPG: Context-Aware Vulnerability Detection Through Code Property Graph-Guided Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5995,
    "paper_ids": [
      4371
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hamza Mouhcine",
    "display_name": "Hamza Mouhcine",
    "affiliation": "Qatar Computing Research Institute",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LLMxCPG: Context-Aware Vulnerability Detection Through Code Property Graph-Guided Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5996,
    "paper_ids": [
      4371
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Khang Tran",
    "display_name": "Khang Tran",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LLMxCPG: Context-Aware Vulnerability Detection Through Code Property Graph-Guided Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5997,
    "paper_ids": [
      4371
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zixiao Jia",
    "display_name": "Zixiao Jia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Aion: Robust and Efficient Multi-Round Single-Mask Secure Aggregation Against Malicious Participants",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5998,
    "paper_ids": [
      2566
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiao Chen",
    "display_name": "Xiao Chen",
    "affiliation": "University of Windsor",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Aion: Robust and Efficient Multi-Round Single-Mask Secure Aggregation Against Malicious Participants",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 5999,
    "paper_ids": [
      2566
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Runhua Xu",
    "display_name": "Runhua Xu",
    "affiliation": "Beihang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Aion: Robust and Efficient Multi-Round Single-Mask Secure Aggregation Against Malicious Participants",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6000,
    "paper_ids": [
      2566
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dawei Li 0009",
    "display_name": "Dawei Li",
    "affiliation": "Beihang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Aion: Robust and Efficient Multi-Round Single-Mask Secure Aggregation Against Malicious Participants",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6001,
    "paper_ids": [
      2566
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rui Wen 0002",
    "display_name": "Rui Wen",
    "affiliation": "University of Cincinnati",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 4,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding data importance in machine learning attacks does valuable data pose greater harm",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "quantifying privacy risks of prompts in visual prompt learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "instruction backdoor attacks against customized llms",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "mldoctor holistic risk assessment of inference attacks against machine learning models",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 6002,
    "paper_ids": [
      188
    ],
    "papers_without_artifact_ids": [
      193,
      198,
      200,
      206
    ]
  },
  {
    "name": "Yiyong Liu",
    "display_name": "Yiyong Liu",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6003,
    "paper_ids": [
      188
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuxi Wu",
    "display_name": "Yuxi Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Navigating Security and Privacy Threats in Homeless Service Provision",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6004,
    "paper_ids": [
      5539
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ruoxi Zhang",
    "display_name": "Ruoxi Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Navigating Security and Privacy Threats in Homeless Service Provision",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6005,
    "paper_ids": [
      5539
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shiyue Liu",
    "display_name": "Shiyue Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Navigating Security and Privacy Threats in Homeless Service Provision",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6006,
    "paper_ids": [
      5539
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mufei He",
    "display_name": "Mufei He",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Navigating Security and Privacy Threats in Homeless Service Provision",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6007,
    "paper_ids": [
      5539
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aidan Hong",
    "display_name": "Aidan Hong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Navigating Security and Privacy Threats in Homeless Service Provision",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6008,
    "paper_ids": [
      5539
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jeremy J. Northup",
    "display_name": "Jeremy J. Northup",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Navigating Security and Privacy Threats in Homeless Service Provision",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6009,
    "paper_ids": [
      5539
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Calla Kainaroi",
    "display_name": "Calla Kainaroi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Navigating Security and Privacy Threats in Homeless Service Provision",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6010,
    "paper_ids": [
      5539
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fei Fang 0001",
    "display_name": "Fei Fang",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Navigating Security and Privacy Threats in Homeless Service Provision",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6011,
    "paper_ids": [
      5539
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hong Shen 0004",
    "display_name": "Hong Shen",
    "affiliation": "Pennsylvania State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Navigating Security and Privacy Threats in Homeless Service Provision",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6012,
    "paper_ids": [
      5539
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jan Bormet",
    "display_name": "Jan Bormet",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6013,
    "paper_ids": [
      5540
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sebastian Faust",
    "display_name": "Sebastian Faust",
    "affiliation": "TU Darmstadt",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 2,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "CHES": {
        "2025": 1,
        "2023": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "allyoucancompute packed secret sharing for combined resilience",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "provable secure parallel gadgets",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 6014,
    "paper_ids": [
      5540
    ],
    "papers_without_artifact_ids": [
      5211,
      5212
    ]
  },
  {
    "name": "Hussien Othman",
    "display_name": "Hussien Othman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6015,
    "paper_ids": [
      5540
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ziyan Qu",
    "display_name": "Ziyan Qu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6016,
    "paper_ids": [
      5540
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sayak Saha Roy",
    "display_name": "Sayak Saha Roy",
    "affiliation": "Louisiana State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DarkGram: A Large-Scale Analysis of Cybercriminal Activity Channels on Telegram",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6017,
    "paper_ids": [
      5541
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Elham Pourabbas Vafa",
    "display_name": "Elham Pourabbas Vafa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DarkGram: A Large-Scale Analysis of Cybercriminal Activity Channels on Telegram",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6018,
    "paper_ids": [
      5541
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kobra Khanmohamaddi",
    "display_name": "Kobra Khanmohamaddi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DarkGram: A Large-Scale Analysis of Cybercriminal Activity Channels on Telegram",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6019,
    "paper_ids": [
      5541
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shirin Nilizadeh",
    "display_name": "Shirin Nilizadeh",
    "affiliation": "University of Texas at Arlington",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DarkGram: A Large-Scale Analysis of Cybercriminal Activity Channels on Telegram",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "examining stylegan as a utilitypreserving face deidentification method",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 6020,
    "paper_ids": [
      5541
    ],
    "papers_without_artifact_ids": [
      5542
    ]
  },
  {
    "name": "Mark Russinovich",
    "display_name": "Mark Russinovich",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0,
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {},
      "NSDI": {
        "2022": 1
      },
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Great, Now Write an Article About That: The Crescendo Multi-Turn LLM Jailbreak Attack",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "iaccf individual accountability for permissioned ledgers",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "virtual machine preserving host updates for zero day patching in public cloud",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "protean vm allocation service at scale",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 6021,
    "paper_ids": [
      5543
    ],
    "papers_without_artifact_ids": [
      1393,
      5544,
      4675
    ]
  },
  {
    "name": "Ahmed Salem 0001",
    "display_name": "Ahmed Salem",
    "affiliation": "University of Kentucky",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "ACSAC": 1,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 2,
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Great, Now Write an Article About That: The Crescendo Multi-Turn LLM Jailbreak Attack",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "twoinone a model hijacking attack against text generation models",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "unganable defending against ganbased face manipulation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "mldoctor holistic risk assessment of inference attacks against machine learning models",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "badnl backdoor attacks against nlp models with semanticpreserving improvements",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "updatesleak data set inference and reconstruction attacks in online learning",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6022,
    "paper_ids": [
      5543
    ],
    "papers_without_artifact_ids": [
      201,
      205,
      206,
      209,
      212
    ]
  },
  {
    "name": "Ronen Eldan",
    "display_name": "Ronen Eldan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Great, Now Write an Article About That: The Crescendo Multi-Turn LLM Jailbreak Attack",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6023,
    "paper_ids": [
      5543
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muhammad Shoaib",
    "display_name": "Muhammad Shoaib",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Principled and Automated Approach for Investigating AR/VR Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6024,
    "paper_ids": [
      3961
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alex Suh",
    "display_name": "Alex Suh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Principled and Automated Approach for Investigating AR/VR Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6025,
    "paper_ids": [
      3961
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chenghong Wang",
    "display_name": "Chenghong Wang",
    "affiliation": "Indiana University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PICACHV: Formally Verified Data Use Policy Enforcement for Secure Data Analytics",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "private proofofstake blockchains using differentiallyprivate stake distortion",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6026,
    "paper_ids": [
      601
    ],
    "papers_without_artifact_ids": [
      5501
    ]
  },
  {
    "name": "Angelos Beitis",
    "display_name": "Angelos Beitis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Haunted by Legacy: Discovering and Exploiting Vulnerable Tunnelling Hosts",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lanshield analysing and protecting local network access on mobile devices",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 6027,
    "paper_ids": [
      3268
    ],
    "papers_without_artifact_ids": [
      3269
    ]
  },
  {
    "name": "Lijin Wang",
    "display_name": "Lijin Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Purity to Peril: Backdooring Merged Models From \"Harmless\" Benign Components",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "property existence inference against generative models",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6028,
    "paper_ids": [
      2569
    ],
    "papers_without_artifact_ids": [
      2570
    ]
  },
  {
    "name": "Jingjing Wang",
    "display_name": "Jingjing Wang",
    "affiliation": "Soochow University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Purity to Peril: Backdooring Merged Models From \"Harmless\" Benign Components",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "property existence inference against generative models",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6029,
    "paper_ids": [
      2569
    ],
    "papers_without_artifact_ids": [
      2570
    ]
  },
  {
    "name": "Martin Björklund",
    "display_name": "Martin Björklund",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Endangered Privacy: Large-Scale Monitoring of Video Streaming Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8086,
    "paper_ids": [
      5545
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Romaric Duvignau",
    "display_name": "Romaric Duvignau",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Endangered Privacy: Large-Scale Monitoring of Video Streaming Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6031,
    "paper_ids": [
      5545
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leqian Zheng",
    "display_name": "Leqian Zheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "H2O2RAM: A High-Performance Hierarchical Doubly Oblivious RAM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6032,
    "paper_ids": [
      2524
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wentao Dong",
    "display_name": "Wentao Dong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "H2O2RAM: A High-Performance Hierarchical Doubly Oblivious RAM",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ring of gyges accountable anonymous broadcast via secretshared shuffle",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 6033,
    "paper_ids": [
      2524
    ],
    "papers_without_artifact_ids": [
      2525
    ]
  },
  {
    "name": "Andrew Bao",
    "display_name": "Andrew Bao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From Alarms to Real Bugs: Multi-target Multi-step Directed Greybox Fuzzing for Static Analysis Result Verification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6034,
    "paper_ids": [
      1696
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenjia Zhao",
    "display_name": "Wenjia Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From Alarms to Real Bugs: Multi-target Multi-step Directed Greybox Fuzzing for Static Analysis Result Verification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6035,
    "paper_ids": [
      1696
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yanhao Wang",
    "display_name": "Yanhao Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From Alarms to Real Bugs: Multi-target Multi-step Directed Greybox Fuzzing for Static Analysis Result Verification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vulnerabilityoriented testing for restful apis",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "sharing more and checking less leveraging common input keywords to detect bugs in embedded systems",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6036,
    "paper_ids": [
      1696
    ],
    "papers_without_artifact_ids": [
      5265,
      919
    ]
  },
  {
    "name": "Stephen McCamant",
    "display_name": "Stephen McCamant",
    "affiliation": "University of Minnesota",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From Alarms to Real Bugs: Multi-target Multi-step Directed Greybox Fuzzing for Static Analysis Result Verification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding and detecting disordered error handling with precise function pairing",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6037,
    "paper_ids": [
      1696
    ],
    "papers_without_artifact_ids": [
      3963
    ]
  },
  {
    "name": "Pen-Chung Yew",
    "display_name": "Pen-Chung Yew",
    "affiliation": "University of Minnesota",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From Alarms to Real Bugs: Multi-target Multi-step Directed Greybox Fuzzing for Static Analysis Result Verification",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6038,
    "paper_ids": [
      1696
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shang Wang 0004",
    "display_name": "Shang Wang",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6039,
    "paper_ids": [
      189
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yifan Yao",
    "display_name": "Yifan Yao",
    "affiliation": "University of Regina",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Easy As Child's Play: An Empirical Study on Age Verification of Adult-Oriented Android Apps",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6040,
    "paper_ids": [
      1876
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shawn McCollum",
    "display_name": "Shawn McCollum",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Easy As Child's Play: An Empirical Study on Age Verification of Adult-Oriented Android Apps",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6041,
    "paper_ids": [
      1876
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhibo Sun",
    "display_name": "Zhibo Sun",
    "affiliation": "Drexel University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Easy As Child's Play: An Empirical Study on Age Verification of Adult-Oriented Android Apps",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "having your cake and eating it an analysis of concessionabuseasaservice",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6042,
    "paper_ids": [
      1876
    ],
    "papers_without_artifact_ids": [
      828
    ]
  },
  {
    "name": "Xiwen Teoh",
    "display_name": "Xiwen Teoh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "less defined knowledge and more true alarms referencebased phishing detection without a predefined reference list",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "phishdecloaker detecting captchacloaked phishing websites via hybrid visionbased interactive models",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6043,
    "paper_ids": [
      4421
    ],
    "papers_without_artifact_ids": [
      4422,
      4423
    ]
  },
  {
    "name": "Yun Lin 0001",
    "display_name": "Yun Lin",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "SC": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "less defined knowledge and more true alarms referencebased phishing detection without a predefined reference list",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "phishdecloaker detecting captchacloaked phishing websites via hybrid visionbased interactive models",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "knowledge expansion and counterfactual interaction for referencebased phishing detection",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "inferring phishing intention via webpage appearance and dynamics a deep vision based approach",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "phishpedia a hybrid deep learning based approach to visually identify phishing webpages",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6044,
    "paper_ids": [
      4421
    ],
    "papers_without_artifact_ids": [
      4422,
      4423,
      4424,
      4425,
      4426
    ]
  },
  {
    "name": "Siqi Li",
    "display_name": "Siqi Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6045,
    "paper_ids": [
      4421
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ruofan Liu",
    "display_name": "Ruofan Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 6
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "less defined knowledge and more true alarms referencebased phishing detection without a predefined reference list",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "phishdecloaker detecting captchacloaked phishing websites via hybrid visionbased interactive models",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "knowledge expansion and counterfactual interaction for referencebased phishing detection",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "inferring phishing intention via webpage appearance and dynamics a deep vision based approach",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "phishpedia a hybrid deep learning based approach to visually identify phishing webpages",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6046,
    "paper_ids": [
      4421
    ],
    "papers_without_artifact_ids": [
      4422,
      4423,
      4424,
      4425,
      4426
    ]
  },
  {
    "name": "Avi Sollomoni",
    "display_name": "Avi Sollomoni",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6047,
    "paper_ids": [
      4421
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yaniv Harel",
    "display_name": "Yaniv Harel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6048,
    "paper_ids": [
      4421
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Keran Mu",
    "display_name": "Keran Mu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "temporal cdnconvex lens a cdnassisted practical pulsing ddos attack",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6049,
    "paper_ids": [
      549
    ],
    "papers_without_artifact_ids": [
      916
    ]
  },
  {
    "name": "Jiahao Yu 0001",
    "display_name": "Jiahao Yu",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PATCHAGENT: A Practical Program Repair Agent Mimicking Human Expertise",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mind the inconspicuous revealing the hidden weakness in aligned llms refusal boundaries",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "llmfuzzer scaling assessment of large language model jailbreaks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "airs explanation for deep reinforcement learning based security applications",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6050,
    "paper_ids": [
      935
    ],
    "papers_without_artifact_ids": [
      938,
      939,
      941
    ]
  },
  {
    "name": "Yan Chen 0004",
    "display_name": "Yan Chen",
    "affiliation": "Northwestern University",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "SC": 0,
      "ACSAC": 0,
      "NSDI": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2,
        "2021": 1
      },
      "SC": {},
      "ACSAC": {},
      "NSDI": {
        "2009": 1,
        "2010": 1,
        "2012": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PATCHAGENT: A Practical Program Repair Agent Mimicking Human Expertise",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "incorporating gradients to rules towards lightweight adaptive provenancebased intrusion detection",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "mind the inconspicuous revealing the hidden weakness in aligned llms refusal boundaries",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "clarion sound and clear provenance tracking for microservice deployments",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "osa an optical switching architecture for data center networks with unprecedented flexibility",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "webprophet automating performance prediction for web services",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "botgraph large scale spamming botnet detection",
        "conference": "NSDI",
        "year": 2009
      }
    ],
    "author_id": 6051,
    "paper_ids": [
      935
    ],
    "papers_without_artifact_ids": [
      4026,
      938,
      4239,
      3865,
      4933,
      5546
    ]
  },
  {
    "name": "Zefeng Li",
    "display_name": "Zefeng Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sometimes Simpler is Better: A Comprehensive Analysis of State-of-the-Art Provenance-Based Intrusion Detection Systems",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "masterkey automated jailbreaking of large language model chatbots",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 6052,
    "paper_ids": [
      4377
    ],
    "papers_without_artifact_ids": [
      739
    ]
  },
  {
    "name": "Paige Pepitone",
    "display_name": "Paige Pepitone",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "How Researchers De-Identify Data in Practice",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6053,
    "paper_ids": [
      862
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Felix Weissberg",
    "display_name": "Felix Weissberg",
    "affiliation": "TU Berlin",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6054,
    "paper_ids": [
      538
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jan Malte Hilgefort",
    "display_name": "Jan Malte Hilgefort",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6055,
    "paper_ids": [
      538
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Steve Grogorick",
    "display_name": "Steve Grogorick",
    "affiliation": "TU Braunschweig, Germany",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6056,
    "paper_ids": [
      538
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Eisemann",
    "display_name": "Martin Eisemann",
    "affiliation": "Braunschweig University of Technology, Germany",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6057,
    "paper_ids": [
      538
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kexi Huang",
    "display_name": "Kexi Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6058,
    "paper_ids": [
      1904
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Grace Jia",
    "display_name": "Grace Jia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Found in Translation: A Generative Language Modeling Approach to Memory Access Pattern Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "length leakage in oblivious data access mechanisms",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 1713,
    "paper_ids": [
      2703
    ],
    "papers_without_artifact_ids": [
      2705
    ]
  },
  {
    "name": "Alex Wong 0001",
    "display_name": "Alex Wong",
    "affiliation": "Yale University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Found in Translation: A Generative Language Modeling Approach to Memory Access Pattern Attacks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6059,
    "paper_ids": [
      2703
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haochen Gong",
    "display_name": "Haochen Gong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6060,
    "paper_ids": [
      689
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Siyu Hong",
    "display_name": "Siyu Hong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6061,
    "paper_ids": [
      689
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shenyi Yang",
    "display_name": "Shenyi Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6062,
    "paper_ids": [
      689
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rui Chang",
    "display_name": "Rui Chang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "demystifying pointer authentication on apple m1",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6063,
    "paper_ids": [
      689
    ],
    "papers_without_artifact_ids": [
      320
    ]
  },
  {
    "name": "Ziqi Yuan",
    "display_name": "Ziqi Yuan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6064,
    "paper_ids": [
      689
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chenyang Yu",
    "display_name": "Chenyang Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating System",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6065,
    "paper_ids": [
      689
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Isaac Sheff",
    "display_name": "Isaac Sheff",
    "affiliation": "Max Planck Institute for Software Systems",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CoVault: Secure, Scalable Analytics of Personal Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6066,
    "paper_ids": [
      1967
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Noemi Glaeser",
    "display_name": "Noemi Glaeser",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CoVault: Secure, Scalable Analytics of Personal Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6067,
    "paper_ids": [
      1967
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Baltasar Dinis",
    "display_name": "Baltasar Dinis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CoVault: Secure, Scalable Analytics of Personal Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6068,
    "paper_ids": [
      1967
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bobby Bhattacharjee",
    "display_name": "Bobby Bhattacharjee",
    "affiliation": "Univ. of Maryland - College Park",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0,
      "NSDI": 3,
      "NDSS": 0,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SOSP": {},
      "NSDI": {
        "2009": 1,
        "2010": 1,
        "2007": 1
      },
      "NDSS": {},
      "OSDI": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CoVault: Secure, Scalable Analytics of Personal Data",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "maranello practical partial packet recovery for 80211",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "symbiotic relationships in internet routing overlays",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "saar a shared control plane for overlay multicast",
        "conference": "NSDI",
        "year": 2007
      }
    ],
    "author_id": 6069,
    "paper_ids": [
      1967
    ],
    "papers_without_artifact_ids": [
      5315,
      2485,
      517
    ]
  },
  {
    "name": "Binbin Tu",
    "display_name": "Binbin Tu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6070,
    "paper_ids": [
      3258
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yujie Bai",
    "display_name": "Yujie Bai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "efficient multiparty private set union without noncollusion assumptions",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 6071,
    "paper_ids": [
      3258
    ],
    "papers_without_artifact_ids": [
      3259
    ]
  },
  {
    "name": "Yang Cao",
    "display_name": "Yang Cao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6072,
    "paper_ids": [
      3258
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu Chen",
    "display_name": "Yu Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ATC": 1,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 2
      },
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2023": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "efficient multiparty private set union without noncollusion assumptions",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "netpanel traffic measurement of exchange online service",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "infinitygauntlet expose smartphone fingerprint authentication to bruteforce attack",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "electronic logistics distribution system with improved entity recognition algorithm",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 6073,
    "paper_ids": [
      3258
    ],
    "papers_without_artifact_ids": [
      3259,
      5547,
      4771,
      5548
    ]
  },
  {
    "name": "Nan Yan 0001",
    "display_name": "Nan Yan",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "EmbedX: Embedding-Based Cross-Trigger Backdoor Attack Against Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6074,
    "paper_ids": [
      4435
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuqing Li 0001",
    "display_name": "Yuqing Li",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "EmbedX: Embedding-Based Cross-Trigger Backdoor Attack Against Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6075,
    "paper_ids": [
      4435
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiong Wang 0006",
    "display_name": "Xiong Wang",
    "affiliation": "Huazhong University of Science and Technology, Wuhan, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "EmbedX: Embedding-Based Cross-Trigger Backdoor Attack Against Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6076,
    "paper_ids": [
      4435
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bo Li 0001",
    "display_name": "Bo Li",
    "affiliation": "HKUST",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "SC": 0,
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "SC": {},
      "EUROSYS": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "EmbedX: Embedding-Based Cross-Trigger Backdoor Attack Against Large Language Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "schemoe an extensible mixtureofexperts distributed training system with tasks scheduling",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "lotto secure participant selection against adversarial servers in federated learning",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6077,
    "paper_ids": [
      4435
    ],
    "papers_without_artifact_ids": [
      4764,
      2803
    ]
  },
  {
    "name": "Collin Zhang",
    "display_name": "Collin Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Self-interpreting Adversarial Images",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "zombie middleboxes that dont snoop",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 6078,
    "paper_ids": [
      1843
    ],
    "papers_without_artifact_ids": [
      2870
    ]
  },
  {
    "name": "John X. Morris",
    "display_name": "John X. Morris",
    "affiliation": "University of Iowa",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Self-interpreting Adversarial Images",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6079,
    "paper_ids": [
      1843
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eugene Bagdasarian",
    "display_name": "Eugene Bagdasarian",
    "affiliation": "Univ. of Massachusetts Amherst",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Self-interpreting Adversarial Images",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "backdooring bias b2 into stable diffusion models",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 6080,
    "paper_ids": [
      1843
    ],
    "papers_without_artifact_ids": [
      889
    ]
  },
  {
    "name": "Zhelei Zhou",
    "display_name": "Zhelei Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof Delegation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6081,
    "paper_ids": [
      1905
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yinghao Wang",
    "display_name": "Yinghao Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof Delegation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secure transformer inference made noninteractive",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 6082,
    "paper_ids": [
      1905
    ],
    "papers_without_artifact_ids": [
      307
    ]
  },
  {
    "name": "Yanxin Pang",
    "display_name": "Yanxin Pang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof Delegation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6083,
    "paper_ids": [
      1905
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinye He",
    "display_name": "Jinye He",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof Delegation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6084,
    "paper_ids": [
      1905
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bingsheng Zhang",
    "display_name": "Bingsheng Zhang",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof Delegation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a new ppml paradigm for quantized models",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "efficient 2pc for constant round secure equality testing and comparison",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 6085,
    "paper_ids": [
      1905
    ],
    "papers_without_artifact_ids": [
      306,
      311
    ]
  },
  {
    "name": "Emiram Kablo",
    "display_name": "Emiram Kablo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6086,
    "paper_ids": [
      5549
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Melina Kleber",
    "display_name": "Melina Kleber",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6087,
    "paper_ids": [
      5549
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Patricia Arias Cabarcos",
    "display_name": "Patricia Arias Cabarcos",
    "affiliation": "Paderborn University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      },
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "surprised shocked worried user reactions to facebook data collection from third parties",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "inexpensive brainwave authentication new techniques and insights on user acceptance",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6088,
    "paper_ids": [
      5549
    ],
    "papers_without_artifact_ids": [
      2181,
      2182
    ]
  },
  {
    "name": "Zhisheng Zhang",
    "display_name": "Zhisheng Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6089,
    "paper_ids": [
      2300
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qianyi Yang",
    "display_name": "Qianyi Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6090,
    "paper_ids": [
      2300
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pengyang Huang",
    "display_name": "Pengyang Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6091,
    "paper_ids": [
      2300
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junhan Pu",
    "display_name": "Junhan Pu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6092,
    "paper_ids": [
      2300
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yumingzhi Pan",
    "display_name": "Yumingzhi Pan",
    "affiliation": "Southeast University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6093,
    "paper_ids": [
      1877
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hongze Wang",
    "display_name": "Hongze Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6094,
    "paper_ids": [
      1877
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guangchi Liu",
    "display_name": "Guangchi Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6095,
    "paper_ids": [
      1877
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fuchen Ma",
    "display_name": "Fuchen Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Finding Metadata Inconsistencies in Distributed File Systems via Cross-Node Operation Modeling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "themis finding imbalance failures in distributed file systems via a load variance model",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 6096,
    "paper_ids": [
      2738
    ],
    "papers_without_artifact_ids": [
      3530
    ]
  },
  {
    "name": "Yuanliang Chen",
    "display_name": "Yuanliang Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Finding Metadata Inconsistencies in Distributed File Systems via Cross-Node Operation Modeling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "themis finding imbalance failures in distributed file systems via a load variance model",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 6097,
    "paper_ids": [
      2738
    ],
    "papers_without_artifact_ids": [
      3530
    ]
  },
  {
    "name": "Yuanhang Zhou",
    "display_name": "Yuanhang Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Finding Metadata Inconsistencies in Distributed File Systems via Cross-Node Operation Modeling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "themis finding imbalance failures in distributed file systems via a load variance model",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 6098,
    "paper_ids": [
      2738
    ],
    "papers_without_artifact_ids": [
      3530
    ]
  },
  {
    "name": "Zhen Yan",
    "display_name": "Zhen Yan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Finding Metadata Inconsistencies in Distributed File Systems via Cross-Node Operation Modeling",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "themis finding imbalance failures in distributed file systems via a load variance model",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 6099,
    "paper_ids": [
      2738
    ],
    "papers_without_artifact_ids": [
      3530
    ]
  },
  {
    "name": "Junhua Lin",
    "display_name": "Junhua Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Crack in the Bark: Leveraging Public Knowledge to Remove Tree-Ring Watermarks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6100,
    "paper_ids": [
      4461
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michele Marazzi",
    "display_name": "Michele Marazzi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "McSee: Evaluating Advanced Rowhammer Attacks and Defenses via Automated DRAM Traffic Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "zenhammer rowhammer attacks on amd zenbased platforms",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6101,
    "paper_ids": [
      928
    ],
    "papers_without_artifact_ids": [
      930
    ]
  },
  {
    "name": "Max Wipfli",
    "display_name": "Max Wipfli",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "McSee: Evaluating Advanced Rowhammer Attacks and Defenses via Automated DRAM Traffic Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "zenhammer rowhammer attacks on amd zenbased platforms",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6102,
    "paper_ids": [
      928
    ],
    "papers_without_artifact_ids": [
      930
    ]
  },
  {
    "name": "Stefan Gloor",
    "display_name": "Stefan Gloor",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "McSee: Evaluating Advanced Rowhammer Attacks and Defenses via Automated DRAM Traffic Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6103,
    "paper_ids": [
      928
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yujin Huang",
    "display_name": "Yujin Huang",
    "affiliation": "The University of Melbourne",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 1716,
    "paper_ids": [
      1563
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chunyang Chen 0001",
    "display_name": "Chunyang Chen",
    "affiliation": "TU Munich",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "differential testing of cross deep learning framework apis revealing inconsistencies and vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6104,
    "paper_ids": [
      1563
    ],
    "papers_without_artifact_ids": [
      1867
    ]
  },
  {
    "name": "Andrés Fábrega",
    "display_name": "Andrés Fábrega",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Voting-Bloc Entropy: A New Metric for DAO Decentralization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mitigating injection attacks against e2ee applications via viewbased partitioning",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "exploiting leakage in password managers via injection attacks",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 8087,
    "paper_ids": [
      5550
    ],
    "papers_without_artifact_ids": [
      4282,
      2756
    ]
  },
  {
    "name": "Amy Zhao",
    "display_name": "Amy Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Voting-Bloc Entropy: A New Metric for DAO Decentralization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6106,
    "paper_ids": [
      5550
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jay Yu",
    "display_name": "Jay Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Voting-Bloc Entropy: A New Metric for DAO Decentralization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6107,
    "paper_ids": [
      5550
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "James Austgen",
    "display_name": "James Austgen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Voting-Bloc Entropy: A New Metric for DAO Decentralization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6108,
    "paper_ids": [
      5550
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sarah Allen",
    "display_name": "Sarah Allen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Voting-Bloc Entropy: A New Metric for DAO Decentralization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6109,
    "paper_ids": [
      5550
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kushal Babel",
    "display_name": "Kushal Babel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      },
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Voting-Bloc Entropy: A New Metric for DAO Decentralization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mysticeti reaching the latency limits with uncertified dags",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "shortstack distributed faulttolerant oblivious data access",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 6110,
    "paper_ids": [
      5550
    ],
    "papers_without_artifact_ids": [
      2666,
      2706
    ]
  },
  {
    "name": "Mahimna Kelkar",
    "display_name": "Mahimna Kelkar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Voting-Bloc Entropy: A New Metric for DAO Decentralization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secure poisson regression",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 6111,
    "paper_ids": [
      5550
    ],
    "papers_without_artifact_ids": [
      5551
    ]
  },
  {
    "name": "Ari Juels",
    "display_name": "Ari Juels",
    "affiliation": "Cornell University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0,
      "FAST": 1,
      "CHES": 0,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {},
      "FAST": {
        "2010": 1
      },
      "CHES": {},
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Voting-Bloc Entropy: A New Metric for DAO Decentralization",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a cleanslate look at disk scrubbing",
        "conference": "FAST",
        "year": 2010
      }
    ],
    "author_id": 6112,
    "paper_ids": [
      5550
    ],
    "papers_without_artifact_ids": [
      3994
    ]
  },
  {
    "name": "Kelechi G. Kalu",
    "display_name": "Kelechi G. Kalu",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "An Industry Interview Study of Software Signing for Supply Chain Security",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6113,
    "paper_ids": [
      4462
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tanmay Singla",
    "display_name": "Tanmay Singla",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "An Industry Interview Study of Software Signing for Supply Chain Security",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6114,
    "paper_ids": [
      4462
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chinenye Okafor",
    "display_name": "Chinenye Okafor",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "An Industry Interview Study of Software Signing for Supply Chain Security",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6115,
    "paper_ids": [
      4462
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Santiago Torres-Arias",
    "display_name": "Santiago Torres-Arias",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NSDI": {
        "2016": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "An Industry Interview Study of Software Signing for Supply Chain Security",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diplomat using delegations to protect community repositories",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 6116,
    "paper_ids": [
      4462
    ],
    "papers_without_artifact_ids": [
      3978
    ]
  },
  {
    "name": "Chris S. Lin",
    "display_name": "Chris S. Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GPUHammer: Rowhammer Attacks on GPU Memories are Practical",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6117,
    "paper_ids": [
      2583
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joyce Qu",
    "display_name": "Joyce Qu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GPUHammer: Rowhammer Attacks on GPU Memories are Practical",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6118,
    "paper_ids": [
      2583
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Siliang Qin",
    "display_name": "Siliang Qin",
    "affiliation": "Institute of Information Engineering, Chinese Academy of Sciences",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tady: A Neural Disassembler without Structural Constraint Violations",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "alphaexp an expert system for identifying securitysensitive kernel objects",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6119,
    "paper_ids": [
      1852
    ],
    "papers_without_artifact_ids": [
      1894
    ]
  },
  {
    "name": "Fengrui Yang",
    "display_name": "Fengrui Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tady: A Neural Disassembler without Structural Constraint Violations",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6120,
    "paper_ids": [
      1852
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hao Wang 0003",
    "display_name": "Hao Wang",
    "affiliation": "University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tady: A Neural Disassembler without Structural Constraint Violations",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improving mlbased binary function similarity detection by assessing and deprioritizing control flow graph features",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6121,
    "paper_ids": [
      1852
    ],
    "papers_without_artifact_ids": [
      563
    ]
  },
  {
    "name": "Bolun Zhang",
    "display_name": "Bolun Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tady: A Neural Disassembler without Structural Constraint Violations",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "maze towards automated heap feng shui",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6122,
    "paper_ids": [
      1852
    ],
    "papers_without_artifact_ids": [
      1898
    ]
  },
  {
    "name": "Zeyu Gao",
    "display_name": "Zeyu Gao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tady: A Neural Disassembler without Structural Constraint Violations",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6123,
    "paper_ids": [
      1852
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daan Vanoverloop",
    "display_name": "Daan Vanoverloop",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TLBlur: Compiler-Assisted Automated Hardening against Controlled Channels on Off-the-Shelf Intel SGX Platforms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6124,
    "paper_ids": [
      16
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrés Sánchez",
    "display_name": "Andrés Sánchez",
    "affiliation": "EPFL",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TLBlur: Compiler-Assisted Automated Hardening against Controlled Channels on Off-the-Shelf Intel SGX Platforms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8088,
    "paper_ids": [
      16
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Keke Lian",
    "display_name": "Keke Lian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6126,
    "paper_ids": [
      239
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haoran Zhao",
    "display_name": "Haoran Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "formal analysis and patching of blesc pairing",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6127,
    "paper_ids": [
      239
    ],
    "papers_without_artifact_ids": [
      4436
    ]
  },
  {
    "name": "Fute Sun",
    "display_name": "Fute Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6128,
    "paper_ids": [
      239
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alfusainey Jallow",
    "display_name": "Alfusainey Jallow",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Stack Overflow Meets Replication: Security Research Amid Evolving Code Snippets",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6129,
    "paper_ids": [
      4022
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ergute Bao",
    "display_name": "Ergute Bao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unlocking the Power of Differentially Private Zeroth-order Optimization for Fine-tuning LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6130,
    "paper_ids": [
      4464
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yangfan Jiang 0001",
    "display_name": "Yangfan Jiang",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unlocking the Power of Differentially Private Zeroth-order Optimization for Fine-tuning LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "passive inference attacks on split learning via adversarial regularization",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 6131,
    "paper_ids": [
      4464
    ],
    "papers_without_artifact_ids": [
      5552
    ]
  },
  {
    "name": "Fei Wei",
    "display_name": "Fei Wei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unlocking the Power of Differentially Private Zeroth-order Optimization for Fine-tuning LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6132,
    "paper_ids": [
      4464
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaokui Xiao",
    "display_name": "Xiaokui Xiao",
    "affiliation": "National University of Singapore",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unlocking the Power of Differentially Private Zeroth-order Optimization for Fine-tuning LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "passive inference attacks on split learning via adversarial regularization",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 6133,
    "paper_ids": [
      4464
    ],
    "papers_without_artifact_ids": [
      5552
    ]
  },
  {
    "name": "Zitao Li",
    "display_name": "Zitao Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unlocking the Power of Differentially Private Zeroth-order Optimization for Fine-tuning LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the robustness of ldp protocols for numerical attributes under data poisoning attacks",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 6134,
    "paper_ids": [
      4464
    ],
    "papers_without_artifact_ids": [
      3033
    ]
  },
  {
    "name": "Bolin Ding",
    "display_name": "Bolin Ding",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unlocking the Power of Differentially Private Zeroth-order Optimization for Fine-tuning LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6135,
    "paper_ids": [
      4464
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaoyue Ma",
    "display_name": "Xiaoyue Ma",
    "affiliation": "George Mason University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple AirTag Without Root Privileges",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "from one thousand pages of specification to unveiling hidden bugs large language model assisted fuzzing of matter iot devices",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6136,
    "paper_ids": [
      4386
    ],
    "papers_without_artifact_ids": [
      4387
    ]
  },
  {
    "name": "Marvin Büchel",
    "display_name": "Marvin Büchel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: Automated TTP Extraction from CTI Reports - Are We There Yet?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8089,
    "paper_ids": [
      1437
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tommaso Paladini",
    "display_name": "Tommaso Paladini",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: Automated TTP Extraction from CTI Reports - Are We There Yet?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6138,
    "paper_ids": [
      1437
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hodaya Binyamini",
    "display_name": "Hodaya Binyamini",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: Automated TTP Extraction from CTI Reports - Are We There Yet?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6139,
    "paper_ids": [
      1437
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gal Engelberg",
    "display_name": "Gal Engelberg",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: Automated TTP Extraction from CTI Reports - Are We There Yet?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6140,
    "paper_ids": [
      1437
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dan Klein 0003",
    "display_name": "Dan Klein",
    "affiliation": "Accenture Labs, Accenture Israel Cyber R&D Lab, Tel Aviv, Herzliya, Israel",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: Automated TTP Extraction from CTI Reports - Are We There Yet?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6141,
    "paper_ids": [
      1437
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Giancarlo Guizzardi",
    "display_name": "Giancarlo Guizzardi",
    "affiliation": "University of Twente",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: Automated TTP Extraction from CTI Reports - Are We There Yet?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6142,
    "paper_ids": [
      1437
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maarten van Steen",
    "display_name": "Maarten van Steen",
    "affiliation": "VU Amsterdam",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "EUROSYS": 1,
      "ATC": 0,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {},
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: Automated TTP Extraction from CTI Reports - Are We There Yet?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacypreserving crowdmonitoring using bloom filters and homomorphic encryption",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 6143,
    "paper_ids": [
      1437
    ],
    "papers_without_artifact_ids": [
      1443
    ]
  },
  {
    "name": "Huanhuan Jia",
    "display_name": "Huanhuan Jia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Distributed Private Aggregation in Graph Neural Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6144,
    "paper_ids": [
      2474
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuanbo Zhao",
    "display_name": "Yuanbo Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Distributed Private Aggregation in Graph Neural Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6145,
    "paper_ids": [
      2474
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kai Dong 0001",
    "display_name": "Kai Dong",
    "affiliation": "Southeast University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "ATC": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Distributed Private Aggregation in Graph Neural Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ldr secure and efficient linux driver runtime for embedded tee systems",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "relation mining under local differential privacy",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6146,
    "paper_ids": [
      2474
    ],
    "papers_without_artifact_ids": [
      2475,
      2476
    ]
  },
  {
    "name": "Ming Yang 0001",
    "display_name": "Ming Yang",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Distributed Private Aggregation in Graph Neural Networks",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ldr secure and efficient linux driver runtime for embedded tee systems",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "relation mining under local differential privacy",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6147,
    "paper_ids": [
      2474
    ],
    "papers_without_artifact_ids": [
      2475,
      2476
    ]
  },
  {
    "name": "Lorenz Kustosch",
    "display_name": "Lorenz Kustosch",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Regulating Smart Device Support Periods: User Expectations and the European Cyber Resilience Act",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "patching up stakeholder experiences of security updates for connected medical devices",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "measuring up to reasonable consumer expectations providing an empirical basis for holding iot manufacturers legally responsible",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6148,
    "paper_ids": [
      3338
    ],
    "papers_without_artifact_ids": [
      3341,
      3346
    ]
  },
  {
    "name": "Carlos Gañán",
    "display_name": "Carlos Gañán",
    "affiliation": "TU Delft",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 2,
        "2025": 2,
        "2021": 1
      },
      "PETS": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Regulating Smart Device Support Periods: User Expectations and the European Cyber Resilience Act",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "patching up stakeholder experiences of security updates for connected medical devices",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "heads in the clouds measuring universities migration to public clouds implications for privacy academic freedom",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "measuring up to reasonable consumer expectations providing an empirical basis for holding iot manufacturers legally responsible",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "two sides of the shield understanding protective dns adoption factors",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "the thing doesnt have a name learning from emergent realworld interventions in smart home security",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 8090,
    "paper_ids": [
      3338
    ],
    "papers_without_artifact_ids": [
      3341,
      2926,
      3346,
      3347,
      3350
    ]
  },
  {
    "name": "Mattis van 't Schip",
    "display_name": "Mattis van 't Schip",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Regulating Smart Device Support Periods: User Expectations and the European Cyber Resilience Act",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "measuring up to reasonable consumer expectations providing an empirical basis for holding iot manufacturers legally responsible",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6150,
    "paper_ids": [
      3338
    ],
    "papers_without_artifact_ids": [
      3346
    ]
  },
  {
    "name": "Simon Parkin",
    "display_name": "Simon Parkin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 10
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 4,
        "2022": 1,
        "2025": 3,
        "2021": 1
      }
    },
    "artifact_rate": 10.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Regulating Smart Device Support Periods: User Expectations and the European Cyber Resilience Act",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "am i infected lessons from operating a largescale iot security diagnostic service",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "patching up stakeholder experiences of security updates for connected medical devices",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "what keeps people secure is that they met the security team deconstructing drivers and goals of organizational security awareness",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "employees who dont accept the time security takes are not aware enough the ciso view of humancentred security",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "measuring up to reasonable consumer expectations providing an empirical basis for holding iot manufacturers legally responsible",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "two sides of the shield understanding protective dns adoption factors",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "examining consumer reviews to understand security and privacy issues in the market of smart home devices",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "an empirical study of a decentralized identity wallet usability security and perspectives on user control",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "the thing doesnt have a name learning from emergent realworld interventions in smart home security",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6151,
    "paper_ids": [
      3338
    ],
    "papers_without_artifact_ids": [
      3339,
      3341,
      5553,
      5554,
      3346,
      3347,
      3345,
      5555,
      3350
    ]
  },
  {
    "name": "Shuhan Zhang",
    "display_name": "Shuhan Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Your Shield is My Sword: A Persistent Denial-of-Service Attack via the Reuse of Unvalidated Caches in DNSSEC Validation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6152,
    "paper_ids": [
      2708
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuai Wang 0028",
    "display_name": "Shuai Wang",
    "affiliation": "Zhongguancun Laboratory, Beijing, China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Your Shield is My Sword: A Persistent Denial-of-Service Attack via the Reuse of Unvalidated Caches in DNSSEC Validation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bufferbased endtoend request event monitoring in the cloud",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 6153,
    "paper_ids": [
      2708
    ],
    "papers_without_artifact_ids": [
      4767
    ]
  },
  {
    "name": "Dan Li 0001",
    "display_name": "Dan Li",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 11,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "SC": 0,
      "NSDI": 7,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      },
      "SC": {},
      "NSDI": {
        "2025": 4,
        "2023": 1,
        "2022": 2
      },
      "NDSS": {
        "2024": 2
      }
    },
    "artifact_rate": 9.1,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Your Shield is My Sword: A Persistent Denial-of-Service Attack via the Reuse of Unvalidated Caches in DNSSEC Validation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "resolving packets from counters enabling multiscale network traffic super resolution via composable large traffic model",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "accelerating design space exploration for llm training systems with multiexperiment parallel simulation",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "simai unifying architecture design and performance tuning for largescale large language model training with scalability and precision",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "cegs configuration example generalizing synthesizer",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "understanding route origin validation rov deployment in the real world and why manrs action 1 is not followed",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "drr a decentralized scalable and auditable architecture for rpki repository",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "bgl gpuefficient gnn training by optimizing graph data io and preprocessing",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "elixir a highperformance and lowcost approach to managing hardwaresoftware hybrid flow tables considering flow burstiness",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "bufferbased endtoend request event monitoring in the cloud",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "themis accelerating the detection of route origin hijacking by distinguishing legitimate and illegitimate moas",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 6154,
    "paper_ids": [
      2708
    ],
    "papers_without_artifact_ids": [
      2709,
      1941,
      2710,
      2711,
      2712,
      556,
      2831,
      5556,
      4767,
      5557
    ]
  },
  {
    "name": "Baojun Liu",
    "display_name": "Baojun Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Your Shield is My Sword: A Persistent Denial-of-Service Attack via the Reuse of Unvalidated Caches in DNSSEC Validation",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6155,
    "paper_ids": [
      2708
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yufan You",
    "display_name": "Yufan You",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "My ZIP isn't your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6156,
    "paper_ids": [
      904
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qi Wang 0094",
    "display_name": "Qi Wang",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "My ZIP isn't your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "crossorigin web attacks via http2 server push and signed http exchange",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 6157,
    "paper_ids": [
      904
    ],
    "papers_without_artifact_ids": [
      906
    ]
  },
  {
    "name": "Houda Naji",
    "display_name": "Houda Naji",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"It's not my responsibility to write them\": An Empirical Study of Software Product Managers and Security Requirements",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6158,
    "paper_ids": [
      5558
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Felix Reichmann",
    "display_name": "Felix Reichmann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"It's not my responsibility to write them\": An Empirical Study of Software Product Managers and Security Requirements",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6159,
    "paper_ids": [
      5558
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tobias Bruns",
    "display_name": "Tobias Bruns",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"It's not my responsibility to write them\": An Empirical Study of Software Product Managers and Security Requirements",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6160,
    "paper_ids": [
      5558
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "M. Angela Sasse",
    "display_name": "M. Angela Sasse",
    "affiliation": "Ruhr-University Bochum",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 2,
        "2022": 1,
        "2025": 1
      },
      "PETS": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 12.5,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"It's not my responsibility to write them\": An Empirical Study of Software Product Managers and Security Requirements",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "where are we on cyber a qualitative study on boards cybersecurity risk decision making",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "if you want to encrypt it really really hardcore user perceptions of key transparency in whatsapp",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "simulated stress a case study of the effects of a simulated phishing campaign on employees perception stress and selfefficacy",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "the challenges of bringing cryptography from research papers to products results from an interview study with experts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "employees who dont accept the time security takes are not aware enough the ciso view of humancentred security",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "to do this properly you need more resources the hidden costs of introducing simulated phishing campaigns",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "i dont know why i check this investigating expert users strategies to detect email signature spoofing attacks",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 6161,
    "paper_ids": [
      5558
    ],
    "papers_without_artifact_ids": [
      5559,
      5560,
      5561,
      1250,
      5554,
      5562,
      959
    ]
  },
  {
    "name": "Alena Naiakshina",
    "display_name": "Alena Naiakshina",
    "affiliation": "Ruhr-University Bochum",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"It's not my responsibility to write them\": An Empirical Study of Software Product Managers and Security Requirements",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "those things are written by lawyers and programmers are reading that mapping the communication gap between software developers and privacy experts",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "engaging company developers in security research studies a comprehensive literature review and quantitative survey",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "lets hash helping developers with password security",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "code reviewing as methodology for online security studies with developers a case study with freelancers on password storage",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "replication on the ecological validity of online security developer studies exploring deception in a passwordstorage study with freelancers",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6162,
    "paper_ids": [
      5558
    ],
    "papers_without_artifact_ids": [
      2431,
      5563,
      5564,
      5565,
      5566
    ]
  },
  {
    "name": "Kaixuan Luo",
    "display_name": "Kaixuan Luo",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Universal Cross-app Attacks: Exploiting and Securing OAuth 2.0 in Integration Platforms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6163,
    "paper_ids": [
      5567
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xianbo Wang",
    "display_name": "Xianbo Wang",
    "affiliation": "Western Sydney University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Universal Cross-app Attacks: Exploiting and Securing OAuth 2.0 in Integration Platforms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scalable detection of promotional website defacements in black hat seo campaigns",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6164,
    "paper_ids": [
      5567
    ],
    "papers_without_artifact_ids": [
      5568
    ]
  },
  {
    "name": "Adonis P. H. Fung",
    "display_name": "Adonis P. H. Fung",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Universal Cross-app Attacks: Exploiting and Securing OAuth 2.0 in Integration Platforms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6165,
    "paper_ids": [
      5567
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wing Cheong Lau",
    "display_name": "Wing Cheong Lau",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Universal Cross-app Attacks: Exploiting and Securing OAuth 2.0 in Integration Platforms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scalable detection of promotional website defacements in black hat seo campaigns",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6166,
    "paper_ids": [
      5567
    ],
    "papers_without_artifact_ids": [
      5568
    ]
  },
  {
    "name": "Julien Lecomte",
    "display_name": "Julien Lecomte",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Universal Cross-app Attacks: Exploiting and Securing OAuth 2.0 in Integration Platforms",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6167,
    "paper_ids": [
      5567
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei Zong",
    "display_name": "Wei Zong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AudioMarkNet: Audio Watermarking for Deepfake Speech Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6168,
    "paper_ids": [
      2190
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yang-Wai Chow",
    "display_name": "Yang-Wai Chow",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AudioMarkNet: Audio Watermarking for Deepfake Speech Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6169,
    "paper_ids": [
      2190
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Willy Susilo",
    "display_name": "Willy Susilo",
    "affiliation": "University of Wollongong",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AudioMarkNet: Audio Watermarking for Deepfake Speech Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pixel and pixel compact and efficient forwardsecure multisignatures for pos blockchain consensus",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6170,
    "paper_ids": [
      2190
    ],
    "papers_without_artifact_ids": [
      3882
    ]
  },
  {
    "name": "Joonsang Baek",
    "display_name": "Joonsang Baek",
    "affiliation": "University of Wollongong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AudioMarkNet: Audio Watermarking for Deepfake Speech Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6171,
    "paper_ids": [
      2190
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Federico Mazzone",
    "display_name": "Federico Mazzone",
    "affiliation": "University of Twente",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Ranking, Order Statistics, and Sorting under CKKS",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6172,
    "paper_ids": [
      1438
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Neelu S. Kalani",
    "display_name": "Neelu S. Kalani",
    "affiliation": "EPFL",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Save what must be saved: Secure context switching with Sailor",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6173,
    "paper_ids": [
      3775
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wojciech Ozga",
    "display_name": "Wojciech Ozga",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Save what must be saved: Secure context switching with Sailor",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6174,
    "paper_ids": [
      3775
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maverick Woo",
    "display_name": "Maverick Woo",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TRex: Practical Type Reconstruction for Binary Code",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6175,
    "paper_ids": [
      719
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Emmanuel Tweneboah",
    "display_name": "Emmanuel Tweneboah",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"No, I Can't Be a Security Personnel on Your Phone\": Security and Privacy Threats From Sharing Infrastructure in Rural Ghana",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6176,
    "paper_ids": [
      3011
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yixin Zou",
    "display_name": "Yixin Zou",
    "affiliation": "Max Planck Society",
    "artifact_count": 1,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 5,
      "PETS": 5
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 2,
        "2021": 2
      },
      "PETS": {
        "2020": 1,
        "2025": 3,
        "2024": 1
      }
    },
    "artifact_rate": 10.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"No, I Can't Be a Security Personnel on Your Phone\": Security and Privacy Threats From Sharing Infrastructure in Rural Ghana",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacy perceptions and behaviors towards targeted advertising on social media a crosscountry study on the effect of culture and religion",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "what are they gonna do with my data privacy expectations concerns and behaviors in virtual reality",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "misalignments and demographic differences in expected and actual privacy settings on facebook",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "digital security perceptions and practices around the world a weird versus nonweird comparison",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "crosscontextual examination of older adults privacy concerns behaviors and vulnerabilities",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "aunties strangers and the fbi online privacy concerns and experiences of muslimamerican women",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "now im a bit angry individuals awareness perception and responses to data breaches that affected them",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "the role of computer security customer support in helping survivors of intimate partner violence",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "listen only when spoken to interpersonal communication cues as smart speaker privacy controls",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 6177,
    "paper_ids": [
      3011
    ],
    "papers_without_artifact_ids": [
      5399,
      1825,
      4381,
      3012,
      4030,
      4383,
      874,
      4287,
      4384
    ]
  },
  {
    "name": "Bing Shi",
    "display_name": "Bing Shi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "X.509DoS: Exploiting and Detecting Denial-of-Service Vulnerabilities in Cryptographic Libraries using Crafted X.509 Certificates",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6178,
    "paper_ids": [
      2451
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenchao Li",
    "display_name": "Wenchao Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "X.509DoS: Exploiting and Detecting Denial-of-Service Vulnerabilities in Cryptographic Libraries using Crafted X.509 Certificates",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6179,
    "paper_ids": [
      2451
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuchen Wang",
    "display_name": "Yuchen Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "X.509DoS: Exploiting and Detecting Denial-of-Service Vulnerabilities in Cryptographic Libraries using Crafted X.509 Certificates",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "squirrel a scalable secure twoparty computation framework for training gradient boosting decision tree",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "privacypreserving and standardcompatible aka protocol for 5g",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6180,
    "paper_ids": [
      2451
    ],
    "papers_without_artifact_ids": [
      4308,
      5569
    ]
  },
  {
    "name": "Xiaolong Bai",
    "display_name": "Xiaolong Bai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "X.509DoS: Exploiting and Detecting Denial-of-Service Vulnerabilities in Cryptographic Libraries using Crafted X.509 Certificates",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ihunter hunting privacy violations at scale in the software supply chain on ios",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "lalaine measuring and characterizing noncompliance of apple privacy labels",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6181,
    "paper_ids": [
      2451
    ],
    "papers_without_artifact_ids": [
      2454,
      2455
    ]
  },
  {
    "name": "Ziqing Yang 0002",
    "display_name": "Ziqing Yang",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream Applications",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "securitynet assessing machine learning vulnerabilities on public models",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6182,
    "paper_ids": [
      191
    ],
    "papers_without_artifact_ids": [
      199
    ]
  },
  {
    "name": "Jinwen He",
    "display_name": "Jinwen He",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "drmi a dataset reduction technology based on mutual information for blackbox attacks",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6183,
    "paper_ids": [
      1853
    ],
    "papers_without_artifact_ids": [
      1869
    ]
  },
  {
    "name": "Yiyang Lu",
    "display_name": "Yiyang Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6184,
    "paper_ids": [
      1853
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zijin Lin",
    "display_name": "Zijin Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "skillexplorer understanding the behavior of skills in large scale",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6185,
    "paper_ids": [
      1853
    ],
    "papers_without_artifact_ids": [
      1871
    ]
  },
  {
    "name": "Yue Zhao 0018",
    "display_name": "Yue Zhao",
    "affiliation": "Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aemorpher improve physical robustness of adversarial objects against lidarbased detectors via object reconstruction",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "devils whisper a general approach for physical adversarial attacks against commercial blackbox speech recognition devices",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6186,
    "paper_ids": [
      1853
    ],
    "papers_without_artifact_ids": [
      1861,
      614
    ]
  },
  {
    "name": "Yiming Zhu",
    "display_name": "Yiming Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6187,
    "paper_ids": [
      5570
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenchao Huang 0001",
    "display_name": "Wenchao Huang",
    "affiliation": "City University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automated inference on financial security of ethereum smart contracts",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "smartverif push the limit of automation capability of verifying security protocols by dynamic strategies",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6188,
    "paper_ids": [
      5570
    ],
    "papers_without_artifact_ids": [
      5571,
      5572
    ]
  },
  {
    "name": "Yan Xiong 0001",
    "display_name": "Yan Xiong",
    "affiliation": "USTC",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automated inference on financial security of ethereum smart contracts",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "smartverif push the limit of automation capability of verifying security protocols by dynamic strategies",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6189,
    "paper_ids": [
      5570
    ],
    "papers_without_artifact_ids": [
      5571,
      5572
    ]
  },
  {
    "name": "Lan Zhang 0002",
    "display_name": "Lan Zhang",
    "affiliation": "USTC",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploiting Task-Level Vulnerabilities: An Automatic Jailbreak Attack and Defense Benchmarking for LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deepcontract controllable authorization of deep learning models",
        "conference": "ACSAC",
        "year": 2023
      }
    ],
    "author_id": 6190,
    "paper_ids": [
      4465
    ],
    "papers_without_artifact_ids": [
      5573
    ]
  },
  {
    "name": "Xinben Gao",
    "display_name": "Xinben Gao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploiting Task-Level Vulnerabilities: An Automatic Jailbreak Attack and Defense Benchmarking for LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pcat functionality and data stealing from split learning by pseudoclient attack",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6191,
    "paper_ids": [
      4465
    ],
    "papers_without_artifact_ids": [
      5574
    ]
  },
  {
    "name": "Liuyi Yao",
    "display_name": "Liuyi Yao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploiting Task-Level Vulnerabilities: An Automatic Jailbreak Attack and Defense Benchmarking for LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6192,
    "paper_ids": [
      4465
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinke Song",
    "display_name": "Jinke Song",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploiting Task-Level Vulnerabilities: An Automatic Jailbreak Attack and Defense Benchmarking for LLMs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6193,
    "paper_ids": [
      4465
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yong Yang 0017",
    "display_name": "Yong Yang",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PRSA: Prompt Stealing Attacks against Real-World Prompt Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6194,
    "paper_ids": [
      1541
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qingming Li",
    "display_name": "Qingming Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PRSA: Prompt Stealing Attacks against Real-World Prompt Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6195,
    "paper_ids": [
      1541
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Oubo Ma",
    "display_name": "Oubo Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PRSA: Prompt Stealing Attacks against Real-World Prompt Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6196,
    "paper_ids": [
      1541
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zonghui Wang",
    "display_name": "Zonghui Wang",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PRSA: Prompt Stealing Attacks against Real-World Prompt Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6197,
    "paper_ids": [
      1541
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yandong Gao",
    "display_name": "Yandong Gao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PRSA: Prompt Stealing Attacks against Real-World Prompt Services",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6198,
    "paper_ids": [
      1541
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Changlong Yu",
    "display_name": "Changlong Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TAPAS: An Efficient Online APT Detection with Task-guided Process Provenance Graph Segmentation and Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6199,
    "paper_ids": [
      1125
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Boyu Kuang",
    "display_name": "Boyu Kuang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TAPAS: An Efficient Online APT Detection with Task-guided Process Provenance Graph Segmentation and Analysis",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6200,
    "paper_ids": [
      1125
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sunpreet S. Arora",
    "display_name": "Sunpreet S. Arora",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Detecting Compromise of Passkey Storage on the Cloud",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacypreserving financial anomaly detection via federated learning multiparty computation",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "compact approximating complex activation functions for secure computation",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 6201,
    "paper_ids": [
      2543
    ],
    "papers_without_artifact_ids": [
      5575,
      2548
    ]
  },
  {
    "name": "Ke Coby Wang",
    "display_name": "Ke Coby Wang",
    "affiliation": "Washington State University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 0,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {},
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Detecting Compromise of Passkey Storage on the Cloud",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bernoulli honeywords",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "using amnesia to detect credential database breaches",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "detecting stuffing of a users credentials at her own accounts",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6202,
    "paper_ids": [
      2543
    ],
    "papers_without_artifact_ids": [
      4169,
      4172,
      4174
    ]
  },
  {
    "name": "Carson Powers",
    "display_name": "Carson Powers",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"Threat modeling is very formal, it's very technical, and also very hard to do correctly\": Investigating Threat Modeling Practices in Open-Source Software Projects",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "there are rabbit holes i want to go down that im not allowed to go down an investigation of security expert threat modeling practices for medical devices",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "i can say im john travoltabut im not john travolta investigating the impact of changes to social media verification policies on user perceptions of verified accounts",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6203,
    "paper_ids": [
      1244
    ],
    "papers_without_artifact_ids": [
      2281,
      1145
    ]
  },
  {
    "name": "Ronald E. Thompson III",
    "display_name": "Ronald E. Thompson III",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"Threat modeling is very formal, it's very technical, and also very hard to do correctly\": Investigating Threat Modeling Practices in Open-Source Software Projects",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "there are rabbit holes i want to go down that im not allowed to go down an investigation of security expert threat modeling practices for medical devices",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6204,
    "paper_ids": [
      1244
    ],
    "papers_without_artifact_ids": [
      2281
    ]
  },
  {
    "name": "Sai Ritvik Tanksalkar",
    "display_name": "Sai Ritvik Tanksalkar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LEMIX: Enabling Testing of Embedded Applications as Linux Applications",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6205,
    "paper_ids": [
      1774
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Srihari Danduri",
    "display_name": "Srihari Danduri",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LEMIX: Enabling Testing of Embedded Applications as Linux Applications",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6206,
    "paper_ids": [
      1774
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Paschal C. Amusuo",
    "display_name": "Paschal C. Amusuo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LEMIX: Enabling Testing of Embedded Applications as Linux Applications",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6207,
    "paper_ids": [
      1774
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aravind Kumar Machiry",
    "display_name": "Aravind Kumar Machiry",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LEMIX: Enabling Testing of Embedded Applications as Linux Applications",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6208,
    "paper_ids": [
      1774
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maryam Motallebighomi",
    "display_name": "Maryam Motallebighomi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "eSIMplicity or eSIMplification? Privacy and Security Risks in the eSIM Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "makeshift security analysis of wireless gear shifting in bicycles",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6209,
    "paper_ids": [
      5576
    ],
    "papers_without_artifact_ids": [
      3204
    ]
  },
  {
    "name": "Jason Veara",
    "display_name": "Jason Veara",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "eSIMplicity or eSIMplification? Privacy and Security Risks in the eSIM Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6210,
    "paper_ids": [
      5576
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Evangelos Bitsikas",
    "display_name": "Evangelos Bitsikas",
    "affiliation": "Northeastern University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 1
      },
      "ACSAC": {
        "2021": 1,
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "eSIMplicity or eSIMplification? Privacy and Security Risks in the eSIM Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "amplifying threats the role of multisender coordination in smstimingbased location inference attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "freaky leaky sms extracting user locations by analyzing sms timings",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "you have been warned abusing 5gs warning and emergency systems",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "dont hand it over vulnerabilities in the handover procedure of cellular telecommunications",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 6211,
    "paper_ids": [
      5576
    ],
    "papers_without_artifact_ids": [
      3077,
      3078,
      3080,
      3081
    ]
  },
  {
    "name": "Aanjhan Ranganathan",
    "display_name": "Aanjhan Ranganathan",
    "affiliation": "Northeastern University",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "USENIXSEC": 6,
      "ACSAC": 1,
      "CHES": 0,
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2023": 2,
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2022": 1
      },
      "CHES": {},
      "PETS": {
        "2022": 1,
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 11.1,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "eSIMplicity or eSIMplification? Privacy and Security Risks in the eSIM Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "amplifying threats the role of multisender coordination in smstimingbased location inference attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "makeshift security analysis of wireless gear shifting in bicycles",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "track you a deep dive into safety alerts for apple airtags",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "freaky leaky sms extracting user locations by analyzing sms timings",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "framing frames bypassing wifi encryption by manipulating transmit queues",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "on the implications of spoofing and jamming aviation datalink applications",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "privacypreserving positioning in wifi fine timing measurement",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "an experimental study of gps spoofing and takeover attacks on uavs",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 6212,
    "paper_ids": [
      5576
    ],
    "papers_without_artifact_ids": [
      3077,
      3204,
      5577,
      3078,
      3270,
      4362,
      5578,
      1763
    ]
  },
  {
    "name": "Yiyang Chen",
    "display_name": "Yiyang Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IDFuzz: Intelligent Directed Grey-box Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6213,
    "paper_ids": [
      1886
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Long Wang",
    "display_name": "Long Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IDFuzz: Intelligent Directed Grey-box Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "being transparent is merely the beginning enforcing purpose limitation with polynomial approximation",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6214,
    "paper_ids": [
      1886
    ],
    "papers_without_artifact_ids": [
      1578
    ]
  },
  {
    "name": "Wenyu Zhu",
    "display_name": "Wenyu Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IDFuzz: Intelligent Directed Grey-box Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "statefuzz system callbased stateaware linux driver fuzzing",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 6215,
    "paper_ids": [
      1886
    ],
    "papers_without_artifact_ids": [
      1897
    ]
  },
  {
    "name": "Changhua Luo",
    "display_name": "Changhua Luo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IDFuzz: Intelligent Directed Grey-box Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automatic library fuzzing through api relation evolvement",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 6216,
    "paper_ids": [
      1886
    ],
    "papers_without_artifact_ids": [
      2821
    ]
  },
  {
    "name": "Nuoqi Gui",
    "display_name": "Nuoqi Gui",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IDFuzz: Intelligent Directed Grey-box Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6217,
    "paper_ids": [
      1886
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zheyu Ma",
    "display_name": "Zheyu Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IDFuzz: Intelligent Directed Grey-box Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "truman constructing device behavior models from os drivers to fuzz virtual devices",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "enclavefuzz finding vulnerabilities in sgx applications",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "kextfuzz fuzzing macos kernel extensions on apple silicon via exploiting mitigations",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "statefuzz system callbased stateaware linux driver fuzzing",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 6218,
    "paper_ids": [
      1886
    ],
    "papers_without_artifact_ids": [
      20,
      1891,
      1895,
      1897
    ]
  },
  {
    "name": "Xingjian Zhang 0009",
    "display_name": "Xingjian Zhang",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IDFuzz: Intelligent Directed Grey-box Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "minder faulty machine detection for largescale distributed model training",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 6219,
    "paper_ids": [
      1886
    ],
    "papers_without_artifact_ids": [
      3668
    ]
  },
  {
    "name": "Bingkai Su",
    "display_name": "Bingkai Su",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IDFuzz: Intelligent Directed Grey-box Fuzzing",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6220,
    "paper_ids": [
      1886
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Adam Hastings",
    "display_name": "Adam Hastings",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Voluntary Investment, Mandatory Minimums, or Cyber Insurance: What Minimizes Losses?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6221,
    "paper_ids": [
      5579
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simha Sethumadhavan",
    "display_name": "Simha Sethumadhavan",
    "affiliation": "Columbia University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Voluntary Investment, Mandatory Minimums, or Cyber Insurance: What Minimizes Losses?",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6222,
    "paper_ids": [
      5579
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Apostolos Mavrogiannakis",
    "display_name": "Apostolos Mavrogiannakis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OBLIVIATOR: OBLIVIous Parallel Joins and other OperATORs in Shared Memory Environments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6223,
    "paper_ids": [
      2417
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minos N. Garofalakis",
    "display_name": "Minos N. Garofalakis",
    "affiliation": "Technical University of Crete, School of Electronic and Computer Engineering, Chania, Greece",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OBLIVIATOR: OBLIVIous Parallel Joins and other OperATORs in Shared Memory Environments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6224,
    "paper_ids": [
      2417
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hung-Mao Chen",
    "display_name": "Hung-Mao Chen",
    "affiliation": "George Mason University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TYPEPULSE: Detecting Type Confusion Bugs in Rust Programs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6225,
    "paper_ids": [
      1458
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jingyuan Ding",
    "display_name": "Jingyuan Ding",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Does Finality Gadget Finalize Your Block? A Case Study of Binance Consensus",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6226,
    "paper_ids": [
      3188
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qin Wang 0008",
    "display_name": "Qin Wang",
    "affiliation": "CSIRO, Data61, Eveleigh, Australia",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "PETS": {
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Does Finality Gadget Finalize Your Block? A Case Study of Binance Consensus",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "eclipse attacks on moneros peertopeer network",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "janus enhancing asynchronous common subset with trusted hardware",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "sok teeassisted confidential smart contract",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 6227,
    "paper_ids": [
      3188
    ],
    "papers_without_artifact_ids": [
      5580,
      3645,
      3189
    ]
  },
  {
    "name": "Keting Jia",
    "display_name": "Keting Jia",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "CHES": {
        "2024": 1,
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Does Finality Gadget Finalize Your Block? A Case Study of Binance Consensus",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improving mpcith with preprocessing mask is all you need",
        "conference": "CHES",
        "year": 2025
      },
      {
        "title": "highperformance hardware implementation of mpcith and picnic3",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "automatic search of meetinthemiddle differential fault analysis on aeslike ciphers",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 6228,
    "paper_ids": [
      3188
    ],
    "papers_without_artifact_ids": [
      5581,
      5582,
      5583
    ]
  },
  {
    "name": "Haibin Zhang",
    "display_name": "Haibin Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "EUROSYS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Does Finality Gadget Finalize Your Block? A Case Study of Binance Consensus",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dashing and star byzantine fault tolerance with weak certificates",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "waterbear practical asynchronous bft matching security guarantees of partially synchronous bft",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6229,
    "paper_ids": [
      3188
    ],
    "papers_without_artifact_ids": [
      3191,
      3108
    ]
  },
  {
    "name": "Xin Zhang 0146",
    "display_name": "Xin Zhang",
    "affiliation": "Fudan University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Demystifying the (In)Security of QR Code-based Login in Real-world Deployments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an empirical study on fingerprint api misuse with lifecycle analysis in realworld android apps",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 6230,
    "paper_ids": [
      241
    ],
    "papers_without_artifact_ids": [
      246
    ]
  },
  {
    "name": "Xiaohan Zhang 0001",
    "display_name": "Xiaohan Zhang",
    "affiliation": "Fudan University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2022": 1,
        "2025": 1
      },
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Demystifying the (In)Security of QR Code-based Login in Real-world Deployments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an empirical study on fingerprint api misuse with lifecycle analysis in realworld android apps",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "the skeleton keys a large scale analysis of credential leakage in miniapps",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "identity confusion in webviewbased mobile appinapp ecosystems",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "bscout direct whole patch presence test for java executables",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6231,
    "paper_ids": [
      241
    ],
    "papers_without_artifact_ids": [
      246,
      244,
      254,
      261
    ]
  },
  {
    "name": "Bo Zhao",
    "display_name": "Bo Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Demystifying the (In)Security of QR Code-based Login in Real-world Deployments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an empirical study on fingerprint api misuse with lifecycle analysis in realworld android apps",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 6232,
    "paper_ids": [
      241
    ],
    "papers_without_artifact_ids": [
      246
    ]
  },
  {
    "name": "Yuhong Nan",
    "display_name": "Yuhong Nan",
    "affiliation": "Sun Yat-sen University",
    "artifact_count": 1,
    "total_papers": 10,
    "total_papers_by_conf": {
      "USENIXSEC": 9,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 2,
        "2022": 1,
        "2025": 1,
        "2021": 2
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 10.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Demystifying the (In)Security of QR Code-based Login in Real-world Deployments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "leaking the privacy of groups and more understanding privacy risks of crossapp content sharing in mobile ecosystem",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "navigating the privacy compliance maze understanding risks with privacyconfigurable mobile sdks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "magic detecting advanced persistent threats via masked graph representation learning",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "airtag towards automated attack investigation by unsupervised learning with log texts",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "are you spying on me largescale analysis on iot data exposure through companion apps",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "profactory improving iot security via formalized protocol customization",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "understanding malicious crosslibrary data harvesting on android",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "atlas a sequencebased learning approach for attack investigation",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "blesa spoofing attacks against reconnections in bluetooth low energy",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6233,
    "paper_ids": [
      241
    ],
    "papers_without_artifact_ids": [
      248,
      605,
      5584,
      5585,
      608,
      26,
      612,
      1752,
      30
    ]
  },
  {
    "name": "Zhichen Liu",
    "display_name": "Zhichen Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Demystifying the (In)Security of QR Code-based Login in Real-world Deployments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an empirical study on fingerprint api misuse with lifecycle analysis in realworld android apps",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 6234,
    "paper_ids": [
      241
    ],
    "papers_without_artifact_ids": [
      246
    ]
  },
  {
    "name": "Jianzhou Chen",
    "display_name": "Jianzhou Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Demystifying the (In)Security of QR Code-based Login in Real-world Deployments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6235,
    "paper_ids": [
      241
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Huijun Zhou",
    "display_name": "Huijun Zhou",
    "affiliation": "Towson University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Demystifying the (In)Security of QR Code-based Login in Real-world Deployments",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6236,
    "paper_ids": [
      241
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tristan Benoit",
    "display_name": "Tristan Benoit",
    "affiliation": "Universität der Bundeswehr München",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6237,
    "paper_ids": [
      5586
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yunru Wang",
    "display_name": "Yunru Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6238,
    "paper_ids": [
      5586
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Moritz Dannehl",
    "display_name": "Moritz Dannehl",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6239,
    "paper_ids": [
      5586
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Johannes Kinder",
    "display_name": "Johannes Kinder",
    "affiliation": "LMU Munich",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2025": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "probabilistic naming of functions in stripped binaries",
        "conference": "ACSAC",
        "year": 2020
      },
      {
        "title": "everything old is new again binary security of webassembly",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6240,
    "paper_ids": [
      5586
    ],
    "papers_without_artifact_ids": [
      3020,
      5587
    ]
  },
  {
    "name": "Yi Cai",
    "display_name": "Yi Cai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Vest: Verified, Secure, High-Performance Parsing and Serialization for Rust",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6241,
    "paper_ids": [
      720
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Milijana Surbatovich",
    "display_name": "Milijana Surbatovich",
    "affiliation": "Univ. of Maryland - College Park",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Vest: Verified, Secure, High-Performance Parsing and Serialization for Rust",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how risky are real users ifttt applets",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6242,
    "paper_ids": [
      720
    ],
    "papers_without_artifact_ids": [
      1827
    ]
  },
  {
    "name": "Daniele Lain",
    "display_name": "Daniele Lain",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "URL Inspection Tasks: Helping Users Detect Phishing Links in Emails",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "phishing attacks against password manager browser extensions",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 6243,
    "paper_ids": [
      1177
    ],
    "papers_without_artifact_ids": [
      1229
    ]
  },
  {
    "name": "Kari Kostiainen",
    "display_name": "Kari Kostiainen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "CHES": 1,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2019": 1
      },
      "CHES": {
        "2022": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "URL Inspection Tasks: Helping Users Detect Phishing Links in Emails",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "composite enclaves towards disaggregated trusted execution",
        "conference": "CHES",
        "year": 2022
      },
      {
        "title": "drsgx automated and adjustable sidechannel protection for sgx using data location randomization",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 6244,
    "paper_ids": [
      1177
    ],
    "papers_without_artifact_ids": [
      1232,
      1237
    ]
  },
  {
    "name": "Mihael Liskij",
    "display_name": "Mihael Liskij",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Oblivious Digital Tokens",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6245,
    "paper_ids": [
      446
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seongbin Park",
    "display_name": "Seongbin Park",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Chimera: Creating Digitally Signed Fake Photos by Fooling Image Recapture and Deepfake Detectors",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6246,
    "paper_ids": [
      5588
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexander Vilesov",
    "display_name": "Alexander Vilesov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Chimera: Creating Digitally Signed Fake Photos by Fooling Image Recapture and Deepfake Detectors",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6247,
    "paper_ids": [
      5588
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinghuai Zhang",
    "display_name": "Jinghuai Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Chimera: Creating Digitally Signed Fake Photos by Fooling Image Recapture and Deepfake Detectors",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6248,
    "paper_ids": [
      5588
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hossein Khalili",
    "display_name": "Hossein Khalili",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Chimera: Creating Digitally Signed Fake Photos by Fooling Image Recapture and Deepfake Detectors",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6249,
    "paper_ids": [
      5588
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuan Tian",
    "display_name": "Yuan Tian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Chimera: Creating Digitally Signed Fake Photos by Fooling Image Recapture and Deepfake Detectors",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "free wifi is not ultimately free privacy perceptions of users in the us regarding citywide wifi services",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 6250,
    "paper_ids": [
      5588
    ],
    "papers_without_artifact_ids": [
      5589
    ]
  },
  {
    "name": "Achuta Kadambi",
    "display_name": "Achuta Kadambi",
    "affiliation": "Univ. of California - Los Angeles",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Chimera: Creating Digitally Signed Fake Photos by Fooling Image Recapture and Deepfake Detectors",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6251,
    "paper_ids": [
      5588
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nader Sehatbakhsh",
    "display_name": "Nader Sehatbakhsh",
    "affiliation": "University of California, Los Angeles",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Chimera: Creating Digitally Signed Fake Photos by Fooling Image Recapture and Deepfake Detectors",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ida hybrid attestation with support for interrupts and toctou",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 6252,
    "paper_ids": [
      5588
    ],
    "papers_without_artifact_ids": [
      5590
    ]
  },
  {
    "name": "Jungun Ahn",
    "display_name": "Jungun Ahn",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Watch Out Your TV Box: Reversing and Blocking a P2P-based Illegal Streaming Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6253,
    "paper_ids": [
      5591
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sueun Jung",
    "display_name": "Sueun Jung",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Watch Out Your TV Box: Reversing and Blocking a P2P-based Illegal Streaming Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6254,
    "paper_ids": [
      5591
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seungwan Yoo",
    "display_name": "Seungwan Yoo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Watch Out Your TV Box: Reversing and Blocking a P2P-based Illegal Streaming Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6255,
    "paper_ids": [
      5591
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jungheum Park",
    "display_name": "Jungheum Park",
    "affiliation": "Korea University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Watch Out Your TV Box: Reversing and Blocking a P2P-based Illegal Streaming Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6256,
    "paper_ids": [
      5591
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sangjin Lee 0002",
    "display_name": "Sangjin Lee",
    "affiliation": "Korea University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "CHES": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Watch Out Your TV Box: Reversing and Blocking a P2P-based Illegal Streaming Ecosystem",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "softmark software watermarking via a binary function relocation",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 6257,
    "paper_ids": [
      5591
    ],
    "papers_without_artifact_ids": [
      2285
    ]
  },
  {
    "name": "Madelyne Xiao",
    "display_name": "Madelyne Xiao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: Machine Learning for Misinformation Detection",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "account verification on social media user perceptions and paid enrollment",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6258,
    "paper_ids": [
      4276
    ],
    "papers_without_artifact_ids": [
      4274
    ]
  },
  {
    "name": "Jiacheng Du",
    "display_name": "Jiacheng Du",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: On Gradient Leakage in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6259,
    "paper_ids": [
      302
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peng Sun 0003",
    "display_name": "Peng Sun",
    "affiliation": "Hunan University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: On Gradient Leakage in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6260,
    "paper_ids": [
      302
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Neil Gong 0001",
    "display_name": "Neil Gong",
    "affiliation": "Duke University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: On Gradient Leakage in Federated Learning",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok secure humancentered wireless sensing",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 6261,
    "paper_ids": [
      302
    ],
    "papers_without_artifact_ids": [
      5592
    ]
  },
  {
    "name": "Nora Sinong Lu",
    "display_name": "Nora Sinong Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Investigating the Impact of Online Community Involvement on Safety Practices and Perceived Risks Among People Who Use Drugs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6262,
    "paper_ids": [
      3849
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Isaak Hanimann",
    "display_name": "Isaak Hanimann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Investigating the Impact of Online Community Involvement on Safety Practices and Perceived Risks Among People Who Use Drugs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6263,
    "paper_ids": [
      3849
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Janice Jianing Si",
    "display_name": "Janice Jianing Si",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Investigating the Impact of Online Community Involvement on Safety Practices and Perceived Risks Among People Who Use Drugs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6264,
    "paper_ids": [
      3849
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kanye Ye Wang",
    "display_name": "Kanye Ye Wang",
    "affiliation": "University of Macau",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Investigating the Impact of Online Community Involvement on Safety Practices and Perceived Risks Among People Who Use Drugs",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploring user perceptions of security auditing in the web3 ecosystem",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 6265,
    "paper_ids": [
      3849
    ],
    "papers_without_artifact_ids": [
      5226
    ]
  },
  {
    "name": "Jan Drescher",
    "display_name": "Jan Drescher",
    "affiliation": "TU Braunschweig",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HyTrack: Resurrectable and Persistent Tracking Across Android Apps and the Web",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6266,
    "paper_ids": [
      218
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lijie Wu",
    "display_name": "Lijie Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6267,
    "paper_ids": [
      242
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yiming Zhang 0009",
    "display_name": "Yiming Zhang",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "ACSAC": 1,
      "NDSS": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 2,
        "2025": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "NDSS": {
        "2024": 1,
        "2025": 2
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automatic insecurity exploring email autoconfiguration in the wild",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "crossorigin web attacks via http2 server push and signed http exchange",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "understanding the implementation and security implications of protective dns services",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "tickets or privacy understand the ecosystem of chinese ticket grabbing apps",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "into the dark unveiling internal site search abused for black hat seo",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "detecting and characterizing sms spearphishing attacks",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 6268,
    "paper_ids": [
      242
    ],
    "papers_without_artifact_ids": [
      905,
      906,
      909,
      911,
      914,
      918
    ]
  },
  {
    "name": "Hui Jiang",
    "display_name": "Hui Jiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "into the dark unveiling internal site search abused for black hat seo",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6269,
    "paper_ids": [
      242
    ],
    "papers_without_artifact_ids": [
      914
    ]
  },
  {
    "name": "Jia Zhang 0004",
    "display_name": "Jia Zhang",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lowquality training data only a robust framework for detecting encrypted malicious network traffic",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "cross the zone toward a covert domain hijacking via shared dns infrastructure",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6270,
    "paper_ids": [
      242
    ],
    "papers_without_artifact_ids": [
      559,
      913
    ]
  },
  {
    "name": "Wei Guan",
    "display_name": "Wei Guan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6271,
    "paper_ids": [
      242
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nima Naderloui",
    "display_name": "Nima Naderloui",
    "affiliation": "University of Connecticut",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6272,
    "paper_ids": [
      3260
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shenao Yan",
    "display_name": "Shenao Yan",
    "affiliation": "University of Connecticut",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "an llmassisted easytotrigger backdoor attack on code completion models injecting disguised vulnerabilities against strong detection",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "elise a storage efficient logging system powered by redundancy reduction and representation learning",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6273,
    "paper_ids": [
      3260
    ],
    "papers_without_artifact_ids": [
      4328,
      5593
    ]
  },
  {
    "name": "Jie Fu 0003",
    "display_name": "Jie Fu",
    "affiliation": "Fudan University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective",
        "conference": "USENIXSEC",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6274,
    "paper_ids": [
      3260
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "John Zhuang Hui",
    "display_name": "John Zhuang Hui",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6275,
    "paper_ids": [
      2000
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiacheng Ma 0001",
    "display_name": "Jiacheng Ma",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DOLMA: Securing Speculation with the Principle of Transient Non-Observability",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6276,
    "paper_ids": [
      1625
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Elisa Tsai",
    "display_name": "Elisa Tsai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "PETS": {
        "2023": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DOLMA: Securing Speculation with the Principle of Transient Non-Observability",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "modeling and detecting internet censorship events",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "certainty detecting dns manipulation at scale using tls certificates",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 6277,
    "paper_ids": [
      1625
    ],
    "papers_without_artifact_ids": [
      4294,
      4298
    ]
  },
  {
    "name": "Ofir Weisse",
    "display_name": "Ofir Weisse",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 1,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "SOSP": {
        "2021": 1
      },
      "CHES": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DOLMA: Securing Speculation with the Principle of Transient Non-Observability",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ghost fast flexible userspace delegation of linux scheduling",
        "conference": "SOSP",
        "year": 2021
      }
    ],
    "author_id": 6278,
    "paper_ids": [
      1625
    ],
    "papers_without_artifact_ids": [
      5594
    ]
  },
  {
    "name": "Satish Narayanasamy",
    "display_name": "Satish Narayanasamy",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0,
      "SC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "SOSP": {},
      "SC": {},
      "FAST": {
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DOLMA: Securing Speculation with the Principle of Transient Non-Observability",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "software wear management for persistent memories",
        "conference": "FAST",
        "year": 2019
      }
    ],
    "author_id": 6279,
    "paper_ids": [
      1625
    ],
    "papers_without_artifact_ids": [
      4664
    ]
  },
  {
    "name": "Henry Turner",
    "display_name": "Henry Turner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6280,
    "paper_ids": [
      1760
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ivo Sluganovic",
    "display_name": "Ivo Sluganovic",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "ACSAC": {
        "2017": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "holopair securing shared augmented reality using microsoft hololens",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 6281,
    "paper_ids": [
      1760
    ],
    "papers_without_artifact_ids": [
      2207
    ]
  },
  {
    "name": "Qingying Hao",
    "display_name": "Qingying Hao",
    "affiliation": "ShanghaiTech University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CADE: Detecting and Explaining Concept Drift Samples for Security Applications",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "it doesnt look like anything to me using diffusion model to subvert visual phishing detectors",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "how to cover up anomalous accesses to electronic health records",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6282,
    "paper_ids": [
      936
    ],
    "papers_without_artifact_ids": [
      1137,
      1533
    ]
  },
  {
    "name": "Arridhana Ciptadi",
    "display_name": "Arridhana Ciptadi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CADE: Detecting and Explaining Concept Drift Samples for Security Applications",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6283,
    "paper_ids": [
      936
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ali Ahmadzadeh",
    "display_name": "Ali Ahmadzadeh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CADE: Detecting and Explaining Concept Drift Samples for Security Applications",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6284,
    "paper_ids": [
      936
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Oleksii Starov",
    "display_name": "Oleksii Starov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "SC": {},
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6286,
    "paper_ids": [
      1116
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Quan Chen",
    "display_name": "Quan Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "beehive a scalable disaggregated memory runtime exploiting asynchrony of multithreaded programs",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 6287,
    "paper_ids": [
      1116
    ],
    "papers_without_artifact_ids": [
      2780
    ]
  },
  {
    "name": "Shinan Liu",
    "display_name": "Shinan Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cato endtoend optimization of mlbased traffic analysis pipelines",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 6288,
    "paper_ids": [
      1529
    ],
    "papers_without_artifact_ids": [
      3331
    ]
  },
  {
    "name": "Xiang Cheng",
    "display_name": "Xiang Cheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aexnotify thwarting precise singlestepping attacks through interrupt awareness for intel sgx enclaves",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6289,
    "paper_ids": [
      1529
    ],
    "papers_without_artifact_ids": [
      663
    ]
  },
  {
    "name": "Hanchao Yang",
    "display_name": "Hanchao Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6290,
    "paper_ids": [
      1529
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuanchao Shu",
    "display_name": "Yuanchao Shu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 4,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "NSDI": {
        "2024": 1,
        "2023": 2,
        "2022": 1
      },
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vulcan automatic query planning for live ml analytics",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "recl responsive resourceefficient continuous learning for video analytics",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "gemel model merging for memoryefficient realtime video analytics at the edge",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "my face my rules enabling personalized protection against unacceptable face editing",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "ekya continuous learning of video analytics models on edge compute servers",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 6291,
    "paper_ids": [
      1529
    ],
    "papers_without_artifact_ids": [
      1948,
      2623,
      2621,
      4636,
      487
    ]
  },
  {
    "name": "Xiaoran Weng",
    "display_name": "Xiaoran Weng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6292,
    "paper_ids": [
      1529
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ping Guo 0007",
    "display_name": "Ping Guo",
    "affiliation": "City University of Hong Kong, Hong Kong, SAR, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6293,
    "paper_ids": [
      1529
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kexiong Curtis Zeng",
    "display_name": "Kexiong Curtis Zeng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6294,
    "paper_ids": [
      1529
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yaling Yang",
    "display_name": "Yaling Yang",
    "affiliation": "Yale University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6295,
    "paper_ids": [
      1529
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Moinuddin K. Qureshi",
    "display_name": "Moinuddin K. Qureshi",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "ATC": {},
      "FAST": {
        "2017": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flashblox achieving both performance isolation and uniform lifetime for virtualized ssds",
        "conference": "FAST",
        "year": 2017
      }
    ],
    "author_id": 6296,
    "paper_ids": [
      2584
    ],
    "papers_without_artifact_ids": [
      3469
    ]
  },
  {
    "name": "Jeongseok Son",
    "display_name": "Jeongseok Son",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "civet an efficient java partitioning framework for hardware enclaves",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6297,
    "paper_ids": [
      670
    ],
    "papers_without_artifact_ids": [
      680
    ]
  },
  {
    "name": "Griffin Prechter",
    "display_name": "Griffin Prechter",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6298,
    "paper_ids": [
      670
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rishabh Poddar",
    "display_name": "Rishabh Poddar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 3,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2021": 2
      },
      "NSDI": {
        "2018": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "senate a maliciouslysecure mpc platform for collaborative analytics",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "visor privacypreserving video analytics as a cloud service",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "safebricks shielding network functions in the cloud",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 6299,
    "paper_ids": [
      670
    ],
    "papers_without_artifact_ids": [
      675,
      678,
      681
    ]
  },
  {
    "name": "Ryan Deng",
    "display_name": "Ryan Deng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "senate a maliciouslysecure mpc platform for collaborative analytics",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6300,
    "paper_ids": [
      468
    ],
    "papers_without_artifact_ids": [
      675
    ]
  },
  {
    "name": "Ramiro Camino",
    "display_name": "Ramiro Camino",
    "affiliation": "Universit du Luxembourg",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6301,
    "paper_ids": [
      2998
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matthew Rossi",
    "display_name": "Matthew Rossi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SEApp: Bringing Mandatory Access Control to Android Apps",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6302,
    "paper_ids": [
      4473
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dario Facchinetti",
    "display_name": "Dario Facchinetti",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SEApp: Bringing Mandatory Access Control to Android Apps",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6303,
    "paper_ids": [
      4473
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marco Rosa",
    "display_name": "Marco Rosa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SEApp: Bringing Mandatory Access Control to Android Apps",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6304,
    "paper_ids": [
      4473
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stefano Paraboschi",
    "display_name": "Stefano Paraboschi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SEApp: Bringing Mandatory Access Control to Android Apps",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6305,
    "paper_ids": [
      4473
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Omer Akgul",
    "display_name": "Omer Akgul",
    "affiliation": "University of Maryland",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "USENIXSEC": 6
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2025": 2,
        "2021": 2
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "as advertised understanding the impact of influencer vpn ads",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "privacy solution or menace investigating perceptions of radiofrequency sensing",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "a decade of privacyrelevant android app reviews large scale trends",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "bug hunters perspectives on the challenges and benefits of the bug bounty ecosystem",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "comparing security and privacy attitudes among us users of different smartphone and smartspeaker platforms",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6306,
    "paper_ids": [
      1260
    ],
    "papers_without_artifact_ids": [
      1264,
      2503,
      1269,
      1271,
      1275
    ]
  },
  {
    "name": "Wei Bai 0004",
    "display_name": "Wei Bai",
    "affiliation": "University of Manchester",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6307,
    "paper_ids": [
      1260
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shruti Das",
    "display_name": "Shruti Das",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "comparing security and privacy attitudes among us users of different smartphone and smartspeaker platforms",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6308,
    "paper_ids": [
      1260
    ],
    "papers_without_artifact_ids": [
      1275
    ]
  },
  {
    "name": "Sunbeom So",
    "display_name": "Sunbeom So",
    "affiliation": "Korea University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6309,
    "paper_ids": [
      5595
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seongjoon Hong",
    "display_name": "Seongjoon Hong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6310,
    "paper_ids": [
      5595
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hakjoo Oh",
    "display_name": "Hakjoo Oh",
    "affiliation": "Korea University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "v1scan discovering 1day vulnerabilities in reused cc opensource software components using code classification techniques",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6311,
    "paper_ids": [
      5595
    ],
    "papers_without_artifact_ids": [
      5596
    ]
  },
  {
    "name": "Ivan Puddu",
    "display_name": "Ivan Puddu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "composite enclaves towards disaggregated trusted execution",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 6312,
    "paper_ids": [
      1226
    ],
    "papers_without_artifact_ids": [
      1232
    ]
  },
  {
    "name": "Moritz Schneider 0001",
    "display_name": "Moritz Schneider",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "composite enclaves towards disaggregated trusted execution",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 6313,
    "paper_ids": [
      1226
    ],
    "papers_without_artifact_ids": [
      1232
    ]
  },
  {
    "name": "Michael Brengel",
    "display_name": "Michael Brengel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "YARIX: Scalable YARA-based Malware Intelligence",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6314,
    "paper_ids": [
      850
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marc Damie",
    "display_name": "Marc Damie",
    "affiliation": "University of Twente / Inria",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6315,
    "paper_ids": [
      1439
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "William J. Tolley",
    "display_name": "William J. Tolley",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Blind In/On-Path Attacks and Applications to VPNs",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6316,
    "paper_ids": [
      4476
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Beau Kujath",
    "display_name": "Beau Kujath",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Blind In/On-Path Attacks and Applications to VPNs",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6317,
    "paper_ids": [
      4476
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohammad Taha Khan",
    "display_name": "Mohammad Taha Khan",
    "affiliation": "University of Connecticut",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Blind In/On-Path Attacks and Applications to VPNs",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "helping users automatically find and manage sensitive expendable files in cloud storage",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6318,
    "paper_ids": [
      4476
    ],
    "papers_without_artifact_ids": [
      5597
    ]
  },
  {
    "name": "Narseo Vallina-Rodriguez",
    "display_name": "Narseo Vallina-Rodriguez",
    "affiliation": "IMDEA Networks Institute",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "PETS": 6,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      },
      "PETS": {
        "2020": 2,
        "2023": 1,
        "2025": 3
      },
      "NDSS": {}
    },
    "artifact_rate": 12.5,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Blind In/On-Path Attacks and Applications to VPNs",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "your signal their data an empirical privacy analysis of wirelessscanning sdks in android",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "tracking without borders studying the role of webviews in bridging mobile and web tracking",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "the effect of platform policies on app privacy compliance a study of childdirected apps",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "not your average app a largescale privacy analysis of android browsers",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "log its big its heavy its filled with personal data measuring the logging of sensitive information in the android ecosystem",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "angel or devil a privacy study of mobile parental control apps",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "the price is not right comparing privacy in free and paid apps",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 6319,
    "paper_ids": [
      4476
    ],
    "papers_without_artifact_ids": [
      5598,
      5599,
      3922,
      2927,
      3925,
      976,
      3928
    ]
  },
  {
    "name": "Thomas Nyman",
    "display_name": "Thomas Nyman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PACStack: an Authenticated Call Stack",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6320,
    "paper_ids": [
      1193
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jan-Erik Ekberg",
    "display_name": "Jan-Erik Ekberg",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PACStack: an Authenticated Call Stack",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6321,
    "paper_ids": [
      1193
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Binbin Liu",
    "display_name": "Binbin Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6322,
    "paper_ids": [
      2257
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junfu Shen",
    "display_name": "Junfu Shen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6323,
    "paper_ids": [
      2257
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qilong Zheng",
    "display_name": "Qilong Zheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6324,
    "paper_ids": [
      2257
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jing Li 0047",
    "display_name": "Jing Li",
    "affiliation": "University of Science and Technology of China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6325,
    "paper_ids": [
      2257
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dongpeng Xu 0001",
    "display_name": "Dongpeng Xu",
    "affiliation": "University of New Hampshire",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6326,
    "paper_ids": [
      2257
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xian Wu 0007",
    "display_name": "Xian Wu",
    "affiliation": "Meta",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Adversarial Policy Training against Deep Reinforcement Learning",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "patrol provable defense against adversarial policy in twoplayer games",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6327,
    "paper_ids": [
      937
    ],
    "papers_without_artifact_ids": [
      942
    ]
  },
  {
    "name": "Hua Wei 0001",
    "display_name": "Hua Wei",
    "affiliation": "Arizona State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Adversarial Policy Training against Deep Reinforcement Learning",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6328,
    "paper_ids": [
      937
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jannik Lorenz",
    "display_name": "Jannik Lorenz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6329,
    "paper_ids": [
      414
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Justin Tracey",
    "display_name": "Justin Tracey",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6330,
    "paper_ids": [
      1284
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seyed Mohammadjavad Seyed Talebi",
    "display_name": "Seyed Mohammadjavad Seyed Talebi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Undo Workarounds for Kernel Bugs",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6331,
    "paper_ids": [
      2221
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhihao Yao 0001",
    "display_name": "Zhihao Yao",
    "affiliation": "NJIT",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Undo Workarounds for Kernel Bugs",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "formal trust and threat modeling using large language models",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "gleefuzz fuzzing webgl through error message guided mutation",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6332,
    "paper_ids": [
      2221
    ],
    "papers_without_artifact_ids": [
      5600,
      25
    ]
  },
  {
    "name": "Daniel Austin",
    "display_name": "Daniel Austin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Undo Workarounds for Kernel Bugs",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fuzzgen automatic fuzzer generation",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6333,
    "paper_ids": [
      2221
    ],
    "papers_without_artifact_ids": [
      29
    ]
  },
  {
    "name": "Damian Poddebniak",
    "display_name": "Damian Poddebniak",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2023": 1,
        "2022": 1,
        "2021": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "contenttype multipartoracle tapping into format oracles in email endtoend encryption",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "i dont know why i check this investigating expert users strategies to detect email signature spoofing attacks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "alpaca application layer protocol confusion analyzing and mitigating cracks in tls authentication",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6334,
    "paper_ids": [
      4430
    ],
    "papers_without_artifact_ids": [
      4432,
      959,
      592
    ]
  },
  {
    "name": "Hanno Böck",
    "display_name": "Hanno Böck",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8091,
    "paper_ids": [
      4430
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ahmad Ibrahim 0002",
    "display_name": "Ahmad Ibrahim",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Osiris: Automated Discovery of Microarchitectural Side Channels",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6336,
    "paper_ids": [
      329
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hamed Nemati",
    "display_name": "Hamed Nemati",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "SC": 0,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "SC": {},
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Osiris: Automated Discovery of Microarchitectural Side Channels",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6337,
    "paper_ids": [
      329
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Soo-Jin Moon",
    "display_name": "Soo-Jin Moon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "NSDI": {
        "2019": 1,
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Accurately Measuring Global Risk of Amplification Attacks using AmpMap",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "netsmc a custom symbolic model checker for stateful network verification",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "alembic automated model inference for stateful network functions",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 6338,
    "paper_ids": [
      4477
    ],
    "papers_without_artifact_ids": [
      3406,
      4485
    ]
  },
  {
    "name": "Yucheng Yin",
    "display_name": "Yucheng Yin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Accurately Measuring Global Risk of Amplification Attacks using AmpMap",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6339,
    "paper_ids": [
      4477
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rahul Anand Sharma",
    "display_name": "Rahul Anand Sharma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Accurately Measuring Global Risk of Amplification Attacks using AmpMap",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lumos identifying and localizing diverse hidden iot devices in an unfamiliar environment",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 6340,
    "paper_ids": [
      4477
    ],
    "papers_without_artifact_ids": [
      4484
    ]
  },
  {
    "name": "Yifei Yuan",
    "display_name": "Yifei Yuan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "USENIXSEC": 1,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2021": 1
      },
      "NSDI": {
        "2019": 1,
        "2020": 1,
        "2018": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Accurately Measuring Global Risk of Amplification Attacks using AmpMap",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "netsmc a custom symbolic model checker for stateful network verification",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "alembic automated model inference for stateful network functions",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "efficient and correct test scheduling for ensembles of network policies",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 6341,
    "paper_ids": [
      4477
    ],
    "papers_without_artifact_ids": [
      3406,
      4485,
      3407
    ]
  },
  {
    "name": "Jonathan M. Spring",
    "display_name": "Jonathan M. Spring",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "USENIXSEC": {
        "2020": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "USENIXSEC"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Accurately Measuring Global Risk of Amplification Attacks using AmpMap",
        "conference": "USENIXSEC",
        "year": 2021,
        "badges": [
          "Artifact Evaluated"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "historical analysis of exploit availability timelines",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6342,
    "paper_ids": [
      4477
    ],
    "papers_without_artifact_ids": [
      5601
    ]
  },
  {
    "name": "Anqi Chen",
    "display_name": "Anqi Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FUZZVPN: Finding Vulnerabilities in OpenVPN",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6343,
    "paper_ids": [
      4198
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seyyed Ali Ayati",
    "display_name": "Seyyed Ali Ayati",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Making Acoustic Side-Channel Attacks on Noisy Keyboards Viable with LLM-Assisted Spectrograms' \"Typo\" Correction",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6344,
    "paper_ids": [
      4135
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jin Hyun Park",
    "display_name": "Jin Hyun Park",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Making Acoustic Side-Channel Attacks on Noisy Keyboards Viable with LLM-Assisted Spectrograms' \"Typo\" Correction",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6345,
    "paper_ids": [
      4135
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yichen Cai",
    "display_name": "Yichen Cai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Making Acoustic Side-Channel Attacks on Noisy Keyboards Viable with LLM-Assisted Spectrograms' \"Typo\" Correction",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6346,
    "paper_ids": [
      4135
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junho Lee",
    "display_name": "Junho Lee",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BOOTKITTY: A Stealthy Bootkit-Rootkit Against Modern Operating Systems",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6347,
    "paper_ids": [
      2284
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jihoon Kwon",
    "display_name": "Jihoon Kwon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      },
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BOOTKITTY: A Stealthy Bootkit-Rootkit Against Modern Operating Systems",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6348,
    "paper_ids": [
      2284
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hyuna Seo",
    "display_name": "Hyuna Seo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BOOTKITTY: A Stealthy Bootkit-Rootkit Against Modern Operating Systems",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6349,
    "paper_ids": [
      2284
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Myeongyeol Lee",
    "display_name": "Myeongyeol Lee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BOOTKITTY: A Stealthy Bootkit-Rootkit Against Modern Operating Systems",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6350,
    "paper_ids": [
      2284
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hyungyu Seo",
    "display_name": "Hyungyu Seo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BOOTKITTY: A Stealthy Bootkit-Rootkit Against Modern Operating Systems",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6351,
    "paper_ids": [
      2284
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinho Jung",
    "display_name": "Jinho Jung",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BOOTKITTY: A Stealthy Bootkit-Rootkit Against Modern Operating Systems",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6352,
    "paper_ids": [
      2284
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shujie Zhao",
    "display_name": "Shujie Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Stealth BGP Hijacks with uRPF Filtering",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6353,
    "paper_ids": [
      4093
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Antony Moor",
    "display_name": "Antony Moor",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Extraction of Secrets from 40nm CMOS Gate Dielectric Breakdown Antifuses by FIB Passive Voltage Contrast",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6354,
    "paper_ids": [
      4489
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Slone",
    "display_name": "Daniel Slone",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Extraction of Secrets from 40nm CMOS Gate Dielectric Breakdown Antifuses by FIB Passive Voltage Contrast",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6355,
    "paper_ids": [
      4489
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lain Agan",
    "display_name": "Lain Agan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Extraction of Secrets from 40nm CMOS Gate Dielectric Breakdown Antifuses by FIB Passive Voltage Contrast",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6356,
    "paper_ids": [
      4489
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mario Cop",
    "display_name": "Mario Cop",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Extraction of Secrets from 40nm CMOS Gate Dielectric Breakdown Antifuses by FIB Passive Voltage Contrast",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6357,
    "paper_ids": [
      4489
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maximilian Günther",
    "display_name": "Maximilian Günther",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Prekey Pogo: Investigating Security and Privacy Issues in WhatsApp's Handshake Mechanism",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8092,
    "paper_ids": [
      4111
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aljosha Judmayer",
    "display_name": "Aljosha Judmayer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Prekey Pogo: Investigating Security and Privacy Issues in WhatsApp's Handshake Mechanism",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6359,
    "paper_ids": [
      4111
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Valentin Huber",
    "display_name": "Valentin Huber",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Be Write Back: An in-depth Study of Fault Injection Effects on FRAM Technology",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6360,
    "paper_ids": [
      5602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marc Schink",
    "display_name": "Marc Schink",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "WOOT": 1,
      "CHES": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      },
      "CHES": {
        "2024": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Be Write Back: An in-depth Study of Fault Injection Effects on FRAM Technology",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unlock the door to my secrets but dont forget to glitch a comprehensive analysis of flash erase suppression attacks",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "security and trust in open source security tokens",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "one exploit to rule them all on the security of dropin replacement and counterfeit microcontrollers",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6361,
    "paper_ids": [
      5602
    ],
    "papers_without_artifact_ids": [
      5603,
      5604,
      5605
    ]
  },
  {
    "name": "Vladyslav Zubkov",
    "display_name": "Vladyslav Zubkov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bluetooth Security Testing with BlueToolkit: a Large-Scale Automotive Case Study",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6362,
    "paper_ids": [
      1761
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tommaso Sacchetti",
    "display_name": "Tommaso Sacchetti",
    "affiliation": "EURECOM",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bluetooth Security Testing with BlueToolkit: a Large-Scale Automotive Case Study",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional",
          "Reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6363,
    "paper_ids": [
      1761
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Soufian El Yadmani",
    "display_name": "Soufian El Yadmani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SecurePoC: A Helping Hand to Identify Malicious CVE Proof of Concept Exploits in GitHub",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6364,
    "paper_ids": [
      5606
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Robin The",
    "display_name": "Robin The",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SecurePoC: A Helping Hand to Identify Malicious CVE Proof of Concept Exploits in GitHub",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6365,
    "paper_ids": [
      5606
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Olga Gadyatskaya",
    "display_name": "Olga Gadyatskaya",
    "affiliation": "Leiden University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "WOOT": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      },
      "USENIXSEC": {
        "2025": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SecurePoC: A Helping Hand to Identify Malicious CVE Proof of Concept Exploits in GitHub",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "high stakes low certainty evaluating the efficacy of highlevel indicators of compromise in ransomware attribution",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "a limited technical background is sufficient for attackdefense tree acceptability",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 6366,
    "paper_ids": [
      5606
    ],
    "papers_without_artifact_ids": [
      3340,
      5607
    ]
  },
  {
    "name": "Harishma Boyapally",
    "display_name": "Harishma Boyapally",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Reality Check on Side-Channels: Lessons learnt from breaking AES on ARM Cortex-A72 processor with Out-of-Order Execution",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6367,
    "paper_ids": [
      1486
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chengsong Diao",
    "display_name": "Chengsong Diao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "No Key, No Problem: Vulnerabilities in Master Lock Smart Locks",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6368,
    "paper_ids": [
      3287
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Danielle Dang",
    "display_name": "Danielle Dang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "No Key, No Problem: Vulnerabilities in Master Lock Smart Locks",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6369,
    "paper_ids": [
      3287
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sierra Lira",
    "display_name": "Sierra Lira",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "No Key, No Problem: Vulnerabilities in Master Lock Smart Locks",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6370,
    "paper_ids": [
      3287
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Angela Tsai",
    "display_name": "Angela Tsai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "No Key, No Problem: Vulnerabilities in Master Lock Smart Locks",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6371,
    "paper_ids": [
      3287
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nadia Heninger",
    "display_name": "Nadia Heninger",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "WOOT": 1,
      "CHES": 0,
      "USENIXSEC": 5,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      },
      "CHES": {},
      "USENIXSEC": {
        "2024": 2,
        "2020": 2,
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "No Key, No Problem: Vulnerabilities in Master Lock Smart Locks",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "radiusudp considered harmful",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "abuseresistant location tracking balancing privacy and safety in the offline finding ecosystem",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "open to a fault on the passive compromise of tls keys via transient errors",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "copycat controlled instructionlevel attacks on enclaves",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "tpmfail tpm meets timing and lattice attacks",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6372,
    "paper_ids": [
      3287
    ],
    "papers_without_artifact_ids": [
      3289,
      4205,
      4263,
      1447,
      1435
    ]
  },
  {
    "name": "Zhenyuan Liu 0005",
    "display_name": "Zhenyuan Liu",
    "affiliation": "Worcester Polytechnic Institute",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "WOOT": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      },
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GlitchGlück: Enabling Software Vulnerabilities through Guided Hardware Fault Injection",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "faultdetective explainable to a fault from the design layout to the software",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 8093,
    "paper_ids": [
      5608
    ],
    "papers_without_artifact_ids": [
      5609
    ]
  },
  {
    "name": "Dillibabu Shanmugam",
    "display_name": "Dillibabu Shanmugam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "WOOT": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      },
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GlitchGlück: Enabling Software Vulnerabilities through Guided Hardware Fault Injection",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "faultdetective explainable to a fault from the design layout to the software",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 8094,
    "paper_ids": [
      5608
    ],
    "papers_without_artifact_ids": [
      5609
    ]
  },
  {
    "name": "Patrick Schaumont",
    "display_name": "Patrick Schaumont",
    "affiliation": "Worcester Polytechnic University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "WOOT": 1,
      "CHES": 3
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      },
      "CHES": {
        "2024": 1,
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GlitchGlück: Enabling Software Vulnerabilities through Guided Hardware Fault Injection",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "faultdetective explainable to a fault from the design layout to the software",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "impedanceverif onchip impedance sensing for systemlevel tampering detection",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "soc root canal root cause analysis of power sidechannel leakage in systemonchip designs",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 8095,
    "paper_ids": [
      5608
    ],
    "papers_without_artifact_ids": [
      5609,
      5610,
      5611
    ]
  },
  {
    "name": "Aedan Cullen",
    "display_name": "Aedan Cullen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Security through Transparency: Tales from the RP2350 Hacking Challenge",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6373,
    "paper_ids": [
      1520
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kévin Courdesses",
    "display_name": "Kévin Courdesses",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Security through Transparency: Tales from the RP2350 Hacking Challenge",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8096,
    "paper_ids": [
      1520
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas Roth",
    "display_name": "Thomas Roth",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Security through Transparency: Tales from the RP2350 Hacking Challenge",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6375,
    "paper_ids": [
      1520
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mehrdad Hajizadeh",
    "display_name": "Mehrdad Hajizadeh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeepRed: A Deep Learning-Powered Command and Control Framework for Multi-Stage Red Teaming Against ML-based Network Intrusion Detection Systems",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6376,
    "paper_ids": [
      1132
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pegah Golchin",
    "display_name": "Pegah Golchin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeepRed: A Deep Learning-Powered Command and Control Framework for Multi-Stage Red Teaming Against ML-based Network Intrusion Detection Systems",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6377,
    "paper_ids": [
      1132
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ehsan Nowroozi",
    "display_name": "Ehsan Nowroozi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeepRed: A Deep Learning-Powered Command and Control Framework for Multi-Stage Red Teaming Against ML-based Network Intrusion Detection Systems",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6378,
    "paper_ids": [
      1132
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maria Rigaki",
    "display_name": "Maria Rigaki",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeepRed: A Deep Learning-Powered Command and Control Framework for Multi-Stage Red Teaming Against ML-based Network Intrusion Detection Systems",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6379,
    "paper_ids": [
      1132
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Veronica Valeros",
    "display_name": "Veronica Valeros",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeepRed: A Deep Learning-Powered Command and Control Framework for Multi-Stage Red Teaming Against ML-based Network Intrusion Detection Systems",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6380,
    "paper_ids": [
      1132
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sebastián García",
    "display_name": "Sebastián García",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "WOOT": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeepRed: A Deep Learning-Powered Command and Control Framework for Multi-Stage Red Teaming Against ML-based Network Intrusion Detection Systems",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "finetuning large language models for dga and dns exfiltration detection",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 8097,
    "paper_ids": [
      1132
    ],
    "papers_without_artifact_ids": [
      5612
    ]
  },
  {
    "name": "Thomas Bauschert",
    "display_name": "Thomas Bauschert",
    "affiliation": "TU Chemnitz",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeepRed: A Deep Learning-Powered Command and Control Framework for Multi-Stage Red Teaming Against ML-based Network Intrusion Detection Systems",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6382,
    "paper_ids": [
      1132
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wooyeon Jo",
    "display_name": "Wooyeon Jo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Oops, It Halted Again: Exploiting PLC Memory for Fun and Profit in Industrial Control Systems",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges:"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6383,
    "paper_ids": [
      4107
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jannik Hartung",
    "display_name": "Jannik Hartung",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "WOOT": 1
    },
    "total_papers_by_conf_year": {
      "WOOT": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "WOOT"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Extract: A PHP Foot-Gun Case Study",
        "conference": "WOOT",
        "year": 2025,
        "badges": [
          "Badges: Available",
          "Functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6384,
    "paper_ids": [
      219
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Patrick Ah-Fat",
    "display_name": "Patrick Ah-Fat",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Protecting Private Inputs: Bounded Distortion Guarantees With Randomised Approximations",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6385,
    "paper_ids": [
      5613
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Huth 0001",
    "display_name": "Michael Huth",
    "affiliation": "Imperial College London",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Protecting Private Inputs: Bounded Distortion Guarantees With Randomised Approximations",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6386,
    "paper_ids": [
      5613
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sébastien Henri",
    "display_name": "Sébastien Henri",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Protecting against Website Fingerprinting with Multihoming",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8098,
    "paper_ids": [
      5614
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gines Garcia-Aviles",
    "display_name": "Gines Garcia-Aviles",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Protecting against Website Fingerprinting with Multihoming",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6388,
    "paper_ids": [
      5614
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pablo Serrano 0001",
    "display_name": "Pablo Serrano",
    "affiliation": "Queen's University Belfast",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Protecting against Website Fingerprinting with Multihoming",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6389,
    "paper_ids": [
      5614
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Albert Banchs",
    "display_name": "Albert Banchs",
    "affiliation": "IMDEA Networks Institute",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Protecting against Website Fingerprinting with Multihoming",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6390,
    "paper_ids": [
      5614
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Patrick Thiran",
    "display_name": "Patrick Thiran",
    "affiliation": "EPFL",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Protecting against Website Fingerprinting with Multihoming",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6391,
    "paper_ids": [
      5614
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas Linden",
    "display_name": "Thomas Linden",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Privacy Policy Landscape After the GDPR",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "prisec a privacy settings enforcement controller",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6392,
    "paper_ids": [
      3388
    ],
    "papers_without_artifact_ids": [
      3397
    ]
  },
  {
    "name": "Rishabh Khandelwal",
    "display_name": "Rishabh Khandelwal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Privacy Policy Landscape After the GDPR",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unpacking privacy labels a measurement and developer perspective on googles data safety section",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "automated cookie notice analysis and enforcement",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "prisec a privacy settings enforcement controller",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6393,
    "paper_ids": [
      3388
    ],
    "papers_without_artifact_ids": [
      3391,
      3394,
      3397
    ]
  },
  {
    "name": "Brinda Hampiholi",
    "display_name": "Brinda Hampiholi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tandem: Securing Keys by Using a Central Server While Preserving Privacy",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6394,
    "paper_ids": [
      970
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Greg Alpár",
    "display_name": "Greg Alpár",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      },
      "CHES": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tandem: Securing Keys by Using a Central Server While Preserving Privacy",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "abe squared accurately benchmarking efficiency of attributebased encryption",
        "conference": "CHES",
        "year": 2022
      }
    ],
    "author_id": 8099,
    "paper_ids": [
      970
    ],
    "papers_without_artifact_ids": [
      5012
    ]
  },
  {
    "name": "Peeter Laud",
    "display_name": "Peeter Laud",
    "affiliation": "Cybernetica AS, Tartu, Estonia",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Framework of Metrics for Differential Privacy from Local Sensitivity",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6396,
    "paper_ids": [
      5615
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alisa Pankova",
    "display_name": "Alisa Pankova",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Framework of Metrics for Differential Privacy from Local Sensitivity",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6397,
    "paper_ids": [
      5615
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Pettai",
    "display_name": "Martin Pettai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Framework of Metrics for Differential Privacy from Local Sensitivity",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6398,
    "paper_ids": [
      5615
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anders P. K. Dalskov",
    "display_name": "Anders P. K. Dalskov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure Evaluation of Quantized Neural Networks",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fantastic four honestmajority fourparty secure computation with malicious security",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6399,
    "paper_ids": [
      5616
    ],
    "papers_without_artifact_ids": [
      5617
    ]
  },
  {
    "name": "Daniel Escudero 0001",
    "display_name": "Daniel Escudero",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure Evaluation of Quantized Neural Networks",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secure training of decision trees with continuous attributes",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "fantastic four honestmajority fourparty secure computation with malicious security",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6400,
    "paper_ids": [
      5616
    ],
    "papers_without_artifact_ids": [
      5618,
      5617
    ]
  },
  {
    "name": "Marcel Keller",
    "display_name": "Marcel Keller",
    "affiliation": "CSIRO, Australia",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure Evaluation of Quantized Neural Networks",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "puba privacypreserving userdata bookkeeping and analytics",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "fantastic four honestmajority fourparty secure computation with malicious security",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6401,
    "paper_ids": [
      5616
    ],
    "papers_without_artifact_ids": [
      5619,
      5617
    ]
  },
  {
    "name": "Zhiju Yang",
    "display_name": "Zhiju Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6402,
    "paper_ids": [
      4355
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Brendan Avent",
    "display_name": "Brendan Avent",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 2
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automatic Discovery of Privacy-Utility Pareto Fronts",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the power of the hybrid model for mean estimation",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 6403,
    "paper_ids": [
      4491
    ],
    "papers_without_artifact_ids": [
      5620
    ]
  },
  {
    "name": "Javier González 0002",
    "display_name": "Javier González",
    "affiliation": "Microsoft",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automatic Discovery of Privacy-Utility Pareto Fronts",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8100,
    "paper_ids": [
      4491
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tom Diethe",
    "display_name": "Tom Diethe",
    "affiliation": "AstraZeneca, Cambridge, UK",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automatic Discovery of Privacy-Utility Pareto Fronts",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6405,
    "paper_ids": [
      4491
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrei Paleyes",
    "display_name": "Andrei Paleyes",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      },
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automatic Discovery of Privacy-Utility Pareto Fronts",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "causal fault localisation in dataflow systems",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 6406,
    "paper_ids": [
      4491
    ],
    "papers_without_artifact_ids": [
      5621
    ]
  },
  {
    "name": "Tommi Gröndahl",
    "display_name": "Tommi Gröndahl",
    "affiliation": "University of Helsinki",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Effective writing style transfer via combinatorial paraphrasing",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8101,
    "paper_ids": [
      1194
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Payap Sirinam",
    "display_name": "Payap Sirinam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6408,
    "paper_ids": [
      4493
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kantha Girish Gangadhara",
    "display_name": "Kantha Girish Gangadhara",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6409,
    "paper_ids": [
      4493
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Harborth",
    "display_name": "David Harborth",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "evaluating and redefining smartphone permissions with contextualized justifications for mobile augmented reality apps",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6410,
    "paper_ids": [
      5622
    ],
    "papers_without_artifact_ids": [
      5623
    ]
  },
  {
    "name": "Sebastian Pape 0001",
    "display_name": "Sebastian Pape",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "all apps do this comparing privacy concerns towards privacy tools and nonprivacy tools for social media content",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "personal information inference from voice recordings user awareness and privacy concerns",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 6411,
    "paper_ids": [
      5622
    ],
    "papers_without_artifact_ids": [
      5624,
      5625
    ]
  },
  {
    "name": "Kai Rannenberg",
    "display_name": "Kai Rannenberg",
    "affiliation": "Johann Wolfgang Goethe-Universitt Frankfurt am Main, Germany",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6412,
    "paper_ids": [
      5622
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Italo Dacosta",
    "display_name": "Italo Dacosta",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ATC": 0,
      "ACSAC": 0,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      },
      "ATC": {},
      "ACSAC": {},
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PriFi: Low-Latency Anonymity for Organizational Networks",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6413,
    "paper_ids": [
      2667
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mahdi Zamani",
    "display_name": "Mahdi Zamani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PriFi: Low-Latency Anonymity for Organizational Networks",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacypreserving financial anomaly detection via federated learning multiparty computation",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 6414,
    "paper_ids": [
      2667
    ],
    "papers_without_artifact_ids": [
      5575
    ]
  },
  {
    "name": "Ennan Zhai",
    "display_name": "Ennan Zhai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 16,
    "total_papers_by_conf": {
      "PETS": 1,
      "SOSP": 1,
      "ATC": 0,
      "FAST": 2,
      "NSDI": 11,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      },
      "SOSP": {
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2020": 1,
        "2018": 1
      },
      "NSDI": {
        "2024": 3,
        "2025": 4,
        "2023": 1,
        "2016": 1,
        "2020": 1,
        "2022": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 6.2,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PriFi: Low-Latency Anonymity for Organizational Networks",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "evolution of aegis fault diagnosis for ai model training service in production",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "mitigating scalability walls of rdmabased container networks",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "learning productionoptimized congestion control selection for alibaba cloud cdn",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "simai unifying architecture design and performance tuning for largescale large language model training with scalability and precision",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "reasoning about network traffic load property at production scale",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "sirius composing network function chains into p4capable edge gateways",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "luoshen a hyperconverged programmable gateway for multitenant multiservice edge clouds",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "burstable cloud block storage with data processing units",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "norma towards practical network load testing",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "automated verification of an inproduction dns authoritative engine",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "cetus releasing p4 programmers from the chore of trial and error compiling",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "lockfree collaboration support for cloud storage services with operation inference and transformation",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "check before you change preventing correlated failures in service updates",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "towards webbased delta synchronization for cloud storage services",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "anonrep towards trackingresistant anonymous reputation",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 6415,
    "paper_ids": [
      2667
    ],
    "papers_without_artifact_ids": [
      2886,
      624,
      2880,
      2710,
      5626,
      5627,
      5628,
      1004,
      2883,
      1008,
      5629,
      632,
      710,
      634,
      2669
    ]
  },
  {
    "name": "Joan Feigenbaum",
    "display_name": "Joan Feigenbaum",
    "affiliation": "Yale University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PriFi: Low-Latency Anonymity for Organizational Networks",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6416,
    "paper_ids": [
      2667
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexander Bajic",
    "display_name": "Alexander Bajic",
    "affiliation": "Freie Universität Berlin",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "dPHI: An improved high-speed network-layer anonymity protocol",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6417,
    "paper_ids": [
      5630
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Georg T. Becker",
    "display_name": "Georg T. Becker",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      },
      "CHES": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "dPHI: An improved high-speed network-layer anonymity protocol",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "combining optimization objectives new modeling attacks on strong pufs",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 6418,
    "paper_ids": [
      5630
    ],
    "papers_without_artifact_ids": [
      5631
    ]
  },
  {
    "name": "Roman Kolcun",
    "display_name": "Roman Kolcun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "blocking without breaking identification and mitigation of nonessential iot traffic",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 6419,
    "paper_ids": [
      3313
    ],
    "papers_without_artifact_ids": [
      3321
    ]
  },
  {
    "name": "Muhammad Talha Paracha",
    "display_name": "Muhammad Talha Paracha",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "blocking without breaking identification and mitigation of nonessential iot traffic",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 6420,
    "paper_ids": [
      3313
    ],
    "papers_without_artifact_ids": [
      3321
    ]
  },
  {
    "name": "Lennart Vogelsang",
    "display_name": "Lennart Vogelsang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6421,
    "paper_ids": [
      4492
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Adrià Gascón",
    "display_name": "Adrià Gascón",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "acorn input validation for secure aggregation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "towards sparse federated analytics location heatmaps under distributed differential privacy with secure aggregation",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 8102,
    "paper_ids": [
      4492
    ],
    "papers_without_artifact_ids": [
      5368,
      4179
    ]
  },
  {
    "name": "Royce J. Wilson",
    "display_name": "Royce J. Wilson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Differentially Private SQL with Bounded User Contribution",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6423,
    "paper_ids": [
      4502
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Celia Yuxin Zhang",
    "display_name": "Celia Yuxin Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Differentially Private SQL with Bounded User Contribution",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6424,
    "paper_ids": [
      4502
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "William Lam",
    "display_name": "William Lam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Differentially Private SQL with Bounded User Contribution",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6425,
    "paper_ids": [
      4502
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Simmons-Marengo",
    "display_name": "Daniel Simmons-Marengo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Differentially Private SQL with Bounded User Contribution",
        "conference": "PETS",
        "year": 2020,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6426,
    "paper_ids": [
      4502
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mitsuaki Akiyama",
    "display_name": "Mitsuaki Akiyama",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 2,
      "USENIXSEC": 3,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "ACSAC": {
        "2021": 1,
        "2019": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2022": 1,
        "2021": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how weird is usable privacy and security research",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "understanding nonexperts security and privacyrelated questions on a qa site",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "a crossrole and binational analysis on security efforts and constraints of software development projects",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "why they ignore english emails the challenges of nonnative speakers in identifying phishing emails",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "i know what you did last login inconsistent messages tell existence of a targets account to insiders",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 6427,
    "paper_ids": [
      4445
    ],
    "papers_without_artifact_ids": [
      5632,
      4447,
      5633,
      4448,
      5634
    ]
  },
  {
    "name": "Masashi Eto",
    "display_name": "Masashi Eto",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6428,
    "paper_ids": [
      4445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Atsuo Inomata",
    "display_name": "Atsuo Inomata",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6429,
    "paper_ids": [
      4445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Madita Olvermann",
    "display_name": "Madita Olvermann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Keeping Privacy Labels Honest",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6430,
    "paper_ids": [
      221
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Konstantinos Athanasiou",
    "display_name": "Konstantinos Athanasiou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Masking Feedforward Neural Networks Against Power Analysis Attacks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6431,
    "paper_ids": [
      4506
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas Wahl",
    "display_name": "Thomas Wahl",
    "affiliation": "Northeastern University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Masking Feedforward Neural Networks Against Power Analysis Attacks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6432,
    "paper_ids": [
      4506
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "A. Adam Ding",
    "display_name": "A. Adam Ding",
    "affiliation": "Northeastern University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Masking Feedforward Neural Networks Against Power Analysis Attacks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6433,
    "paper_ids": [
      4506
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vinh-Thong Ta 0001",
    "display_name": "Vinh-Thong Ta",
    "affiliation": "IIT Madras",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6434,
    "paper_ids": [
      5635
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Max Hashem Eiza",
    "display_name": "Max Hashem Eiza",
    "affiliation": "University of Central Lancashire",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6435,
    "paper_ids": [
      5635
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Bosk",
    "display_name": "Daniel Bosk",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hidden Issuer Anonymous Credential",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6436,
    "paper_ids": [
      4508
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mathieu Gestin",
    "display_name": "Mathieu Gestin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hidden Issuer Anonymous Credential",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6437,
    "paper_ids": [
      4508
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guillaume Piolle",
    "display_name": "Guillaume Piolle",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hidden Issuer Anonymous Credential",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6438,
    "paper_ids": [
      4508
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Iness Ben Guirat",
    "display_name": "Iness Ben Guirat",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Mixnet optimization methods",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "blending different latency traffic with beta mixing",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 6439,
    "paper_ids": [
      1906
    ],
    "papers_without_artifact_ids": [
      1912
    ]
  },
  {
    "name": "Ji Gao",
    "display_name": "Ji Gao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Deletion inference, reconstruction, and compliance in machine (un)learning",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6440,
    "paper_ids": [
      4351
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohammad Mahmoody",
    "display_name": "Mohammad Mahmoody",
    "affiliation": "University of Virginia",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Deletion inference, reconstruction, and compliance in machine (un)learning",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6441,
    "paper_ids": [
      4351
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Prashant Nalini Vasudevan",
    "display_name": "Prashant Nalini Vasudevan",
    "affiliation": "National University of Singapore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Deletion inference, reconstruction, and compliance in machine (un)learning",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6442,
    "paper_ids": [
      4351
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sarah Pearman",
    "display_name": "Sarah Pearman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "User-friendly yet rarely read: A case study on the redesign of an online HIPAA authorization",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on recruiting and retaining users for securitysensitive longitudinal measurement panels",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 6443,
    "paper_ids": [
      2499
    ],
    "papers_without_artifact_ids": [
      3294
    ]
  },
  {
    "name": "Ellie Young",
    "display_name": "Ellie Young",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "User-friendly yet rarely read: A case study on the redesign of an online HIPAA authorization",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6444,
    "paper_ids": [
      2499
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christian Müller 0015",
    "display_name": "Christian Müller",
    "affiliation": "University of Mannheim",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "If You Like Me, Please Don't \"Like\" Me: Inferring Vendor Bitcoin Addresses From Positive Reviews",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8103,
    "paper_ids": [
      1710
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Majed Almansoori",
    "display_name": "Majed Almansoori",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "can social media privacy and safety features protect targets of interpersonal attacks a systematic analysis",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "abuse vectors a framework for conceptualizing iotenabled interpersonal abuse",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "its the equivalent of feeling like youre in jail lessons from firsthand and secondhand accounts of iotenabled intimate partner abuse",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6446,
    "paper_ids": [
      2544
    ],
    "papers_without_artifact_ids": [
      2545,
      2551,
      2553
    ]
  },
  {
    "name": "Andrea Gallardo",
    "display_name": "Andrea Gallardo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2023": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "speculative privacy concerns about ar glasses data collection",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "detecting iphone security compromise in simulated stalking scenarios strategies and obstacles",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 6447,
    "paper_ids": [
      2544
    ],
    "papers_without_artifact_ids": [
      2592,
      2512
    ]
  },
  {
    "name": "Julio Poveda",
    "display_name": "Julio Poveda",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6448,
    "paper_ids": [
      2544
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Adil Ahmed",
    "display_name": "Adil Ahmed",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6449,
    "paper_ids": [
      2544
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Valentin Hartmann",
    "display_name": "Valentin Hartmann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy accounting εconomics: Improving differential privacy composition via a posteriori bounds",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6450,
    "paper_ids": [
      3902
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexander Bentkamp",
    "display_name": "Alexander Bentkamp",
    "affiliation": "LMU Munich, Germany",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy accounting εconomics: Improving differential privacy composition via a posteriori bounds",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6451,
    "paper_ids": [
      3902
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Robert West 0001",
    "display_name": "Robert West",
    "affiliation": "EPFL",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy accounting εconomics: Improving differential privacy composition via a posteriori bounds",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6452,
    "paper_ids": [
      3902
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marcos Tileria",
    "display_name": "Marcos Tileria",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Watch Over Your TV: A Security and Privacy Analysis of the Android TV Ecosystem",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6453,
    "paper_ids": [
      2976
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jad Al Aaraj",
    "display_name": "Jad Al Aaraj",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FingerprinTV: Fingerprinting Smart TV Apps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6454,
    "paper_ids": [
      963
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Debajyoti Das 0001",
    "display_name": "Debajyoti Das",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 4
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1,
        "2024": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OrgAn: Organizational Anonymity with Low Latency",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "are continuous stopandgo mixnets provably secure",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "blending different latency traffic with beta mixing",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "comprehensive anonymity trilemma user coordination is not enough",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 6455,
    "paper_ids": [
      2574
    ],
    "papers_without_artifact_ids": [
      1911,
      1912,
      2581
    ]
  },
  {
    "name": "Easwar Vivek Mangipudi",
    "display_name": "Easwar Vivek Mangipudi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OrgAn: Organizational Anonymity with Low Latency",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6456,
    "paper_ids": [
      2574
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Su-Chin Lin",
    "display_name": "Su-Chin Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6457,
    "paper_ids": [
      2586
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alessio Buraggina",
    "display_name": "Alessio Buraggina",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6458,
    "paper_ids": [
      2586
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "William Wang",
    "display_name": "William Wang",
    "affiliation": "Univ. of California - Santa Barbara",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 2,
      "FAST": 1,
      "NSDI": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2024": 1
      },
      "FAST": {
        "2019": 1
      },
      "NSDI": {
        "2011": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "servicelab preventing tiny performance regressions at hyperscale through preproduction testing",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "privacylens ondevice pii removal from rgb images using thermallyenhanced sensing",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "software wear management for persistent memories",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "diagnosing performance changes by comparing request flows",
        "conference": "NSDI",
        "year": 2011
      }
    ],
    "author_id": 6459,
    "paper_ids": [
      2586
    ],
    "papers_without_artifact_ids": [
      3679,
      4406,
      4664,
      1336
    ]
  },
  {
    "name": "Andrew Zhang",
    "display_name": "Andrew Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6460,
    "paper_ids": [
      2586
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Timothy Libert",
    "display_name": "Timothy Libert",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6461,
    "paper_ids": [
      2586
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rajat Tandon",
    "display_name": "Rajat Tandon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "I know what you did on Venmo: Discovering privacy leaks in mobile social payments",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6462,
    "paper_ids": [
      2194
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ishank Arora",
    "display_name": "Ishank Arora",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "I know what you did on Venmo: Discovering privacy leaks in mobile social payments",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6463,
    "paper_ids": [
      2194
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dhiraj Murthy",
    "display_name": "Dhiraj Murthy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "I know what you did on Venmo: Discovering privacy leaks in mobile social payments",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6464,
    "paper_ids": [
      2194
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Deepak Kumaraswamy",
    "display_name": "Deepak Kumaraswamy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LLAMA: A Low Latency Math Library for Secure Inference",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6465,
    "paper_ids": [
      2534
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anshuman Suri",
    "display_name": "Anshuman Suri",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Formalizing and Estimating Distribution Inference Risks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6466,
    "paper_ids": [
      4210
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Enno Steinbrink",
    "display_name": "Enno Steinbrink",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the role of privacy in digitalization analyzing perspectives of german farmers",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 6467,
    "paper_ids": [
      3412
    ],
    "papers_without_artifact_ids": [
      3417
    ]
  },
  {
    "name": "Franziska Herbert",
    "display_name": "Franziska Herbert",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 2
      },
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "digital security perceptions and practices around the world a weird versus nonweird comparison",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "proofofvax studying user preferences and perception of covid vaccination certificates",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "fast easy convenient studying adoption and perception of digital covid certificates",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 6468,
    "paper_ids": [
      3412
    ],
    "papers_without_artifact_ids": [
      3012,
      4440,
      4442
    ]
  },
  {
    "name": "Gina Maria Schmidbauer-Wolf",
    "display_name": "Gina Maria Schmidbauer-Wolf",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6469,
    "paper_ids": [
      3412
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Foteini Baldimtsi",
    "display_name": "Foteini Baldimtsi",
    "affiliation": "George Mason University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "δindistinguishable mixing for cryptocurrencies",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 6470,
    "paper_ids": [
      5636
    ],
    "papers_without_artifact_ids": [
      2447
    ]
  },
  {
    "name": "Panagiotis Chatzigiannis",
    "display_name": "Panagiotis Chatzigiannis",
    "affiliation": "Visa Research",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacypreserving financial anomaly detection via federated learning multiparty computation",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 6471,
    "paper_ids": [
      5636
    ],
    "papers_without_artifact_ids": [
      5575
    ]
  },
  {
    "name": "S. Dov Gordon",
    "display_name": "S. Dov Gordon",
    "affiliation": "George Mason University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 3
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "δindistinguishable mixing for cryptocurrencies",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "fully secure psi via mpcinthehead",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "secure parallel computation on national scale volumes of data",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6472,
    "paper_ids": [
      5636
    ],
    "papers_without_artifact_ids": [
      2447,
      5637,
      5638
    ]
  },
  {
    "name": "Phi Hung Le",
    "display_name": "Phi Hung Le",
    "affiliation": "Google",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 2
      },
      "USENIXSEC": {
        "2020": 1,
        "2022": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fully secure psi via mpcinthehead",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "secure poisson regression",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "secure parallel computation on national scale volumes of data",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6473,
    "paper_ids": [
      5636
    ],
    "papers_without_artifact_ids": [
      5637,
      5551,
      5638
    ]
  },
  {
    "name": "Daniel McVicker",
    "display_name": "Daniel McVicker",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6474,
    "paper_ids": [
      5636
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leonard Dervishi",
    "display_name": "Leonard Dervishi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6475,
    "paper_ids": [
      2557
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaoqian Jiang",
    "display_name": "Xiaoqian Jiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6476,
    "paper_ids": [
      2557
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jaideep Vaidya",
    "display_name": "Jaideep Vaidya",
    "affiliation": "Rutgers University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6477,
    "paper_ids": [
      2557
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Peter Story",
    "display_name": "Peter Story",
    "affiliation": "Clark University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Increasing Adoption of Tor Browser Using Informational and Planning Nudges",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "awareness adoption and misconceptions of web privacy tools",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "from intent to action nudging users towards secure mobile payments",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6478,
    "paper_ids": [
      2500
    ],
    "papers_without_artifact_ids": [
      2513,
      2514
    ]
  },
  {
    "name": "Rex Chen",
    "display_name": "Rex Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Increasing Adoption of Tor Browser Using Informational and Planning Nudges",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding how to inform blind and lowvision users about data privacy through privacy question answering assistants",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6479,
    "paper_ids": [
      2500
    ],
    "papers_without_artifact_ids": [
      5639
    ]
  },
  {
    "name": "Yaxing Yao",
    "display_name": "Yaxing Yao",
    "affiliation": "Johns Hopkins University",
    "artifact_count": 1,
    "total_papers": 11,
    "total_papers_by_conf": {
      "PETS": 6,
      "USENIXSEC": 5
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 2,
        "2025": 1,
        "2024": 1,
        "2021": 2
      },
      "USENIXSEC": {
        "2024": 2,
        "2023": 2,
        "2021": 1
      }
    },
    "artifact_rate": 9.1,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Increasing Adoption of Tor Browser Using Informational and Planning Nudges",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "what are they gonna do with my data privacy expectations concerns and behaviors in virtual reality",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "exploring design opportunities for familybased privacy education in informal learning spaces",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "wellintended but halfhearted hosts consideration of guests privacy using smart devices on rental properties",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "understanding how to inform blind and lowvision users about data privacy through privacy question answering assistants",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "exploring tenants preferences of privacy negotiation in airbnb",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "if sighted people know i should be able to know privacy perceptions of bystanders with visual impairments around camerabased technology",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "how usable are ios app privacy labels",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "awareness adoption and misconceptions of web privacy tools",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "managing potentially intrusive practices in the browser a usercentered perspective",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "how i know for sure peoples perspectives on solely automated decisionmaking sadm",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6480,
    "paper_ids": [
      2500
    ],
    "papers_without_artifact_ids": [
      1825,
      5508,
      3264,
      5639,
      5640,
      5641,
      2509,
      2513,
      4511,
      5402
    ]
  },
  {
    "name": "Alessandro Acquisti",
    "display_name": "Alessandro Acquisti",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2020": 2,
        "2022": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Increasing Adoption of Tor Browser Using Informational and Planning Nudges",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "is there a reverse privacy paradox an exploratory analysis of gaps between privacy perspectives and privacyseeking behaviors",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "is it a concern or a preference an investigation into the ability of privacy scales to capture and distinguish granular privacy constructs",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "awareness adoption and misconceptions of web privacy tools",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "from intent to action nudging users towards secure mobile payments",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "the impact of adblockers on product search and purchase behavior a lab experiment",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6481,
    "paper_ids": [
      2500
    ],
    "papers_without_artifact_ids": [
      2508,
      2511,
      2513,
      2514,
      5642
    ]
  },
  {
    "name": "Norman M. Sadeh",
    "display_name": "Norman M. Sadeh",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "PETS": 5,
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1,
        "2021": 3
      },
      "USENIXSEC": {
        "2020": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Increasing Adoption of Tor Browser Using Informational and Planning Nudges",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "awareness adoption and misconceptions of web privacy tools",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "did you know this camera tracks your mood understanding privacy expectations and preferences in the age of video analytics",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "managing potentially intrusive practices in the browser a usercentered perspective",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "facial recognition understanding privacy concerns and attitudes across increasingly diverse deployment scenarios",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "the best of both worlds mitigating tradeoffs between accuracy and user burden in capturing mobile app privacy preferences",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "from intent to action nudging users towards secure mobile payments",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6482,
    "paper_ids": [
      2500
    ],
    "papers_without_artifact_ids": [
      2513,
      1826,
      4511,
      5643,
      4512,
      2514
    ]
  },
  {
    "name": "Maggie Van Nortwick",
    "display_name": "Maggie Van Nortwick",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Setting the Bar Low: Are Websites Complying With the Minimum Requirements of the CCPA?",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "track you a deep dive into safety alerts for apple airtags",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 6483,
    "paper_ids": [
      4513
    ],
    "papers_without_artifact_ids": [
      5577
    ]
  },
  {
    "name": "Christopher Ellis",
    "display_name": "Christopher Ellis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deanonymizing device identities via sidechannel attacks in exclusiveuse iots mitigation",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 6484,
    "paper_ids": [
      385
    ],
    "papers_without_artifact_ids": [
      388
    ]
  },
  {
    "name": "Anish Arora",
    "display_name": "Anish Arora",
    "affiliation": "Ohio State University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "ATC": {},
      "NSDI": {
        "2016": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "phycloak obfuscating sensing from communication signals",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 6485,
    "paper_ids": [
      385
    ],
    "papers_without_artifact_ids": [
      5644
    ]
  },
  {
    "name": "Konrad Kollnig",
    "display_name": "Konrad Kollnig",
    "affiliation": "Maastricht Universit, The Netherlands",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a fait accompli an empirical study into the absence of consent to thirdparty tracking in android apps",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6486,
    "paper_ids": [
      2529
    ],
    "papers_without_artifact_ids": [
      5645
    ]
  },
  {
    "name": "Reuben Binns",
    "display_name": "Reuben Binns",
    "affiliation": "University of Oxford",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6487,
    "paper_ids": [
      2529
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Max Van Kleek",
    "display_name": "Max Van Kleek",
    "affiliation": "University of Oxford",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a fait accompli an empirical study into the absence of consent to thirdparty tracking in android apps",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6488,
    "paper_ids": [
      2529
    ],
    "papers_without_artifact_ids": [
      5645
    ]
  },
  {
    "name": "Nigel Shadbolt",
    "display_name": "Nigel Shadbolt",
    "affiliation": "University of Oxford",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a fait accompli an empirical study into the absence of consent to thirdparty tracking in android apps",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6489,
    "paper_ids": [
      2529
    ],
    "papers_without_artifact_ids": [
      5645
    ]
  },
  {
    "name": "Gunes Acar",
    "display_name": "Gunes Acar",
    "affiliation": "Radboud University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "PETS": 5,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1,
        "2025": 1,
        "2021": 1,
        "2026": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "From \"Onion Not Found\" to Guard Discovery",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "editors introduction",
        "conference": "PETS",
        "year": 2026
      },
      {
        "title": "referrer policy implementation and circumvention",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "leaky forms a study of email and password exfiltration before form submission",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "the cname of the game largescale analysis of dnsbased tracking evasion",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "no boundaries data exfiltration by third parties embedded on web pages",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 6490,
    "paper_ids": [
      1907
    ],
    "papers_without_artifact_ids": [
      810,
      5646,
      5647,
      4255,
      4315
    ]
  },
  {
    "name": "Christoph Egger 0001",
    "display_name": "Christoph Egger",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "SOSP": 0,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2021": 1
      },
      "SOSP": {},
      "USENIXSEC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On Defeating Graph Analysis of Anonymous Transactions",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "foundations of ring sampling",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 6491,
    "paper_ids": [
      5648
    ],
    "papers_without_artifact_ids": [
      5649
    ]
  },
  {
    "name": "Russell W. F. Lai",
    "display_name": "Russell W. F. Lai",
    "affiliation": "Aalto University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "CHES": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2021": 1
      },
      "CHES": {
        "2023": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On Defeating Graph Analysis of Anonymous Transactions",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on provable whitebox security in the strong incompressibility model",
        "conference": "CHES",
        "year": 2023
      },
      {
        "title": "foundations of ring sampling",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 6492,
    "paper_ids": [
      5648
    ],
    "papers_without_artifact_ids": [
      5650,
      5649
    ]
  },
  {
    "name": "Viktoria Ronge",
    "display_name": "Viktoria Ronge",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 2,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On Defeating Graph Analysis of Anonymous Transactions",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok assumptions underlying cryptocurrency deanonymizations",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "foundations of ring sampling",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 6493,
    "paper_ids": [
      5648
    ],
    "papers_without_artifact_ids": [
      5651,
      5649
    ]
  },
  {
    "name": "Ivy K. Y. Woo",
    "display_name": "Ivy K. Y. Woo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On Defeating Graph Analysis of Anonymous Transactions",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6494,
    "paper_ids": [
      5648
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hoover H. F. Yin",
    "display_name": "Hoover H. F. Yin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On Defeating Graph Analysis of Anonymous Transactions",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "foundations of ring sampling",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 6495,
    "paper_ids": [
      5648
    ],
    "papers_without_artifact_ids": [
      5649
    ]
  },
  {
    "name": "Yucheng Yang 0003",
    "display_name": "Yucheng Yang",
    "affiliation": "NYU Shanghai",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6496,
    "paper_ids": [
      3389
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jack West",
    "display_name": "Jack West",
    "affiliation": "University of Wisconsin-Madison",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6497,
    "paper_ids": [
      3389
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "George K. Thiruvathukal",
    "display_name": "George K. Thiruvathukal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6498,
    "paper_ids": [
      3389
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Neil Klingensmith",
    "display_name": "Neil Klingensmith",
    "affiliation": "University of Wisconsin-Madison",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6499,
    "paper_ids": [
      3389
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bogdan Kulynych",
    "display_name": "Bogdan Kulynych",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Disparate Vulnerability to Membership Inference Attacks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6500,
    "paper_ids": [
      971
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohammad Yaghini",
    "display_name": "Mohammad Yaghini",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Disparate Vulnerability to Membership Inference Attacks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tubes among us analog attack on automatic speaker identification",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6501,
    "paper_ids": [
      971
    ],
    "papers_without_artifact_ids": [
      3392
    ]
  },
  {
    "name": "Michael Veale",
    "display_name": "Michael Veale",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Disparate Vulnerability to Membership Inference Attacks",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "crowdnotifier decentralized privacypreserving presence tracing",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 6502,
    "paper_ids": [
      971
    ],
    "papers_without_artifact_ids": [
      975
    ]
  },
  {
    "name": "James Voss",
    "display_name": "James Voss",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Differentially private partition selection",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6503,
    "paper_ids": [
      4503
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chinmoy Mandayam",
    "display_name": "Chinmoy Mandayam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Differentially private partition selection",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6504,
    "paper_ids": [
      4503
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas Kerber",
    "display_name": "Thomas Kerber",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6505,
    "paper_ids": [
      3419
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Markulf Kohlweiss",
    "display_name": "Markulf Kohlweiss",
    "affiliation": "University of Edinburgh",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6506,
    "paper_ids": [
      3419
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mikhail Volkhov",
    "display_name": "Mikhail Volkhov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6507,
    "paper_ids": [
      3419
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vera Rimmer",
    "display_name": "Vera Rimmer",
    "affiliation": "KU Leuven",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "ACSAC": {},
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6508,
    "paper_ids": [
      4252
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abel Rodríguez Romero",
    "display_name": "Abel Rodríguez Romero",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8104,
    "paper_ids": [
      4252
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Katharina Kohls",
    "display_name": "Katharina Kohls",
    "affiliation": "Ruhr-University Bochum",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the attacks arent alright largescale simulation of fake base station attacks and detections",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "verloc verifiable localization in decentralized systems",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "call me maybe eavesdropping encrypted lte calls with revolte",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6510,
    "paper_ids": [
      4252
    ],
    "papers_without_artifact_ids": [
      5350,
      1913,
      121
    ]
  },
  {
    "name": "Hussein Darir",
    "display_name": "Hussein Darir",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MLEFlow: Learning from History to Improve Load Balancing in Tor",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6511,
    "paper_ids": [
      5652
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hussein Sibai",
    "display_name": "Hussein Sibai",
    "affiliation": "Washington University in St. Louis",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MLEFlow: Learning from History to Improve Load Balancing in Tor",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6512,
    "paper_ids": [
      5652
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chin-Yu Cheng",
    "display_name": "Chin-Yu Cheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MLEFlow: Learning from History to Improve Load Balancing in Tor",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6513,
    "paper_ids": [
      5652
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nikita Borisov",
    "display_name": "Nikita Borisov",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "ATC": 0,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1
      },
      "ATC": {},
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MLEFlow: Learning from History to Improve Load Balancing in Tor",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "running refraction networking for real",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 6514,
    "paper_ids": [
      5652
    ],
    "papers_without_artifact_ids": [
      4264
    ]
  },
  {
    "name": "Geir E. Dullerud",
    "display_name": "Geir E. Dullerud",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MLEFlow: Learning from History to Improve Load Balancing in Tor",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6515,
    "paper_ids": [
      5652
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sayan Mitra 0001",
    "display_name": "Sayan Mitra",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MLEFlow: Learning from History to Improve Load Balancing in Tor",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6516,
    "paper_ids": [
      5652
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Albert Yu 0003",
    "display_name": "Albert Yu",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6517,
    "paper_ids": [
      2575
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hemanta K. Maji",
    "display_name": "Hemanta K. Maji",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6518,
    "paper_ids": [
      2575
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lukas Prediger",
    "display_name": "Lukas Prediger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "d3p - A Python Package for Differentially-Private Probabilistic Programming",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6519,
    "paper_ids": [
      5653
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Niki Andreas Lopi",
    "display_name": "Niki Andreas Lopi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "d3p - A Python Package for Differentially-Private Probabilistic Programming",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6520,
    "paper_ids": [
      5653
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Samuel Kaski",
    "display_name": "Samuel Kaski",
    "affiliation": "Aalto University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "d3p - A Python Package for Differentially-Private Probabilistic Programming",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6521,
    "paper_ids": [
      5653
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Antti Honkela",
    "display_name": "Antti Honkela",
    "affiliation": "University of Helsinki",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "d3p - A Python Package for Differentially-Private Probabilistic Programming",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6522,
    "paper_ids": [
      5653
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Marco Sommer",
    "display_name": "David Marco Sommer",
    "affiliation": "Zhlke Group, Zurich, Switzerland",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Athena: Probabilistic Verification of Machine Unlearning",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6523,
    "paper_ids": [
      135
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Priyanka Nanayakkara",
    "display_name": "Priyanka Nanayakkara",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Visualizing Privacy-Utility Trade-Offs in Differentially Private Data Releases",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "models matter setting accurate privacy expectations for local and central differential privacy",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "what are the chances explaining the epsilon parameter in differential privacy",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6524,
    "paper_ids": [
      5654
    ],
    "papers_without_artifact_ids": [
      3209,
      3215
    ]
  },
  {
    "name": "Johes Bater",
    "display_name": "Johes Bater",
    "affiliation": "Tufts University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Visualizing Privacy-Utility Trade-Offs in Differentially Private Data Releases",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6525,
    "paper_ids": [
      5654
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xi He 0001",
    "display_name": "Xi He",
    "affiliation": "University of Waterloo",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Visualizing Privacy-Utility Trade-Offs in Differentially Private Data Releases",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6526,
    "paper_ids": [
      5654
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jessica Hullman",
    "display_name": "Jessica Hullman",
    "affiliation": "Northwestern University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Visualizing Privacy-Utility Trade-Offs in Differentially Private Data Releases",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6527,
    "paper_ids": [
      5654
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jennie Rogers",
    "display_name": "Jennie Rogers",
    "affiliation": "Northwestern University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Visualizing Privacy-Utility Trade-Offs in Differentially Private Data Releases",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6528,
    "paper_ids": [
      5654
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maaz Bin Musa",
    "display_name": "Maaz Bin Musa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ATOM: Ad-network Tomography",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "canarytrap detecting data misuse by thirdparty apps on online social networks",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 6529,
    "paper_ids": [
      5655
    ],
    "papers_without_artifact_ids": [
      813
    ]
  },
  {
    "name": "Rishab Nithyanand",
    "display_name": "Rishab Nithyanand",
    "affiliation": "University of Iowa",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ATOM: Ad-network Tomography",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "glowing in the dark uncovering ipv6 address discovery and scanning strategies in the wild",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "inferring trackeradvertiser relationships in the online advertising ecosystem using header bidding",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 6530,
    "paper_ids": [
      5655
    ],
    "papers_without_artifact_ids": [
      5303,
      814
    ]
  },
  {
    "name": "Sepideh Avizheh",
    "display_name": "Sepideh Avizheh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy-preserving FairSwap: Fairness and privacy interplay",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6531,
    "paper_ids": [
      5656
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Preston Haffey",
    "display_name": "Preston Haffey",
    "affiliation": "University of Calgary",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy-preserving FairSwap: Fairness and privacy interplay",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6532,
    "paper_ids": [
      5656
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Reihaneh Safavi-Naini",
    "display_name": "Reihaneh Safavi-Naini",
    "affiliation": "University of Calgary",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy-preserving FairSwap: Fairness and privacy interplay",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6533,
    "paper_ids": [
      5656
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexandros Bampoulidis",
    "display_name": "Alexandros Bampoulidis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privately Connecting Mobility to Infectious Diseases via Applied Cryptography",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6534,
    "paper_ids": [
      4085
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alessandro Bruni",
    "display_name": "Alessandro Bruni",
    "affiliation": "IT University of Copenhagen",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privately Connecting Mobility to Infectious Diseases via Applied Cryptography",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6535,
    "paper_ids": [
      4085
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Kales",
    "display_name": "Daniel Kales",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "CHES": 0,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "CHES": {},
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privately Connecting Mobility to Infectious Diseases via Applied Cryptography",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6536,
    "paper_ids": [
      4085
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mário S. Alvim",
    "display_name": "Mário S. Alvim",
    "affiliation": "UFMG",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a novel reconstruction attack on foreigntrade official statistics with a brazilian case study",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 8105,
    "paper_ids": [
      5657
    ],
    "papers_without_artifact_ids": [
      5658
    ]
  },
  {
    "name": "Natasha Fernandes",
    "display_name": "Natasha Fernandes",
    "affiliation": "Macquarie University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a novel reconstruction attack on foreigntrade official statistics with a brazilian case study",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 6538,
    "paper_ids": [
      5657
    ],
    "papers_without_artifact_ids": [
      5658
    ]
  },
  {
    "name": "Annabelle McIver",
    "display_name": "Annabelle McIver",
    "affiliation": "Macquarie University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6539,
    "paper_ids": [
      5657
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Carroll Morgan",
    "display_name": "Carroll Morgan",
    "affiliation": "University of New South Wales",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6540,
    "paper_ids": [
      5657
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gabriel Henrique Nunes",
    "display_name": "Gabriel Henrique Nunes",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6541,
    "paper_ids": [
      5657
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Timm Lauser",
    "display_name": "Timm Lauser",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Integrating Privacy into the Electric Vehicle Charging Architecture",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6542,
    "paper_ids": [
      3050
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fareed Zaffar",
    "display_name": "Fareed Zaffar",
    "affiliation": "LUMS",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "ACSAC": 0,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1
      },
      "ACSAC": {},
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices",
        "conference": "PETS",
        "year": 2022,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards reproducible ransomware analysis",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "canarytrap detecting data misuse by thirdparty apps on online social networks",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 6543,
    "paper_ids": [
      1822
    ],
    "papers_without_artifact_ids": [
      5659,
      813
    ]
  },
  {
    "name": "Rainer Schnell",
    "display_name": "Rainer Schnell",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Strengthening Privacy-Preserving Record Linkage using Diffusion",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6544,
    "paper_ids": [
      1711
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hiromi Arai",
    "display_name": "Hiromi Arai",
    "affiliation": "The University of Tokyo",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a Location Trace Anonymization Contest",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6545,
    "paper_ids": [
      4515
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Makoto Iguchi",
    "display_name": "Makoto Iguchi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a Location Trace Anonymization Contest",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6546,
    "paper_ids": [
      4515
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hiroaki Kikuchi",
    "display_name": "Hiroaki Kikuchi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ATC": 0,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "ATC": {},
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a Location Trace Anonymization Contest",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6547,
    "paper_ids": [
      4515
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Atsushi Kuromasa",
    "display_name": "Atsushi Kuromasa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a Location Trace Anonymization Contest",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6548,
    "paper_ids": [
      4515
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hiroshi Nakagawa",
    "display_name": "Hiroshi Nakagawa",
    "affiliation": "University of Tokyo",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a Location Trace Anonymization Contest",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6549,
    "paper_ids": [
      4515
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuichi Nakamura 0004",
    "display_name": "Yuichi Nakamura",
    "affiliation": "SoftBank Corp.",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a Location Trace Anonymization Contest",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6550,
    "paper_ids": [
      4515
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kenshiro Nishiyama",
    "display_name": "Kenshiro Nishiyama",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a Location Trace Anonymization Contest",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6551,
    "paper_ids": [
      4515
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ryo Nojima",
    "display_name": "Ryo Nojima",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a Location Trace Anonymization Contest",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6552,
    "paper_ids": [
      4515
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hidenobu Oguri",
    "display_name": "Hidenobu Oguri",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a Location Trace Anonymization Contest",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6553,
    "paper_ids": [
      4515
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chiemi Watanabe",
    "display_name": "Chiemi Watanabe",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a Location Trace Anonymization Contest",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6554,
    "paper_ids": [
      4515
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Akira Yamada 0001",
    "display_name": "Akira Yamada",
    "affiliation": "University of Kentucky",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a Location Trace Anonymization Contest",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on recruiting and retaining users for securitysensitive longitudinal measurement panels",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 6555,
    "paper_ids": [
      4515
    ],
    "papers_without_artifact_ids": [
      3294
    ]
  },
  {
    "name": "Takayasu Yamaguchi",
    "display_name": "Takayasu Yamaguchi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a Location Trace Anonymization Contest",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6556,
    "paper_ids": [
      4515
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuji Yamaoka",
    "display_name": "Yuji Yamaoka",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Designing a Location Trace Anonymization Contest",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6557,
    "paper_ids": [
      4515
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexander Veicht",
    "display_name": "Alexander Veicht",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6558,
    "paper_ids": [
      3147
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cédric Renggli",
    "display_name": "Cédric Renggli",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8106,
    "paper_ids": [
      3147
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tore Kasper Frederiksen",
    "display_name": "Tore Kasper Frederiksen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attribute-based Single Sign-On: Secure, Private, and Efficient",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6560,
    "paper_ids": [
      5660
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Julia Hesse",
    "display_name": "Julia Hesse",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attribute-based Single Sign-On: Secure, Private, and Efficient",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how to bind anonymous credentials to humans",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6561,
    "paper_ids": [
      5660
    ],
    "papers_without_artifact_ids": [
      5099
    ]
  },
  {
    "name": "Bertram Poettering",
    "display_name": "Bertram Poettering",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attribute-based Single Sign-On: Secure, Private, and Efficient",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6562,
    "paper_ids": [
      5660
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Patrick Towa",
    "display_name": "Patrick Towa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attribute-based Single Sign-On: Secure, Private, and Efficient",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6563,
    "paper_ids": [
      5660
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nico Ebert",
    "display_name": "Nico Ebert",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Creative beyond TikToks: Investigating Adolescents' Social Privacy Management on TikTok",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6564,
    "paper_ids": [
      5661
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tim Geppert",
    "display_name": "Tim Geppert",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Creative beyond TikToks: Investigating Adolescents' Social Privacy Management on TikTok",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6565,
    "paper_ids": [
      5661
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joanna Strycharz",
    "display_name": "Joanna Strycharz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Creative beyond TikToks: Investigating Adolescents' Social Privacy Management on TikTok",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6566,
    "paper_ids": [
      5661
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Melanie Knieps",
    "display_name": "Melanie Knieps",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Creative beyond TikToks: Investigating Adolescents' Social Privacy Management on TikTok",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6567,
    "paper_ids": [
      5661
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Hönig",
    "display_name": "Michael Hönig",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Creative beyond TikToks: Investigating Adolescents' Social Privacy Management on TikTok",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8107,
    "paper_ids": [
      5661
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Elke Brucker-Kley",
    "display_name": "Elke Brucker-Kley",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Creative beyond TikToks: Investigating Adolescents' Social Privacy Management on TikTok",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6569,
    "paper_ids": [
      5661
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Iyiola E. Olatunji",
    "display_name": "Iyiola E. Olatunji",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Private Graph Extraction via Feature Explanations",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6570,
    "paper_ids": [
      5662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mandeep Rathee",
    "display_name": "Mandeep Rathee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Private Graph Extraction via Feature Explanations",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6571,
    "paper_ids": [
      5662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thorben Funke",
    "display_name": "Thorben Funke",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Private Graph Extraction via Feature Explanations",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6572,
    "paper_ids": [
      5662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Megha Khosla",
    "display_name": "Megha Khosla",
    "affiliation": "TU Delft",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Private Graph Extraction via Feature Explanations",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6573,
    "paper_ids": [
      5662
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marwan Fayed",
    "display_name": "Marwan Fayed",
    "affiliation": "University of St Andrews",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Evaluating practical QUIC website fingerprinting defenses for the masses",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "let the right one in attestation as a usable captcha alternative",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "oblivious dns over https odoh a practical privacy enhancement to dns",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 6574,
    "paper_ids": [
      972
    ],
    "papers_without_artifact_ids": [
      2944,
      2945
    ]
  },
  {
    "name": "Alessandro N. Baccarini",
    "display_name": "Alessandro N. Baccarini",
    "affiliation": "Input Output",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6575,
    "paper_ids": [
      3421
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mike Rosulek",
    "display_name": "Mike Rosulek",
    "affiliation": "Oregon State University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2023": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Verifiable Distributed Aggregation Functions",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "practical privacypreserving authentication for ssh",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "on the impracticality of adversarial perturbation for image privacy",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "practical privacypreserving kmeans clustering",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 6576,
    "paper_ids": [
      4499
    ],
    "papers_without_artifact_ids": [
      4859,
      5663,
      4566
    ]
  },
  {
    "name": "Yunhao Yang",
    "display_name": "Yunhao Yang",
    "affiliation": "Yale University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Privacy Risks of Deploying Recurrent Neural Networks in Machine Learning Models",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6577,
    "paper_ids": [
      5664
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Parham Gohari",
    "display_name": "Parham Gohari",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Privacy Risks of Deploying Recurrent Neural Networks in Machine Learning Models",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6578,
    "paper_ids": [
      5664
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ufuk Topcu",
    "display_name": "Ufuk Topcu",
    "affiliation": "University of Texas at Austin",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Privacy Risks of Deploying Recurrent Neural Networks in Machine Learning Models",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6579,
    "paper_ids": [
      5664
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuzhou Jiang",
    "display_name": "Yuzhou Jiang",
    "affiliation": "Case Western Reserve University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Robust Fingerprint of Privacy-Preserving Location Trajectories",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6580,
    "paper_ids": [
      2558
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Emre Yilmaz 0002",
    "display_name": "Emre Yilmaz",
    "affiliation": "University of Houston-Downtown",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Robust Fingerprint of Privacy-Preserving Location Trajectories",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacypreserving fingerprinting against collusion and correlation threats in genomic data",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 6581,
    "paper_ids": [
      2558
    ],
    "papers_without_artifact_ids": [
      2560
    ]
  },
  {
    "name": "Yuting Zhan",
    "display_name": "Yuting Zhan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy-Aware Adversarial Network in Human Mobility Prediction",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6582,
    "paper_ids": [
      3314
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Afra Mashhadi",
    "display_name": "Afra Mashhadi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy-Aware Adversarial Network in Human Mobility Prediction",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6583,
    "paper_ids": [
      3314
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maxwell Bland",
    "display_name": "Maxwell Bland",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Story Beyond the Eye: Glyph Positions Break PDF Text Redaction",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "jetset targeted firmware rehosting for embedded systems",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6584,
    "paper_ids": [
      5665
    ],
    "papers_without_artifact_ids": [
      5666
    ]
  },
  {
    "name": "Anushya Iyer",
    "display_name": "Anushya Iyer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Story Beyond the Eye: Glyph Positions Break PDF Text Redaction",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6585,
    "paper_ids": [
      5665
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kirill Levchenko",
    "display_name": "Kirill Levchenko",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Story Beyond the Eye: Glyph Positions Break PDF Text Redaction",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "jetset targeted firmware rehosting for embedded systems",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6586,
    "paper_ids": [
      5665
    ],
    "papers_without_artifact_ids": [
      5666
    ]
  },
  {
    "name": "Matteo Giomi",
    "display_name": "Matteo Giomi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Unified Framework for Quantifying Privacy Risk in Synthetic Data",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6587,
    "paper_ids": [
      4521
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christoph Wehmeyer",
    "display_name": "Christoph Wehmeyer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Unified Framework for Quantifying Privacy Risk in Synthetic Data",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6588,
    "paper_ids": [
      4521
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Borbála Tasnádi",
    "display_name": "Borbála Tasnádi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Unified Framework for Quantifying Privacy Risk in Synthetic Data",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8108,
    "paper_ids": [
      4521
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Omid Mir",
    "display_name": "Omid Mir",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Delegatable Anonymous Credentials From Equivalence Class Signatures",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6590,
    "paper_ids": [
      5667
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Slamanig",
    "display_name": "Daniel Slamanig",
    "affiliation": "Universitt der Bundeswehr Mnchen, Germany",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Delegatable Anonymous Credentials From Equivalence Class Signatures",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6591,
    "paper_ids": [
      5667
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Balthazar Bauer",
    "display_name": "Balthazar Bauer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Delegatable Anonymous Credentials From Equivalence Class Signatures",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6592,
    "paper_ids": [
      5667
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "René Mayrhofer",
    "display_name": "René Mayrhofer",
    "affiliation": "JKU Linz",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical Delegatable Anonymous Credentials From Equivalence Class Signatures",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8109,
    "paper_ids": [
      5667
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Akshaye Shenoi",
    "display_name": "Akshaye Shenoi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the routingaware peering against networkeclipse attacks in bitcoin",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6594,
    "paper_ids": [
      5668
    ],
    "papers_without_artifact_ids": [
      5067
    ]
  },
  {
    "name": "Prasanna Karthik Vairam",
    "display_name": "Prasanna Karthik Vairam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6595,
    "paper_ids": [
      5668
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kanav Sabharwal",
    "display_name": "Kanav Sabharwal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6596,
    "paper_ids": [
      5668
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jialin Li",
    "display_name": "Jialin Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6597,
    "paper_ids": [
      5668
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dinil Mon Divakaran",
    "display_name": "Dinil Mon Divakaran",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "inferring phishing intention via webpage appearance and dynamics a deep vision based approach",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "phishpedia a hybrid deep learning based approach to visually identify phishing webpages",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6598,
    "paper_ids": [
      5668
    ],
    "papers_without_artifact_ids": [
      4425,
      4426
    ]
  },
  {
    "name": "Ania M. Piotrowska",
    "display_name": "Ania M. Piotrowska",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Compact and Divisible E-Cash with Threshold Issuance",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6599,
    "paper_ids": [
      4523
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alex Davidson",
    "display_name": "Alex Davidson",
    "affiliation": "Universidade de Lisboa",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 1
      },
      "USENIXSEC": {
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "distefano decentralized infrastructure for sharing trusted encrypted facts and nothing more",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "telesparse practical privacypreserving verification of deep neural networks",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "let the right one in attestation as a usable captcha alternative",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 6600,
    "paper_ids": [
      4059
    ],
    "papers_without_artifact_ids": [
      3315,
      3316,
      2944
    ]
  },
  {
    "name": "Gonçalo Pestana",
    "display_name": "Gonçalo Pestana",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "distefano decentralized infrastructure for sharing trusted encrypted facts and nothing more",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 8110,
    "paper_ids": [
      4059
    ],
    "papers_without_artifact_ids": [
      3315
    ]
  },
  {
    "name": "Lindsey Tulloch",
    "display_name": "Lindsey Tulloch",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Lox: Protecting the Social Graph in Bridge Distribution",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6602,
    "paper_ids": [
      1286
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dana Keeler",
    "display_name": "Dana Keeler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DPrio: Efficient Differential Privacy with High Utility for Prio",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6603,
    "paper_ids": [
      4490
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Emily Lepert",
    "display_name": "Emily Lepert",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DPrio: Efficient Differential Privacy with High Utility for Prio",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6604,
    "paper_ids": [
      4490
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shannon Veitch",
    "display_name": "Shannon Veitch",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DPrio: Efficient Differential Privacy with High Utility for Prio",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6605,
    "paper_ids": [
      4490
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xi He",
    "display_name": "Xi He",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DPrio: Efficient Differential Privacy with High Utility for Prio",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6606,
    "paper_ids": [
      4490
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Da Zhong 0001",
    "display_name": "Da Zhong",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6607,
    "paper_ids": [
      1756
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kun Wu 0011",
    "display_name": "Kun Wu",
    "affiliation": "Renmin University of China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6608,
    "paper_ids": [
      1756
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiuling Wang",
    "display_name": "Xiuling Wang",
    "affiliation": "Western Sydney University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 3,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 2
      },
      "ACSAC": {
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gclleak link membership inference attacks against graph contrastive learning",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "subgraph structure membership inference attacks against graph neural networks",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "link membership inference attacks against unsupervised graph representation learning",
        "conference": "ACSAC",
        "year": 2023
      }
    ],
    "author_id": 6609,
    "paper_ids": [
      1756
    ],
    "papers_without_artifact_ids": [
      4466,
      4467,
      4468
    ]
  },
  {
    "name": "Chen Sun",
    "display_name": "Chen Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GDPRxiv: Establishing the State of the Art in GDPR Enforcement",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6610,
    "paper_ids": [
      5669
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Evan Jacobs",
    "display_name": "Evan Jacobs",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GDPRxiv: Establishing the State of the Art in GDPR Enforcement",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6611,
    "paper_ids": [
      5669
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Lehmann",
    "display_name": "Daniel Lehmann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GDPRxiv: Establishing the State of the Art in GDPR Enforcement",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6612,
    "paper_ids": [
      5669
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrew Crouse",
    "display_name": "Andrew Crouse",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GDPRxiv: Establishing the State of the Art in GDPR Enforcement",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6613,
    "paper_ids": [
      5669
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Supreeth Shastri",
    "display_name": "Supreeth Shastri",
    "affiliation": "University of North Texas",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GDPRxiv: Establishing the State of the Art in GDPR Enforcement",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6614,
    "paper_ids": [
      5669
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Evelyn Muschter",
    "display_name": "Evelyn Muschter",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding Person Identification Through Gait",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6616,
    "paper_ids": [
      2174
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Admantini Hatzipanayioti",
    "display_name": "Admantini Hatzipanayioti",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding Person Identification Through Gait",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6617,
    "paper_ids": [
      2174
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shu-Chen Li",
    "display_name": "Shu-Chen Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding Person Identification Through Gait",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6618,
    "paper_ids": [
      2174
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sebastian Pahl",
    "display_name": "Sebastian Pahl",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6619,
    "paper_ids": [
      4525
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Florian Adamsky",
    "display_name": "Florian Adamsky",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6620,
    "paper_ids": [
      4525
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Kaiser 0001",
    "display_name": "Daniel Kaiser",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6621,
    "paper_ids": [
      4525
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Florian Turati",
    "display_name": "Florian Turati",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6622,
    "paper_ids": [
      447
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arnab Bag",
    "display_name": "Arnab Bag",
    "affiliation": "Imec Belgium",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6623,
    "paper_ids": [
      2383
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Debadrita Talapatra",
    "display_name": "Debadrita Talapatra",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6624,
    "paper_ids": [
      2383
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ayushi Rastogi",
    "display_name": "Ayushi Rastogi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6625,
    "paper_ids": [
      2383
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Oliver Wang",
    "display_name": "Oliver Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Usability and Enforceability of Global Privacy Control",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "websites global privacy control compliance at scale and over time",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 6626,
    "paper_ids": [
      3424
    ],
    "papers_without_artifact_ids": [
      3427
    ]
  },
  {
    "name": "Kuba Alicki",
    "display_name": "Kuba Alicki",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Usability and Enforceability of Global Privacy Control",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6627,
    "paper_ids": [
      3424
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jocelyn Wang",
    "display_name": "Jocelyn Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Usability and Enforceability of Global Privacy Control",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "websites global privacy control compliance at scale and over time",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 6628,
    "paper_ids": [
      3424
    ],
    "papers_without_artifact_ids": [
      3427
    ]
  },
  {
    "name": "Sophie Eng",
    "display_name": "Sophie Eng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Usability and Enforceability of Global Privacy Control",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "websites global privacy control compliance at scale and over time",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 6629,
    "paper_ids": [
      3424
    ],
    "papers_without_artifact_ids": [
      3427
    ]
  },
  {
    "name": "Kang Gu",
    "display_name": "Kang Gu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Sentence Level Inference Attack Against Pre-trained Language Models",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6630,
    "paper_ids": [
      2531
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Neha Ramsurrun",
    "display_name": "Neha Ramsurrun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Sentence Level Inference Attack Against Pre-trained Language Models",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6631,
    "paper_ids": [
      2531
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Soroush Vosoughi",
    "display_name": "Soroush Vosoughi",
    "affiliation": "Dartmouth College",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Sentence Level Inference Attack Against Pre-trained Language Models",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6632,
    "paper_ids": [
      2531
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Roberto Tamassia",
    "display_name": "Roberto Tamassia",
    "affiliation": "Brown University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attacks on Encrypted Response-Hiding Range Search Schemes in Multiple Dimensions",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "time and spaceefficient aggregate range queries over encrypted databases",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 6633,
    "paper_ids": [
      3358
    ],
    "papers_without_artifact_ids": [
      4360
    ]
  },
  {
    "name": "Christopher Mühl",
    "display_name": "Christopher Mühl",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8111,
    "paper_ids": [
      4522
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Roy Rinberg",
    "display_name": "Roy Rinberg",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6635,
    "paper_ids": [
      4522
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jannis Ihrig",
    "display_name": "Jannis Ihrig",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6636,
    "paper_ids": [
      4522
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Adam Dziedzic",
    "display_name": "Adam Dziedzic",
    "affiliation": "CISPA Helmholtz Center",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "private multiwinner voting for machine learning",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 6637,
    "paper_ids": [
      4522
    ],
    "papers_without_artifact_ids": [
      3232
    ]
  },
  {
    "name": "Pranav Shriram A",
    "display_name": "Pranav Shriram A",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Ruffle: Rapid 3-Party Shuffle Protocols",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "find thy neighbourhood privacypreserving local clustering",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 6638,
    "paper_ids": [
      4527
    ],
    "papers_without_artifact_ids": [
      4529
    ]
  },
  {
    "name": "Arpita Patra",
    "display_name": "Arpita Patra",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "PETS": 6,
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 1,
        "2023": 2,
        "2025": 1,
        "2024": 1
      },
      "USENIXSEC": {
        "2021": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 12.5,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Ruffle: Rapid 3-Party Shuffle Protocols",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "match quest fast and secure pattern matching",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "privadome delivery drones and citizen privacy",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "find thy neighbourhood privacypreserving local clustering",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "how to prove any np statement jointly efficient distributedprover zeroknowledge protocols",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "swift superfast and robust privacypreserving machine learning",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "aby20 improved mixedprotocol secure twoparty computation",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "flash fast and robust framework for privacypreserving machine learning",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 6639,
    "paper_ids": [
      4527
    ],
    "papers_without_artifact_ids": [
      4528,
      3122,
      4529,
      5670,
      3123,
      2973,
      3124
    ]
  },
  {
    "name": "Bhavish Raj Gopal",
    "display_name": "Bhavish Raj Gopal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 2,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Ruffle: Rapid 3-Party Shuffle Protocols",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "match quest fast and secure pattern matching",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "find thy neighbourhood privacypreserving local clustering",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 6640,
    "paper_ids": [
      4527
    ],
    "papers_without_artifact_ids": [
      4528,
      4529
    ]
  },
  {
    "name": "Somya Sangal",
    "display_name": "Somya Sangal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Ruffle: Rapid 3-Party Shuffle Protocols",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6641,
    "paper_ids": [
      4527
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "César Sabater",
    "display_name": "César Sabater",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Private Sampling with Identifiable Cheaters",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8112,
    "paper_ids": [
      1440
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jan Ramon",
    "display_name": "Jan Ramon",
    "affiliation": "CRIStAL",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Private Sampling with Identifiable Cheaters",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6643,
    "paper_ids": [
      1440
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abdul Haddi Amjad",
    "display_name": "Abdul Haddi Amjad",
    "affiliation": "Virginia Tech",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Blocking JavaScript Without Breaking the Web: An Empirical Investigation",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6644,
    "paper_ids": [
      809
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muhammad Ali Gulzar",
    "display_name": "Muhammad Ali Gulzar",
    "affiliation": "Virginia Tech",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Blocking JavaScript Without Breaking the Web: An Empirical Investigation",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6645,
    "paper_ids": [
      809
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ehud Aharoni",
    "display_name": "Ehud Aharoni",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "argmax and xgboost training over fully homomorphic encryption",
        "conference": "PETS",
        "year": 2026
      }
    ],
    "author_id": 6646,
    "paper_ids": [
      4534
    ],
    "papers_without_artifact_ids": [
      4573
    ]
  },
  {
    "name": "Allon Adir",
    "display_name": "Allon Adir",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "argmax and xgboost training over fully homomorphic encryption",
        "conference": "PETS",
        "year": 2026
      }
    ],
    "author_id": 6647,
    "paper_ids": [
      4534
    ],
    "papers_without_artifact_ids": [
      4573
    ]
  },
  {
    "name": "Moran Baruch",
    "display_name": "Moran Baruch",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6648,
    "paper_ids": [
      4534
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nir Drucker",
    "display_name": "Nir Drucker",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6649,
    "paper_ids": [
      4534
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gilad Ezov",
    "display_name": "Gilad Ezov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6650,
    "paper_ids": [
      4534
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ariel Farkash",
    "display_name": "Ariel Farkash",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6651,
    "paper_ids": [
      4534
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lev Greenberg",
    "display_name": "Lev Greenberg",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6652,
    "paper_ids": [
      4534
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ramy Masalha",
    "display_name": "Ramy Masalha",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "argmax and xgboost training over fully homomorphic encryption",
        "conference": "PETS",
        "year": 2026
      }
    ],
    "author_id": 6653,
    "paper_ids": [
      4534
    ],
    "papers_without_artifact_ids": [
      4573
    ]
  },
  {
    "name": "Guy Moshkowich",
    "display_name": "Guy Moshkowich",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secure rangesearching using copyandrecurse",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 6654,
    "paper_ids": [
      4534
    ],
    "papers_without_artifact_ids": [
      4536
    ]
  },
  {
    "name": "Dov Murik",
    "display_name": "Dov Murik",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "accurate malware detection by extreme abstraction",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 6655,
    "paper_ids": [
      4534
    ],
    "papers_without_artifact_ids": [
      5671
    ]
  },
  {
    "name": "Omri Soceanu",
    "display_name": "Omri Soceanu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6656,
    "paper_ids": [
      4534
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kasra Edalatnejad",
    "display_name": "Kasra Edalatnejad",
    "affiliation": "TU Darmstadt",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Private Collection Matching Protocols",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "datasharenetwork a decentralized privacypreserving search engine for investigative journalists",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6657,
    "paper_ids": [
      973
    ],
    "papers_without_artifact_ids": [
      978
    ]
  },
  {
    "name": "Mathilde Raynal",
    "display_name": "Mathilde Raynal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Private Collection Matching Protocols",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6658,
    "paper_ids": [
      973
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nikhil Jha",
    "display_name": "Nikhil Jha",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Robustness of Topics API to a Re-Identification Attack",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6659,
    "paper_ids": [
      5672
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martino Trevisan",
    "display_name": "Martino Trevisan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Robustness of Topics API to a Re-Identification Attack",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6660,
    "paper_ids": [
      5672
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Emilio Leonardi",
    "display_name": "Emilio Leonardi",
    "affiliation": "Polytechnic University of Turin, Italy",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Robustness of Topics API to a Re-Identification Attack",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6661,
    "paper_ids": [
      5672
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marco Mellia",
    "display_name": "Marco Mellia",
    "affiliation": "Politecnico di Torino, Italy",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "ATC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2021": 1
      },
      "ATC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Robustness of Topics API to a Re-Identification Attack",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unveiling web fingerprinting in the wild via code mining and machine learning",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 6662,
    "paper_ids": [
      5672
    ],
    "papers_without_artifact_ids": [
      5673
    ]
  },
  {
    "name": "Michael T. Goodrich",
    "display_name": "Michael T. Goodrich",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Secure and Accurate Summation of Many Floating-Point Numbers",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6663,
    "paper_ids": [
      3422
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jean-Guillaume Dumas",
    "display_name": "Jean-Guillaume Dumas",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VESPo: Verified Evaluation of Secret Polynomials (with application to dynamic proofs of retrievability)",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dynamic proofs of retrievability with low server storage",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6664,
    "paper_ids": [
      5674
    ],
    "papers_without_artifact_ids": [
      5675
    ]
  },
  {
    "name": "Aude Maignan",
    "display_name": "Aude Maignan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VESPo: Verified Evaluation of Secret Polynomials (with application to dynamic proofs of retrievability)",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dynamic proofs of retrievability with low server storage",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6665,
    "paper_ids": [
      5674
    ],
    "papers_without_artifact_ids": [
      5675
    ]
  },
  {
    "name": "Clément Pernet",
    "display_name": "Clément Pernet",
    "affiliation": "Ecole Normale Superieure de Lyon",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VESPo: Verified Evaluation of Secret Polynomials (with application to dynamic proofs of retrievability)",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dynamic proofs of retrievability with low server storage",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 8113,
    "paper_ids": [
      5674
    ],
    "papers_without_artifact_ids": [
      5675
    ]
  },
  {
    "name": "Daniel S. Roche",
    "display_name": "Daniel S. Roche",
    "affiliation": "United States Naval Academy, Annapolis, USA",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VESPo: Verified Evaluation of Secret Polynomials (with application to dynamic proofs of retrievability)",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dynamic proofs of retrievability with low server storage",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6667,
    "paper_ids": [
      5674
    ],
    "papers_without_artifact_ids": [
      5675
    ]
  },
  {
    "name": "Gonzalo Munilla Garrido",
    "display_name": "Gonzalo Munilla Garrido",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 2,
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploring the Privacy Risks of Adversarial VR Game Design",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok data privacy in virtual reality",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "lessons learned surveying the practicality of differential privacy in the industry",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 6668,
    "paper_ids": [
      3279
    ],
    "papers_without_artifact_ids": [
      3281,
      3282
    ]
  },
  {
    "name": "James F. O'Brien",
    "display_name": "James F. O'Brien",
    "affiliation": "Univ. of California - Berkeley",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Exploring the Privacy Risks of Adversarial VR Game Design",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unique identification of 50 000 virtual reality users from head hand motion data",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6669,
    "paper_ids": [
      3279
    ],
    "papers_without_artifact_ids": [
      3283
    ]
  },
  {
    "name": "Sindhuja Madabushi",
    "display_name": "Sindhuja Madabushi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Two-Cloud Private Read Alignment to a Public Reference Genome",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6670,
    "paper_ids": [
      5676
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Parameswaran Ramanathan",
    "display_name": "Parameswaran Ramanathan",
    "affiliation": "University of Wisconsin - Madison",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Two-Cloud Private Read Alignment to a Public Reference Genome",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6671,
    "paper_ids": [
      5676
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Charles Gouert",
    "display_name": "Charles Gouert",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "SC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 1
      },
      "SC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hardwareaccelerated encrypted execution of generalpurpose applications",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 6672,
    "paper_ids": [
      2595
    ],
    "papers_without_artifact_ids": [
      3428
    ]
  },
  {
    "name": "Sadiq Aliyu",
    "display_name": "Sadiq Aliyu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Role and Form of Personal Information Disclosure in Cyberbullying Incidents",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6673,
    "paper_ids": [
      5677
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kavous Salehzadeh Niksirat",
    "display_name": "Kavous Salehzadeh Niksirat",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 4,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 2,
        "2024": 2
      },
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Role and Form of Personal Information Disclosure in Cyberbullying Incidents",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "addressing the address books interdependent privacy issues",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "our data our solutions a participatory approach for enhancing privacy in wearable activity tracker thirdparty apps",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "security and privacy with secondhand storage devices a usercentric perspective from switzerland",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "revoked just now users behaviors toward fitnessdata sharing with thirdparty applications",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 6674,
    "paper_ids": [
      5677
    ],
    "papers_without_artifact_ids": [
      5678,
      5679,
      5680,
      5681
    ]
  },
  {
    "name": "Kévin Huguenin",
    "display_name": "Kévin Huguenin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "PETS": 4,
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 2,
        "2024": 2
      },
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Role and Form of Personal Information Disclosure in Cyberbullying Incidents",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "addressing the address books interdependent privacy issues",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "our data our solutions a participatory approach for enhancing privacy in wearable activity tracker thirdparty apps",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "security and privacy with secondhand storage devices a usercentric perspective from switzerland",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "revoked just now users behaviors toward fitnessdata sharing with thirdparty applications",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "watch your watch inferring personality traits from wearable activity trackers",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 8114,
    "paper_ids": [
      5677
    ],
    "papers_without_artifact_ids": [
      5678,
      5679,
      5680,
      5681,
      5682
    ]
  },
  {
    "name": "Mauro Cherubini",
    "display_name": "Mauro Cherubini",
    "affiliation": "University of Lausanne",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Role and Form of Personal Information Disclosure in Cyberbullying Incidents",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "security and privacy with secondhand storage devices a usercentric perspective from switzerland",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 6676,
    "paper_ids": [
      5677
    ],
    "papers_without_artifact_ids": [
      5680
    ]
  },
  {
    "name": "Hyojoon Kim",
    "display_name": "Hyojoon Kim",
    "affiliation": "University of Virginia",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      },
      "NSDI": {
        "2015": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "kinetic verifiable dynamic network control",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 6677,
    "paper_ids": [
      136
    ],
    "papers_without_artifact_ids": [
      3383
    ]
  },
  {
    "name": "Tina Marjanov",
    "display_name": "Tina Marjanov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Data Security on the Ground: Investigating Technical and Legal Requirements under the GDPR",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6678,
    "paper_ids": [
      5683
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maria Konstantinou",
    "display_name": "Maria Konstantinou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Data Security on the Ground: Investigating Technical and Legal Requirements under the GDPR",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6679,
    "paper_ids": [
      5683
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Magdalena Józwiak",
    "display_name": "Magdalena Józwiak",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Data Security on the Ground: Investigating Technical and Legal Requirements under the GDPR",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8115,
    "paper_ids": [
      5683
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dayana Spagnuelo",
    "display_name": "Dayana Spagnuelo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Data Security on the Ground: Investigating Technical and Legal Requirements under the GDPR",
        "conference": "PETS",
        "year": 2023,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6681,
    "paper_ids": [
      5683
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alessio Xompero",
    "display_name": "Alessio Xompero",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Learning Privacy from Visual Entities",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6682,
    "paper_ids": [
      4538
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Felix Kalinowski",
    "display_name": "Felix Kalinowski",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Making Web Applications GDPR Compliant: A Comparative Evaluation of GDPR-Enforcement Frameworks",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6683,
    "paper_ids": [
      222
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arushi Arora",
    "display_name": "Arushi Arora",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improving the Performance and Security of Tor's Onion Services",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6684,
    "paper_ids": [
      2185
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jake Chanenson",
    "display_name": "Jake Chanenson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automating Governing Knowledge Commons and Contextual Integrity (GKC-CI) Privacy Policy Annotations with Large Language Models",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6685,
    "paper_ids": [
      5684
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Madison Pickering",
    "display_name": "Madison Pickering",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automating Governing Knowledge Commons and Contextual Integrity (GKC-CI) Privacy Policy Annotations with Large Language Models",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "defining broken user experiences and remediation tactics when adblocking or trackingprotection tools break a websites user experience",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6686,
    "paper_ids": [
      5684
    ],
    "papers_without_artifact_ids": [
      5685
    ]
  },
  {
    "name": "Noah Apthrope",
    "display_name": "Noah Apthrope",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automating Governing Knowledge Commons and Contextual Integrity (GKC-CI) Privacy Policy Annotations with Large Language Models",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6687,
    "paper_ids": [
      5684
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andreas Athanasiou",
    "display_name": "Andreas Athanasiou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enhancing Metric Privacy With a Shuffler",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6688,
    "paper_ids": [
      4540
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Konstantinos Chatzikokolakis 0001",
    "display_name": "Konstantinos Chatzikokolakis",
    "affiliation": "BITS Pilani",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enhancing Metric Privacy With a Shuffler",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6689,
    "paper_ids": [
      4540
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ali Rasaii",
    "display_name": "Ali Rasaii",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Intractable Cookie Crumbs: Unveiling the Nexus of Stateful Banner Interaction and Tracking Cookies",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6690,
    "paper_ids": [
      3360
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohammadmahdi Javid",
    "display_name": "Mohammadmahdi Javid",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Intractable Cookie Crumbs: Unveiling the Nexus of Stateful Banner Interaction and Tracking Cookies",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6691,
    "paper_ids": [
      3360
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Oliver Gasser",
    "display_name": "Oliver Gasser",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Intractable Cookie Crumbs: Unveiling the Nexus of Stateful Banner Interaction and Tracking Cookies",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6692,
    "paper_ids": [
      3360
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Devashish Gosain",
    "display_name": "Devashish Gosain",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 3,
      "ACSAC": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {
        "2017": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Intractable Cookie Crumbs: Unveiling the Nexus of Stateful Banner Interaction and Tracking Cookies",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cryptographic deniability a multiperspective study of user perceptions and expectations",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "too close for comfort morasses of anti censorship in the era of cdns",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "siegebreaker an sdn based practical decoy routing system",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "the devils in the details placing decoy routers in the internet",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 6693,
    "paper_ids": [
      3360
    ],
    "papers_without_artifact_ids": [
      5686,
      5687,
      4595,
      5688
    ]
  },
  {
    "name": "Chris Geeng",
    "display_name": "Chris Geeng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Tracker Installations Are Not Created Equal: Understanding Tracker Configuration of Form Data Collection",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "say im in publici dont want my nudes to pop up user threat models for using vault applications",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6694,
    "paper_ids": [
      4541
    ],
    "papers_without_artifact_ids": [
      4545
    ]
  },
  {
    "name": "Marco Di Gennaro",
    "display_name": "Marco Di Gennaro",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6695,
    "paper_ids": [
      3065
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Giovanni De Lucia",
    "display_name": "Giovanni De Lucia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6696,
    "paper_ids": [
      3065
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yaxi Yang",
    "display_name": "Yaxi Yang",
    "affiliation": "Yale University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6697,
    "paper_ids": [
      839
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaojian Liang",
    "display_name": "Xiaojian Liang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6698,
    "paper_ids": [
      839
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ye Dong",
    "display_name": "Ye Dong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lightweight secure aggregation for personalized federated learning with backdoor resistance",
        "conference": "ACSAC",
        "year": 2024
      }
    ],
    "author_id": 6699,
    "paper_ids": [
      839
    ],
    "papers_without_artifact_ids": [
      5689
    ]
  },
  {
    "name": "Linting Huang",
    "display_name": "Linting Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6700,
    "paper_ids": [
      839
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hongyu Ren",
    "display_name": "Hongyu Ren",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6701,
    "paper_ids": [
      839
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rachit Rajat",
    "display_name": "Rachit Rajat",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PIGEON: A High Throughput Framework for Private Inference of Neural Networks using Secure Multiparty Computation",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6702,
    "paper_ids": [
      2600
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nils Rollshausen",
    "display_name": "Nils Rollshausen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "WatchWitch: Interoperability, Privacy, and Autonomy for the Apple Watch",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6703,
    "paper_ids": [
      415
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuhe Tian",
    "display_name": "Yuhe Tian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Panopticon: The Design and Evaluation of a Game that Teaches Data Science Students Designing Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6704,
    "paper_ids": [
      3871
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shao-Yu Chu",
    "display_name": "Shao-Yu Chu",
    "affiliation": "University of California, San Diego",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Panopticon: The Design and Evaluation of a Game that Teaches Data Science Students Designing Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6705,
    "paper_ids": [
      3871
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haojian Jin",
    "display_name": "Haojian Jin",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Panopticon: The Design and Evaluation of a Game that Teaches Data Science Students Designing Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pushing the range limits of commercial passive rfids",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 6706,
    "paper_ids": [
      3871
    ],
    "papers_without_artifact_ids": [
      5690
    ]
  },
  {
    "name": "Zhongrui Zhao",
    "display_name": "Zhongrui Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Practical, Private Assurance of the Value of Collaboration via Fully Homomorphic Encryption",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6707,
    "paper_ids": [
      4548
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaokun Luan",
    "display_name": "Xiaokun Luan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Robust and Efficient Watermarking of Large Language Models Using Error Correction Codes",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6708,
    "paper_ids": [
      5691
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zeming Wei",
    "display_name": "Zeming Wei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Robust and Efficient Watermarking of Large Language Models Using Error Correction Codes",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6709,
    "paper_ids": [
      5691
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yihao Zhang 0012",
    "display_name": "Yihao Zhang",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Robust and Efficient Watermarking of Large Language Models Using Error Correction Codes",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6710,
    "paper_ids": [
      5691
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Meng Sun 0002",
    "display_name": "Meng Sun",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Robust and Efficient Watermarking of Large Language Models Using Error Correction Codes",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6711,
    "paper_ids": [
      5691
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Patrick Mesana",
    "display_name": "Patrick Mesana",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "WaKA: Data Attribution using K-Nearest Neighbors and Membership Privacy Principles",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6712,
    "paper_ids": [
      2605
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Clément Benesse",
    "display_name": "Clément Benesse",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "WaKA: Data Attribution using K-Nearest Neighbors and Membership Privacy Principles",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8116,
    "paper_ids": [
      2605
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hadrien Lautraite",
    "display_name": "Hadrien Lautraite",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "WaKA: Data Attribution using K-Nearest Neighbors and Membership Privacy Principles",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6714,
    "paper_ids": [
      2605
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gilles Caporossi",
    "display_name": "Gilles Caporossi",
    "affiliation": "HEC Montral, Department of Decision Sciences",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "WaKA: Data Attribution using K-Nearest Neighbors and Membership Privacy Principles",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6715,
    "paper_ids": [
      2605
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nikita Samarin",
    "display_name": "Nikita Samarin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 1,
        "2024": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Defining Privacy Engineering as a Profession",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the medium is the message how secure messaging apps leak sensitive data to push notification services",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "lessons in vcr repair compliance of android app developers with the california consumer privacy act ccpa",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "empirical measurement of systemic 2fa usability",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6716,
    "paper_ids": [
      4510
    ],
    "papers_without_artifact_ids": [
      3923,
      3924,
      3929
    ]
  },
  {
    "name": "Nandita Rao Narla",
    "display_name": "Nandita Rao Narla",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Defining Privacy Engineering as a Profession",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6717,
    "paper_ids": [
      4510
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Liam Webster",
    "display_name": "Liam Webster",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Defining Privacy Engineering as a Profession",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6718,
    "paper_ids": [
      4510
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andreas Brüggemann",
    "display_name": "Andreas Brüggemann",
    "affiliation": "TU Darmstadt",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MultiCent: Secure and Scalable Computation of Centrality Measures on Multilayer Graphs",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8117,
    "paper_ids": [
      2969
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Collins 0001",
    "display_name": "Daniel Collins",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Real-World Deniability in Messaging",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "kwaay fast and deniable postquantum x3dh without ring signatures",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "cryptographic administration for secure group messaging",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6720,
    "paper_ids": [
      4267
    ],
    "papers_without_artifact_ids": [
      5692,
      5693
    ]
  },
  {
    "name": "Loïs Huguenin-Dumittan",
    "display_name": "Loïs Huguenin-Dumittan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Real-World Deniability in Messaging",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "kwaay fast and deniable postquantum x3dh without ring signatures",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 8118,
    "paper_ids": [
      4267
    ],
    "papers_without_artifact_ids": [
      5692
    ]
  },
  {
    "name": "Ayana Moshruba",
    "display_name": "Ayana Moshruba",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Are Neuromorphic Architectures Inherently Privacy-preserving? An Exploratory Study",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6722,
    "paper_ids": [
      5694
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ihsen Alouani",
    "display_name": "Ihsen Alouani",
    "affiliation": "Queen's University Belfast",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Are Neuromorphic Architectures Inherently Privacy-preserving? An Exploratory Study",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6723,
    "paper_ids": [
      5694
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maryam Parsa",
    "display_name": "Maryam Parsa",
    "affiliation": "George Mason University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Are Neuromorphic Architectures Inherently Privacy-preserving? An Exploratory Study",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6724,
    "paper_ids": [
      5694
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anne Paschke",
    "display_name": "Anne Paschke",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Impact of Default Mobile SDK Usage on Privacy and Data Protection",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6725,
    "paper_ids": [
      223
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jose Reis",
    "display_name": "Jose Reis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6726,
    "paper_ids": [
      2562
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mehmet Ugurbil",
    "display_name": "Mehmet Ugurbil",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6727,
    "paper_ids": [
      2562
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Miguel de Vega",
    "display_name": "Miguel de Vega",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6728,
    "paper_ids": [
      2562
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Adda-Akram Bendoukha",
    "display_name": "Adda-Akram Bendoukha",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Privacy-preserving and Fairness-aware Federated Learning Framework",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6729,
    "paper_ids": [
      2606
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Didem Demirag",
    "display_name": "Didem Demirag",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Privacy-preserving and Fairness-aware Federated Learning Framework",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6730,
    "paper_ids": [
      2606
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nesrine Kaaniche",
    "display_name": "Nesrine Kaaniche",
    "affiliation": "University of Sheffield",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Privacy-preserving and Fairness-aware Federated Learning Framework",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6731,
    "paper_ids": [
      2606
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chenxi Qiu",
    "display_name": "Chenxi Qiu",
    "affiliation": "University of North Texas",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Time-Efficient Locally Relevant Geo-Location Privacy Protection",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6732,
    "paper_ids": [
      4556
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ruiyao Liu",
    "display_name": "Ruiyao Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Time-Efficient Locally Relevant Geo-Location Privacy Protection",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6733,
    "paper_ids": [
      4556
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anna Cinzia Squicciarini",
    "display_name": "Anna Cinzia Squicciarini",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Time-Efficient Locally Relevant Geo-Location Privacy Protection",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6734,
    "paper_ids": [
      4556
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xinpeng Xie",
    "display_name": "Xinpeng Xie",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Time-Efficient Locally Relevant Geo-Location Privacy Protection",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6735,
    "paper_ids": [
      4556
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhifan Lu",
    "display_name": "Zhifan Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RPKI-Based Location-Unaware Tor Guard Relay Selection Algorithms",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6736,
    "paper_ids": [
      3052
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Siyang Sun",
    "display_name": "Siyang Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "RPKI-Based Location-Unaware Tor Guard Relay Selection Algorithms",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6737,
    "paper_ids": [
      3052
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Echo Meißner",
    "display_name": "Echo Meißner",
    "affiliation": "Ulm University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PrePaMS: Privacy-Preserving Participant Management System for Studies with Rewards and Prerequisites",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8119,
    "paper_ids": [
      3420
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benjamin Erb",
    "display_name": "Benjamin Erb",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PrePaMS: Privacy-Preserving Participant Management System for Studies with Rewards and Prerequisites",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6739,
    "paper_ids": [
      3420
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Almajd Zunquti",
    "display_name": "Almajd Zunquti",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Navigating Social Media Privacy: Awareness, Preferences, and Discoverability",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6740,
    "paper_ids": [
      2195
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gale M. Lucas",
    "display_name": "Gale M. Lucas",
    "affiliation": "University of Southern California",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Navigating Social Media Privacy: Awareness, Preferences, and Discoverability",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6741,
    "paper_ids": [
      2195
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haonan Shi 0002",
    "display_name": "Haonan Shi",
    "affiliation": "Case Western Reserve University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unveiling Client Privacy Leakage from Public Dataset Usage in Federated Distillation",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6742,
    "paper_ids": [
      5695
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tu Ouyang",
    "display_name": "Tu Ouyang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unveiling Client Privacy Leakage from Public Dataset Usage in Federated Distillation",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6743,
    "paper_ids": [
      5695
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "An Wang 0002",
    "display_name": "An Wang",
    "affiliation": "Case Western Reserve University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "EUROSYS": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unveiling Client Privacy Leakage from Public Dataset Usage in Federated Distillation",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dsyncps delayed synchronization for dynamic deployment of distributed machine learning",
        "conference": "EUROSYS",
        "year": 2022
      }
    ],
    "author_id": 6744,
    "paper_ids": [
      5695
    ],
    "papers_without_artifact_ids": [
      5696
    ]
  },
  {
    "name": "Olena Hrynenko",
    "display_name": "Olena Hrynenko",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Identifying Privacy Personas",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6745,
    "paper_ids": [
      4539
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leon Böttger",
    "display_name": "Leon Böttger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Okay Google, Where's My Tracker? Security, Privacy, and Performance Evaluation of Google's Find My Device Network",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8120,
    "paper_ids": [
      416
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexander Matern",
    "display_name": "Alexander Matern",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Okay Google, Where's My Tracker? Security, Privacy, and Performance Evaluation of Google's Find My Device Network",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lanshield analysing and protecting local network access on mobile devices",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 6747,
    "paper_ids": [
      416
    ],
    "papers_without_artifact_ids": [
      3269
    ]
  },
  {
    "name": "Dennis Arndt",
    "display_name": "Dennis Arndt",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Okay Google, Where's My Tracker? Security, Privacy, and Performance Evaluation of Google's Find My Device Network",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6748,
    "paper_ids": [
      416
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ojaswi Acharya",
    "display_name": "Ojaswi Acharya",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Non-Interactive Verifiable Aggregation",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6749,
    "paper_ids": [
      5697
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Suvasree Biswas",
    "display_name": "Suvasree Biswas",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Non-Interactive Verifiable Aggregation",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6750,
    "paper_ids": [
      5697
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weiqi Feng",
    "display_name": "Weiqi Feng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Non-Interactive Verifiable Aggregation",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6751,
    "paper_ids": [
      5697
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Adam O'Neill",
    "display_name": "Adam O'Neill",
    "affiliation": "Univ. of Massachusetts Amherst",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Non-Interactive Verifiable Aggregation",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6752,
    "paper_ids": [
      5697
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arkady Yerukhimovich",
    "display_name": "Arkady Yerukhimovich",
    "affiliation": "George Washington University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Non-Interactive Verifiable Aggregation",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "differentiallyprivate multiparty sketching for largescale statistics",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 6753,
    "paper_ids": [
      5697
    ],
    "papers_without_artifact_ids": [
      5698
    ]
  },
  {
    "name": "Dominika Woszczyk",
    "display_name": "Dominika Woszczyk",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DiDOTS: Knowledge Distillation from Large-Language-Models for Dementia Obfuscation in Transcribed Speech",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6754,
    "paper_ids": [
      5699
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Soteris Demetriou",
    "display_name": "Soteris Demetriou",
    "affiliation": "Imperial College London",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "PETS": 2,
      "SOSP": 1,
      "ACSAC": 1,
      "NSDI": 1,
      "NDSS": 0,
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      },
      "SOSP": {
        "2023": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "NSDI": {
        "2024": 1
      },
      "NDSS": {},
      "OSDI": {
        "2023": 2
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DiDOTS: Knowledge Distillation from Large-Language-Models for Dementia Obfuscation in Transcribed Speech",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "leaky diffusion attribute leakage in textguided image generation",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "mobileconfig remote configuration management for mobile apps at hyperscale",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "servicerouter hyperscale and minimal cost service mesh at meta",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "conveyor onetoolfitsall continuous software deployment at meta",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "xfaas hyperscale and low cost serverless functions at meta",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "characterizing improper input validation vulnerabilities of mobile crowdsourcing services",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 6755,
    "paper_ids": [
      5699
    ],
    "papers_without_artifact_ids": [
      5700,
      5701,
      4647,
      3681,
      4604,
      5702
    ]
  },
  {
    "name": "Marian Dietz",
    "display_name": "Marian Dietz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Private Shared Random Minimum Spanning Forests",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fast and private inference of deep neural networks by codesigning activation functions",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6756,
    "paper_ids": [
      1213
    ],
    "papers_without_artifact_ids": [
      1215
    ]
  },
  {
    "name": "Christian Böttger",
    "display_name": "Christian Böttger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding Regional Filter Lists: Efficacy and Impact",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8121,
    "paper_ids": [
      110
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jan Hörnemann",
    "display_name": "Jan Hörnemann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding Regional Filter Lists: Efficacy and Impact",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8122,
    "paper_ids": [
      110
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matteo Große-Kampmann",
    "display_name": "Matteo Große-Kampmann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Understanding Regional Filter Lists: Efficacy and Impact",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the rings of tracking evaluating security and privacy in the smart ring ecosystem",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "we may share the number of diaper changes a privacy and security analysis of mobile child care applications",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 8123,
    "paper_ids": [
      110
    ],
    "papers_without_artifact_ids": [
      3251,
      4558
    ]
  },
  {
    "name": "Lily Gloudemans",
    "display_name": "Lily Gloudemans",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Akeso: Bringing Post-Compromise Security to Cloud Storage",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6760,
    "paper_ids": [
      4213
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pankaj Niroula",
    "display_name": "Pankaj Niroula",
    "affiliation": "William & Mary",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Akeso: Bringing Post-Compromise Security to Cloud Storage",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6761,
    "paper_ids": [
      4213
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aashutosh Poudel",
    "display_name": "Aashutosh Poudel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Akeso: Bringing Post-Compromise Security to Cloud Storage",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6762,
    "paper_ids": [
      4213
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Collin MacDonald",
    "display_name": "Collin MacDonald",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Akeso: Bringing Post-Compromise Security to Cloud Storage",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6763,
    "paper_ids": [
      4213
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tariq Bontekoe",
    "display_name": "Tariq Bontekoe",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6764,
    "paper_ids": [
      4549
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fatih Turkmen",
    "display_name": "Fatih Turkmen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6765,
    "paper_ids": [
      4549
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alex Berke",
    "display_name": "Alex Berke",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6766,
    "paper_ids": [
      4474
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Badih Ghazi",
    "display_name": "Badih Ghazi",
    "affiliation": "Google Research, Mountain View, CA, USA",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "PETS": 7
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 3,
        "2025": 2,
        "2024": 2
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the differential privacy and interactivity of privacy sandbox reports",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "differentially private ad conversion measurement",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "summary reports optimization in the privacy sandbox attribution reporting api",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "connect the dots tighter discrete approximations of privacy loss distributions",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "private aggregation of trajectories",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "multiparty reach and frequency histogram private secure and practical",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 6767,
    "paper_ids": [
      4474
    ],
    "papers_without_artifact_ids": [
      4500,
      5703,
      5704,
      5705,
      5706,
      5707
    ]
  },
  {
    "name": "Pritish Kamath",
    "display_name": "Pritish Kamath",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 4
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2025": 2,
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the differential privacy and interactivity of privacy sandbox reports",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "summary reports optimization in the privacy sandbox attribution reporting api",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "connect the dots tighter discrete approximations of privacy loss distributions",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 6768,
    "paper_ids": [
      4474
    ],
    "papers_without_artifact_ids": [
      4500,
      5704,
      5705
    ]
  },
  {
    "name": "Ravi Kumar 0001",
    "display_name": "Ravi Kumar",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "PETS": 7
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 3,
        "2025": 2,
        "2024": 2
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the differential privacy and interactivity of privacy sandbox reports",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "differentially private ad conversion measurement",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "summary reports optimization in the privacy sandbox attribution reporting api",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "connect the dots tighter discrete approximations of privacy loss distributions",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "private aggregation of trajectories",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "multiparty reach and frequency histogram private secure and practical",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 6769,
    "paper_ids": [
      4474
    ],
    "papers_without_artifact_ids": [
      4500,
      5703,
      5704,
      5705,
      5706,
      5707
    ]
  },
  {
    "name": "Robin Lassonde",
    "display_name": "Robin Lassonde",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6770,
    "paper_ids": [
      4474
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pasin Manurangsi",
    "display_name": "Pasin Manurangsi",
    "affiliation": "Google, Mountain View, CA, USA",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "PETS": 7
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 3,
        "2025": 2,
        "2024": 2
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "on the differential privacy and interactivity of privacy sandbox reports",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "differentially private ad conversion measurement",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "summary reports optimization in the privacy sandbox attribution reporting api",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "connect the dots tighter discrete approximations of privacy loss distributions",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "private aggregation of trajectories",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "multiparty reach and frequency histogram private secure and practical",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 6771,
    "paper_ids": [
      4474
    ],
    "papers_without_artifact_ids": [
      4500,
      5703,
      5704,
      5705,
      5706,
      5707
    ]
  },
  {
    "name": "Umar Syed",
    "display_name": "Umar Syed",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6772,
    "paper_ids": [
      4474
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Saharsh Goenka",
    "display_name": "Saharsh Goenka",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Who's Watching You Zoom? Investigating Privacy of Third-Party Zoom Apps",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6773,
    "paper_ids": [
      5708
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Adit Prabhu",
    "display_name": "Adit Prabhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Who's Watching You Zoom? Investigating Privacy of Third-Party Zoom Apps",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6774,
    "paper_ids": [
      5708
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Payge Sakurai",
    "display_name": "Payge Sakurai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Who's Watching You Zoom? Investigating Privacy of Third-Party Zoom Apps",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6775,
    "paper_ids": [
      5708
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mrinaal Ramachandran",
    "display_name": "Mrinaal Ramachandran",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Who's Watching You Zoom? Investigating Privacy of Third-Party Zoom Apps",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6776,
    "paper_ids": [
      5708
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rakibul Hasan",
    "display_name": "Rakibul Hasan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Who's Watching You Zoom? Investigating Privacy of Third-Party Zoom Apps",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6777,
    "paper_ids": [
      5708
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cat Mai",
    "display_name": "Cat Mai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More and Scammier Ads: The Perils of YouTube's Ad Privacy Settings",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6778,
    "paper_ids": [
      4542
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bruno Coelho",
    "display_name": "Bruno Coelho",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More and Scammier Ads: The Perils of YouTube's Ad Privacy Settings",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6779,
    "paper_ids": [
      4542
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lexie Matsumoto",
    "display_name": "Lexie Matsumoto",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More and Scammier Ads: The Perils of YouTube's Ad Privacy Settings",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6780,
    "paper_ids": [
      4542
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kyle Spinelli",
    "display_name": "Kyle Spinelli",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More and Scammier Ads: The Perils of YouTube's Ad Privacy Settings",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6781,
    "paper_ids": [
      4542
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eric Yang",
    "display_name": "Eric Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More and Scammier Ads: The Perils of YouTube's Ad Privacy Settings",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6782,
    "paper_ids": [
      4542
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rachel Greenstadt",
    "display_name": "Rachel Greenstadt",
    "affiliation": "New York University",
    "artifact_count": 1,
    "total_papers": 10,
    "total_papers_by_conf": {
      "PETS": 7,
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2025": 3,
        "2024": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2023": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 10.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "More and Scammier Ads: The Perils of YouTube's Ad Privacy Settings",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sheeps clothing wolfish intent automated detection and evaluation of problematic allowed advertisements",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "an analysis of chinese censorship bias in llms",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "what to expect when youre accessing an exploration of user privacy rights in people search websites",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "intersectional thinking about pets a study of library privacy",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "how library it staff navigate privacy and security challenges and responsibilities",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "im going to trust this until it burns me parents privacy concerns and delegation of trust in k8 educational technology",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "it feels like whackamole user experiences of data removal from people search websites",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "supervised authorship segmentation of open source code projects",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "the tools and tactics used in intimate partner surveillance an analysis of online infidelity forums",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6783,
    "paper_ids": [
      4542
    ],
    "papers_without_artifact_ids": [
      5426,
      4571,
      4544,
      5709,
      1272,
      5710,
      4547,
      5711,
      4290
    ]
  },
  {
    "name": "Pascal Berrang",
    "display_name": "Pascal Berrang",
    "affiliation": "University of Birmingham",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 2
      },
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: Descriptive Statistics Under Local Differential Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "link stealing attacks against inductive graph neural networks",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "measuring conditional anonymity a global study",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "quantifying privacy risks of prompts in visual prompt learning",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6784,
    "paper_ids": [
      4560
    ],
    "papers_without_artifact_ids": [
      196,
      5712,
      198
    ]
  },
  {
    "name": "Paul Gerhart",
    "display_name": "Paul Gerhart",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: Descriptive Statistics Under Local Differential Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "measuring conditional anonymity a global study",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 6785,
    "paper_ids": [
      4560
    ],
    "papers_without_artifact_ids": [
      5712
    ]
  },
  {
    "name": "Dominique Schröder",
    "display_name": "Dominique Schröder",
    "affiliation": "TU Wien",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1,
        "2021": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: Descriptive Statistics Under Local Differential Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "measuring conditional anonymity a global study",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "foundations of ring sampling",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 8124,
    "paper_ids": [
      4560
    ],
    "papers_without_artifact_ids": [
      5712,
      5649
    ]
  },
  {
    "name": "Florine W. Dekker",
    "display_name": "Florine W. Dekker",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Topology-Based Reconstruction Prevention for Decentralised Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacypreserving data aggregation with public verifiability against internal adversaries",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6787,
    "paper_ids": [
      1133
    ],
    "papers_without_artifact_ids": [
      1136
    ]
  },
  {
    "name": "Zeyu Song",
    "display_name": "Zeyu Song",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GNNBleed: Inference Attacks to Unveil Private Edges in Graphs with Realistic Access to GNN Models",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6788,
    "paper_ids": [
      2532
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cong Zuo 0001",
    "display_name": "Cong Zuo",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "resultpatternhiding conjunctive searchable symmetric encryption with forward and backward privacy",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 6789,
    "paper_ids": [
      1564
    ],
    "papers_without_artifact_ids": [
      3981
    ]
  },
  {
    "name": "Shangqi Lai",
    "display_name": "Shangqi Lai",
    "affiliation": "University of Melbourne",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "siguard guarding secure inference with post data privacy",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "oblivgnn oblivious inference on transductive and inductive graph neural network",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6790,
    "paper_ids": [
      1564
    ],
    "papers_without_artifact_ids": [
      1566,
      1567
    ]
  },
  {
    "name": "Joseph K. Liu",
    "display_name": "Joseph K. Liu",
    "affiliation": "Monash University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6791,
    "paper_ids": [
      1564
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jun Shao 0001",
    "display_name": "Jun Shao",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hades attack understanding and evaluating manipulation risks of email blocklists",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 6792,
    "paper_ids": [
      1564
    ],
    "papers_without_artifact_ids": [
      247
    ]
  },
  {
    "name": "Huaxiong Wang",
    "display_name": "Huaxiong Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "SC": 0,
      "ACSAC": 0,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "SC": {},
      "ACSAC": {},
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6793,
    "paper_ids": [
      1564
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jules Drean",
    "display_name": "Jules Drean",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Teaching an Old Dog New Tricks: Verifiable FHE Using Commodity Hardware",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6794,
    "paper_ids": [
      2585
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fisher Jepsen",
    "display_name": "Fisher Jepsen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Teaching an Old Dog New Tricks: Verifiable FHE Using Commodity Hardware",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6795,
    "paper_ids": [
      2585
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Edward Suh",
    "display_name": "Edward Suh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Teaching an Old Dog New Tricks: Verifiable FHE Using Commodity Hardware",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6796,
    "paper_ids": [
      2585
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Srini Devadas",
    "display_name": "Srini Devadas",
    "affiliation": "Massachusetts Inst. of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Teaching an Old Dog New Tricks: Verifiable FHE Using Commodity Hardware",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6797,
    "paper_ids": [
      2585
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aamer Jaleel",
    "display_name": "Aamer Jaleel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Teaching an Old Dog New Tricks: Verifiable FHE Using Commodity Hardware",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6798,
    "paper_ids": [
      2585
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Romaric Gaudel",
    "display_name": "Romaric Gaudel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Low-Cost Privacy-Preserving Decentralized Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6799,
    "paper_ids": [
      3429
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dimitri Lerévérend",
    "display_name": "Dimitri Lerévérend",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Low-Cost Privacy-Preserving Decentralized Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8125,
    "paper_ids": [
      3429
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "François Taïani",
    "display_name": "François Taïani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Low-Cost Privacy-Preserving Decentralized Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8126,
    "paper_ids": [
      3429
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Truong Son Nguyen",
    "display_name": "Truong Son Nguyen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Achieving Data Reconstruction Hardness and Efficient Computation in Multiparty Minimax Training",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6802,
    "paper_ids": [
      4563
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yi Ren",
    "display_name": "Yi Ren",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Achieving Data Reconstruction Hardness and Efficient Computation in Multiparty Minimax Training",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gadgetmeter quantitatively and accurately gauging the exploitability of speculative gadgets",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 6803,
    "paper_ids": [
      4563
    ],
    "papers_without_artifact_ids": [
      1627
    ]
  },
  {
    "name": "Guangyu Nie",
    "display_name": "Guangyu Nie",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Achieving Data Reconstruction Hardness and Efficient Computation in Multiparty Minimax Training",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6804,
    "paper_ids": [
      4563
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shafizur Rahman Seeam",
    "display_name": "Shafizur Rahman Seeam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Locally Differentially Private Frequency Estimation via Joint Randomized Response",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6805,
    "paper_ids": [
      4567
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rui Zhang",
    "display_name": "Rui Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "NSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Locally Differentially Private Frequency Estimation via Joint Randomized Response",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "toward nearlyzeroerror sketching via compressive sensing",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 6806,
    "paper_ids": [
      4567
    ],
    "papers_without_artifact_ids": [
      3527
    ]
  },
  {
    "name": "Yanchao Zhang",
    "display_name": "Yanchao Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Locally Differentially Private Frequency Estimation via Joint Randomized Response",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "phyauth physicallayer message authentication for zigbee networks",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6807,
    "paper_ids": [
      4567
    ],
    "papers_without_artifact_ids": [
      5713
    ]
  },
  {
    "name": "Gayatri Priyadarsini Kancherla",
    "display_name": "Gayatri Priyadarsini Kancherla",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Johnny Can't Revoke Consent Either: Measuring Compliance of Consent Revocation on the Web",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6808,
    "paper_ids": [
      5714
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nataliia Bielova",
    "display_name": "Nataliia Bielova",
    "affiliation": "Cte d'Azur University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 4,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2022": 2,
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Johnny Can't Revoke Consent Either: Measuring Compliance of Consent Revocation on the Web",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the effect of design patterns on present and future cookie consent decisions",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "my cookie is a phoenix detection measurement and lawfulness of cookie respawning with browser fingerprinting",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "on dark patterns and manipulation of website publishers by cmps",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "missed by filter lists detecting unknown thirdparty trackers with invisible pixels",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 6809,
    "paper_ids": [
      5714
    ],
    "papers_without_artifact_ids": [
      5715,
      5716,
      5717,
      5718
    ]
  },
  {
    "name": "Cristiana Teixeira Santos",
    "display_name": "Cristiana Teixeira Santos",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Johnny Can't Revoke Consent Either: Measuring Compliance of Consent Revocation on the Web",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the devil is in the details detection measurement and lawfulness of serverside tracking on the web",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "my cookie is a phoenix detection measurement and lawfulness of cookie respawning with browser fingerprinting",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 6810,
    "paper_ids": [
      5714
    ],
    "papers_without_artifact_ids": [
      4471,
      5716
    ]
  },
  {
    "name": "Abhishek Bichhawat",
    "display_name": "Abhishek Bichhawat",
    "affiliation": "IIT Gandhinagar",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Johnny Can't Revoke Consent Either: Measuring Compliance of Consent Revocation on the Web",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6811,
    "paper_ids": [
      5714
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Paul Syverson",
    "display_name": "Paul Syverson",
    "affiliation": "Naval Research Laboratory, USA",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 1,
        "2021": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Onion-Location Measurements and Fingerprinting",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "throwing your weight around fixing tors positional weighting",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "privacypreserving incrementallydeployable support for certificate transparency in tor",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 6812,
    "paper_ids": [
      1701
    ],
    "papers_without_artifact_ids": [
      4366,
      3387
    ]
  },
  {
    "name": "Tina Khezresmaeilzadeh",
    "display_name": "Tina Khezresmaeilzadeh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Echoes of Privacy: Uncovering the Profiling Practices of Voice Assistants",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6813,
    "paper_ids": [
      4495
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Elaine Zhu",
    "display_name": "Elaine Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Echoes of Privacy: Uncovering the Profiling Practices of Voice Assistants",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6814,
    "paper_ids": [
      4495
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kiersten Grieco",
    "display_name": "Kiersten Grieco",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Echoes of Privacy: Uncovering the Profiling Practices of Voice Assistants",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6815,
    "paper_ids": [
      4495
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vasilis Ververis",
    "display_name": "Vasilis Ververis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Path to Encrypted DNS with DDR: Adoption, Configuration Patterns, and Privacy Implications",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6816,
    "paper_ids": [
      5719
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Steffen Sassala",
    "display_name": "Steffen Sassala",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Path to Encrypted DNS with DDR: Adoption, Configuration Patterns, and Privacy Implications",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6817,
    "paper_ids": [
      5719
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Felix Roth",
    "display_name": "Felix Roth",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Path to Encrypted DNS with DDR: Adoption, Configuration Patterns, and Privacy Implications",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6818,
    "paper_ids": [
      5719
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vaibhav Bajpai",
    "display_name": "Vaibhav Bajpai",
    "affiliation": "Hasso Plattner Institute",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Path to Encrypted DNS with DDR: Adoption, Configuration Patterns, and Privacy Implications",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6819,
    "paper_ids": [
      5719
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Timothy Walsh 0002",
    "display_name": "Timothy Walsh",
    "affiliation": "Georgetown University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "ACSAC": {
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improved Open-World Fingerprinting Increases Threat to Streaming Video Privacy but Realistic Scenarios Remain Difficult",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "whisper a unilateral defense against voip traffic reidentification attacks",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 6820,
    "paper_ids": [
      5720
    ],
    "papers_without_artifact_ids": [
      1147
    ]
  },
  {
    "name": "Armon Barton",
    "display_name": "Armon Barton",
    "affiliation": "Naval Postgraduate School",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improved Open-World Fingerprinting Increases Threat to Streaming Video Privacy but Realistic Scenarios Remain Difficult",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6821,
    "paper_ids": [
      5720
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mathias Kölsch",
    "display_name": "Mathias Kölsch",
    "affiliation": "Naval Postgraduate School",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Improved Open-World Fingerprinting Increases Threat to Streaming Video Privacy but Realistic Scenarios Remain Difficult",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8127,
    "paper_ids": [
      5720
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhaohui Wang 0004",
    "display_name": "Zhaohui Wang",
    "affiliation": "University of Kansas",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6823,
    "paper_ids": [
      2240
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fabrizio Boninsegna",
    "display_name": "Fabrizio Boninsegna",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Differentially Private Release of Hierarchical Origin/Destination Data with a TopDown Approach",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6824,
    "paper_ids": [
      5721
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Francesco Silvestri 0001",
    "display_name": "Francesco Silvestri",
    "affiliation": "Politecnico di Milano",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Differentially Private Release of Hierarchical Origin/Destination Data with a TopDown Approach",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6825,
    "paper_ids": [
      5721
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Steven Su",
    "display_name": "Steven Su",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Buy it Now, Track Me Later: Attacking User Privacy via Wi-Fi AP Online Auctions",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6826,
    "paper_ids": [
      2482
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Erik C. Rye",
    "display_name": "Erik C. Rye",
    "affiliation": "Johns Hopkins University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2021": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Buy it Now, Track Me Later: Attacking User Privacy via Wi-Fi AP Online Auctions",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "three years later a study of mac address randomization in mobile devices and when it succeeds",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 6827,
    "paper_ids": [
      2482
    ],
    "papers_without_artifact_ids": [
      5722
    ]
  },
  {
    "name": "Robert Beverly",
    "display_name": "Robert Beverly",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "ACSAC": {},
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Buy it Now, Track Me Later: Attacking User Privacy via Wi-Fi AP Online Auctions",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diamondminer comprehensive discovery of the internets topology diamonds",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 6828,
    "paper_ids": [
      2482
    ],
    "papers_without_artifact_ids": [
      5723
    ]
  },
  {
    "name": "Abdulla Alshabanah",
    "display_name": "Abdulla Alshabanah",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Meta-Learn to Unlearn: Enhanced Exact Machine Unlearning in Recommendation Systems with Meta-Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6829,
    "paper_ids": [
      2602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Keshav Balasubramanian",
    "display_name": "Keshav Balasubramanian",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Meta-Learn to Unlearn: Enhanced Exact Machine Unlearning in Recommendation Systems with Meta-Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6830,
    "paper_ids": [
      2602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arijana Bohr",
    "display_name": "Arijana Bohr",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Estimating Group Means Under Local Differential Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6831,
    "paper_ids": [
      4561
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kai Klede",
    "display_name": "Kai Klede",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Estimating Group Means Under Local Differential Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6832,
    "paper_ids": [
      4561
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benjamin Gmeiner",
    "display_name": "Benjamin Gmeiner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Estimating Group Means Under Local Differential Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6833,
    "paper_ids": [
      4561
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bjoern M. Eskofier",
    "display_name": "Bjoern M. Eskofier",
    "affiliation": "University of Erlangen–Nuremberg",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Estimating Group Means Under Local Differential Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6834,
    "paper_ids": [
      4561
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pellaeon Lin",
    "display_name": "Pellaeon Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "What WeChat Knows: Pervasive First-Party Tracking in a Billion-User Super-App Ecosystem",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how great is the great firewall measuring chinas dns censorship",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6835,
    "paper_ids": [
      137
    ],
    "papers_without_artifact_ids": [
      2993
    ]
  },
  {
    "name": "Will Greenberg",
    "display_name": "Will Greenberg",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "What WeChat Knows: Pervasive First-Party Tracking in a Billion-User Super-App Ecosystem",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6836,
    "paper_ids": [
      137
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonathan Mayer",
    "display_name": "Jonathan Mayer",
    "affiliation": "Princeton University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "What WeChat Knows: Pervasive First-Party Tracking in a Billion-User Super-App Ecosystem",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6837,
    "paper_ids": [
      137
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stefan Dziembowski",
    "display_name": "Stefan Dziembowski",
    "affiliation": "University of Warsaw",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VIMz: Private Proofs of Image Manipulation using Folding-based zkSNARKs",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6838,
    "paper_ids": [
      5724
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shahriar Ebrahimi",
    "display_name": "Shahriar Ebrahimi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VIMz: Private Proofs of Image Manipulation using Folding-based zkSNARKs",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "from interaction to independence zksnarks for transparent and noninteractive remote attestation",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 6839,
    "paper_ids": [
      5724
    ],
    "papers_without_artifact_ids": [
      5725
    ]
  },
  {
    "name": "Parisa Hassanizadeh",
    "display_name": "Parisa Hassanizadeh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VIMz: Private Proofs of Image Manipulation using Folding-based zkSNARKs",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "from interaction to independence zksnarks for transparent and noninteractive remote attestation",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 6840,
    "paper_ids": [
      5724
    ],
    "papers_without_artifact_ids": [
      5725
    ]
  },
  {
    "name": "Ghada Almashaqbeh",
    "display_name": "Ghada Almashaqbeh",
    "affiliation": "University of Connecticut",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2021": 1
      },
      "SC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AnoFel: Supporting Anonymity for Privacy-Preserving Federated Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gage mpc bypassing residual function leakage for noninteractive mpc",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 6841,
    "paper_ids": [
      5726
    ],
    "papers_without_artifact_ids": [
      2465
    ]
  },
  {
    "name": "Zahra Ghodsi",
    "display_name": "Zahra Ghodsi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AnoFel: Supporting Anonymity for Privacy-Preserving Federated Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6842,
    "paper_ids": [
      5726
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rohan Sequeira",
    "display_name": "Rohan Sequeira",
    "affiliation": "University of Southern California",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SPINML: Customized Synthetic Data Generation for Private Training of Specialized ML Models",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6843,
    "paper_ids": [
      4569
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jan Lauinger",
    "display_name": "Jan Lauinger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Janus: Fast Privacy-Preserving Data Provenance For TLS",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "origo proving provenance of sensitive data with constant communication",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 6844,
    "paper_ids": [
      5727
    ],
    "papers_without_artifact_ids": [
      5728
    ]
  },
  {
    "name": "Jens Ernstberger",
    "display_name": "Jens Ernstberger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Janus: Fast Privacy-Preserving Data Provenance For TLS",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "origo proving provenance of sensitive data with constant communication",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "sok what dont we know understanding security vulnerabilities in snarks",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6845,
    "paper_ids": [
      5727
    ],
    "papers_without_artifact_ids": [
      5728,
      5729
    ]
  },
  {
    "name": "Andreas Finkenzeller",
    "display_name": "Andreas Finkenzeller",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Janus: Fast Privacy-Preserving Data Provenance For TLS",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6846,
    "paper_ids": [
      5727
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sebastian Steinhorst",
    "display_name": "Sebastian Steinhorst",
    "affiliation": "TU Munich",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Janus: Fast Privacy-Preserving Data Provenance For TLS",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "origo proving provenance of sensitive data with constant communication",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 6847,
    "paper_ids": [
      5727
    ],
    "papers_without_artifact_ids": [
      5728
    ]
  },
  {
    "name": "Hussein Sheaib",
    "display_name": "Hussein Sheaib",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unmasking the Shadows: A Cross-Country Study of Online Tracking in Illegal Movie Streaming Services",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6848,
    "paper_ids": [
      3361
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yasha Iravantchi",
    "display_name": "Yasha Iravantchi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: (Un)usable Privacy: the Lack of Overlap between Privacy-Aware Sensing and Usable Privacy Research",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacylens ondevice pii removal from rgb images using thermallyenhanced sensing",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 6849,
    "paper_ids": [
      3263
    ],
    "papers_without_artifact_ids": [
      4406
    ]
  },
  {
    "name": "Alanson P. Sample",
    "display_name": "Alanson P. Sample",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SoK: (Un)usable Privacy: the Lack of Overlap between Privacy-Aware Sensing and Usable Privacy Research",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacylens ondevice pii removal from rgb images using thermallyenhanced sensing",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 6850,
    "paper_ids": [
      3263
    ],
    "papers_without_artifact_ids": [
      4406
    ]
  },
  {
    "name": "Sumita Mishra",
    "display_name": "Sumita Mishra",
    "affiliation": "Rochester Inst. of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Optimal Piecewise-based Mechanism for Collecting Bounded Numerical Data under Local Differential Privacy",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6851,
    "paper_ids": [
      4568
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Muaz Ali",
    "display_name": "Muaz Ali",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Does Coding Style Really Survive Compilation? Stylometry of Executable Code Revisited",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6852,
    "paper_ids": [
      5730
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tugay Bilgis",
    "display_name": "Tugay Bilgis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Does Coding Style Really Survive Compilation? Stylometry of Executable Code Revisited",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6853,
    "paper_ids": [
      5730
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nimet Beyza Bozdag",
    "display_name": "Nimet Beyza Bozdag",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Does Coding Style Really Survive Compilation? Stylometry of Executable Code Revisited",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6854,
    "paper_ids": [
      5730
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Saumya Debray",
    "display_name": "Saumya Debray",
    "affiliation": "University of Arizona",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Does Coding Style Really Survive Compilation? Stylometry of Executable Code Revisited",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6855,
    "paper_ids": [
      5730
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sazzadur Rahaman",
    "display_name": "Sazzadur Rahaman",
    "affiliation": "University of Arizona",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "ACSAC": {
        "2023": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Does Coding Style Really Survive Compilation? Stylometry of Executable Code Revisited",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the queens guard a secure enforcement of finegrained access control in distributed data analytics platforms",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "bilingual problems studying the security risks incurred by native extensions in scripting languages",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6856,
    "paper_ids": [
      5730
    ],
    "papers_without_artifact_ids": [
      4235,
      404
    ]
  },
  {
    "name": "David Rodríguez Torrado",
    "display_name": "David Rodríguez Torrado",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy Settings of Third-Party Libraries in Android Apps: A Study of Facebook SDKs",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8128,
    "paper_ids": [
      5731
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joseph A. Calandrino",
    "display_name": "Joseph A. Calandrino",
    "affiliation": "Federal Trade Commission, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy Settings of Third-Party Libraries in Android Apps: A Study of Facebook SDKs",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6858,
    "paper_ids": [
      5731
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "José M. del Álamo",
    "display_name": "José M. del Álamo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy Settings of Third-Party Libraries in Android Apps: A Study of Facebook SDKs",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8129,
    "paper_ids": [
      5731
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Norman Sadeh 0001",
    "display_name": "Norman Sadeh",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy Settings of Third-Party Libraries in Android Apps: A Study of Facebook SDKs",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding how to inform blind and lowvision users about data privacy through privacy question answering assistants",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "exploring expandablegrid designs to make ios app privacy labels more usable",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "how usable are ios app privacy labels",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 6860,
    "paper_ids": [
      5731
    ],
    "papers_without_artifact_ids": [
      5639,
      2507,
      2509
    ]
  },
  {
    "name": "Mathieu Even",
    "display_name": "Mathieu Even",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Noiseless Privacy-Preserving Decentralized Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6861,
    "paper_ids": [
      3430
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Laurent Massoulié",
    "display_name": "Laurent Massoulié",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Noiseless Privacy-Preserving Decentralized Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8130,
    "paper_ids": [
      3430
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martijn de Vos",
    "display_name": "Martijn de Vos",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Noiseless Privacy-Preserving Decentralized Learning",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6863,
    "paper_ids": [
      3430
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Simone Bozzolan",
    "display_name": "Simone Bozzolan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Stochastic Models for Remote Timing Attacks",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6864,
    "paper_ids": [
      2407
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Diletta Olliaro",
    "display_name": "Diletta Olliaro",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Stochastic Models for Remote Timing Attacks",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6865,
    "paper_ids": [
      2407
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrea Marin",
    "display_name": "Andrea Marin",
    "affiliation": "University Ca' Foscari",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Stochastic Models for Remote Timing Attacks",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6866,
    "paper_ids": [
      2407
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gianfranco Balbo",
    "display_name": "Gianfranco Balbo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Stochastic Models for Remote Timing Attacks",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6867,
    "paper_ids": [
      2407
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matteo Sereno",
    "display_name": "Matteo Sereno",
    "affiliation": "University of Turin",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Stochastic Models for Remote Timing Attacks",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6868,
    "paper_ids": [
      2407
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eva-Maria Maier",
    "display_name": "Eva-Maria Maier",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Surveillance Disguised as Protection: A Comparative Analysis of Sideloaded and In-Store Parental Control Apps",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6869,
    "paper_ids": [
      5732
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leonie Maria Tanczer",
    "display_name": "Leonie Maria Tanczer",
    "affiliation": "University College London",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Surveillance Disguised as Protection: A Comparative Analysis of Sideloaded and In-Store Parental Control Apps",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6870,
    "paper_ids": [
      5732
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lukas Daniel Klausner",
    "display_name": "Lukas Daniel Klausner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Surveillance Disguised as Protection: A Comparative Analysis of Sideloaded and In-Store Parental Control Apps",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6871,
    "paper_ids": [
      5732
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Meir Goldenberg",
    "display_name": "Meir Goldenberg",
    "affiliation": "Jerusalem College of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Message Authentication Code with Fast Verification over Encrypted Data and Applications",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6872,
    "paper_ids": [
      4572
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Neta Oren",
    "display_name": "Neta Oren",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Message Authentication Code with Fast Verification over Encrypted Data and Applications",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "csher a system for compact storage with heretrieval",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6873,
    "paper_ids": [
      4572
    ],
    "papers_without_artifact_ids": [
      4574
    ]
  },
  {
    "name": "Rita Vald",
    "display_name": "Rita Vald",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Message Authentication Code with Fast Verification over Encrypted Data and Applications",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6874,
    "paper_ids": [
      4572
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ismat Jarin",
    "display_name": "Ismat Jarin",
    "affiliation": "University of California, Irvine",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BehaVR: User Identification Based on VR Sensor Data",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "miashield defending membership inference attacks via preemptive exclusion of members",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 6875,
    "paper_ids": [
      965
    ],
    "papers_without_artifact_ids": [
      5354
    ]
  },
  {
    "name": "Yu Duan",
    "display_name": "Yu Duan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "BehaVR: User Identification Based on VR Sensor Data",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6876,
    "paper_ids": [
      965
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rabiah Alnashwan",
    "display_name": "Rabiah Alnashwan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PGUP: Pretty Good User Privacy for 5G-enabled Secure Mobile Communication Protocols",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6877,
    "paper_ids": [
      5733
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Prosanta Gope",
    "display_name": "Prosanta Gope",
    "affiliation": "University of Sheffield",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PGUP: Pretty Good User Privacy for 5G-enabled Secure Mobile Communication Protocols",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vflgan vertical federated learningbased generative adversarial network for vertically partitioned data publication",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 6878,
    "paper_ids": [
      5733
    ],
    "papers_without_artifact_ids": [
      5734
    ]
  },
  {
    "name": "Benjamin Dowling",
    "display_name": "Benjamin Dowling",
    "affiliation": "King's College London",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PGUP: Pretty Good User Privacy for 5G-enabled Secure Mobile Communication Protocols",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6879,
    "paper_ids": [
      5733
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yang Yang 0138",
    "display_name": "Yang Yang",
    "affiliation": "National University of Singapore",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PGUP: Pretty Good User Privacy for 5G-enabled Secure Mobile Communication Protocols",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vflgan vertical federated learningbased generative adversarial network for vertically partitioned data publication",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 6880,
    "paper_ids": [
      5733
    ],
    "papers_without_artifact_ids": [
      5734
    ]
  },
  {
    "name": "Sam Martin",
    "display_name": "Sam Martin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HyDia: FHE-based Facial Matching with Hybrid Approximations and Diagonalization",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6881,
    "paper_ids": [
      4575
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Helena Berens",
    "display_name": "Helena Berens",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HyDia: FHE-based Facial Matching with Hybrid Approximations and Diagonalization",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6882,
    "paper_ids": [
      4575
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tamás Rozgonyi",
    "display_name": "Tamás Rozgonyi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HyDia: FHE-based Facial Matching with Hybrid Approximations and Diagonalization",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8131,
    "paper_ids": [
      4575
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Micah Brody",
    "display_name": "Micah Brody",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HyDia: FHE-based Facial Matching with Hybrid Approximations and Diagonalization",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6884,
    "paper_ids": [
      4575
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Schadt",
    "display_name": "Daniel Schadt",
    "affiliation": "Karlsruhe Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Aimless Onions: Mixing without Topology Information",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6885,
    "paper_ids": [
      2175
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christoph Coijanovic",
    "display_name": "Christoph Coijanovic",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Aimless Onions: Mixing without Topology Information",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6886,
    "paper_ids": [
      2175
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Varun Thakore",
    "display_name": "Varun Thakore",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6887,
    "paper_ids": [
      5735
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Saravanan Vijayakumaran",
    "display_name": "Saravanan Vijayakumaran",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6888,
    "paper_ids": [
      5735
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xin Yang",
    "display_name": "Xin Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PrivDiffuser: Privacy-Guided Diffusion Model for Data Obfuscation in Sensor Networks",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6889,
    "paper_ids": [
      5736
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Omid Ardakanian",
    "display_name": "Omid Ardakanian",
    "affiliation": "University of Alberta",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PrivDiffuser: Privacy-Guided Diffusion Model for Data Obfuscation in Sensor Networks",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6890,
    "paper_ids": [
      5736
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hoang-Dung Nguyen",
    "display_name": "Hoang-Dung Nguyen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Client-Efficient Online-Offline Private Information Retrieval",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6891,
    "paper_ids": [
      1403
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maisha Boteju",
    "display_name": "Maisha Boteju",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"Do It to Know It\": Reshaping the Privacy Mindset of Computer Science Undergraduates",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6892,
    "paper_ids": [
      5737
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Danielle M. Lottridge",
    "display_name": "Danielle M. Lottridge",
    "affiliation": "Auckland University of Technology, New Zealand",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"Do It to Know It\": Reshaping the Privacy Mindset of Computer Science Undergraduates",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6893,
    "paper_ids": [
      5737
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thilina Ranbaduge",
    "display_name": "Thilina Ranbaduge",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"Do It to Know It\": Reshaping the Privacy Mindset of Computer Science Undergraduates",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok private knowledge sharing in distributed learning",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 6894,
    "paper_ids": [
      5737
    ],
    "papers_without_artifact_ids": [
      3356
    ]
  },
  {
    "name": "Dinusha Vatsalan",
    "display_name": "Dinusha Vatsalan",
    "affiliation": "Macquarie University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"Do It to Know It\": Reshaping the Privacy Mindset of Computer Science Undergraduates",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6895,
    "paper_ids": [
      5737
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ni Ding",
    "display_name": "Ni Ding",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "\"Do It to Know It\": Reshaping the Privacy Mindset of Computer Science Undergraduates",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6896,
    "paper_ids": [
      5737
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Isita Bagayatkar",
    "display_name": "Isita Bagayatkar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DB-PAISA: Discovery-Based Privacy-Agile IoT Sensing+Actuation",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6897,
    "paper_ids": [
      1178
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Youngil Kim",
    "display_name": "Youngil Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DB-PAISA: Discovery-Based Privacy-Agile IoT Sensing+Actuation",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6898,
    "paper_ids": [
      1178
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maximilian Kroschewski",
    "display_name": "Maximilian Kroschewski",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OPPID: Single Sign-On with Oblivious Pairwise Pseudonyms",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "save the implicit flow enabling privacypreserving rp authentication in openid connect",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 6899,
    "paper_ids": [
      5738
    ],
    "papers_without_artifact_ids": [
      5739
    ]
  },
  {
    "name": "Anja Lehmann",
    "display_name": "Anja Lehmann",
    "affiliation": "Hasso Plattner Institute",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 2,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OPPID: Single Sign-On with Oblivious Pairwise Pseudonyms",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "save the implicit flow enabling privacypreserving rp authentication in openid connect",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "privacypreserving outsourced certificate validation",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 6900,
    "paper_ids": [
      5738
    ],
    "papers_without_artifact_ids": [
      5739,
      5740
    ]
  },
  {
    "name": "Cavit Özbay",
    "display_name": "Cavit Özbay",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "OPPID: Single Sign-On with Oblivious Pairwise Pseudonyms",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8132,
    "paper_ids": [
      5738
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pengxu Zhu",
    "display_name": "Pengxu Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hypersphere Secure Sketch Revisited: Probabilistic Linear Regression Attack on IronMask in Multiple Usage",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6902,
    "paper_ids": [
      5741
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lei Wang",
    "display_name": "Lei Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "SOSP": 0,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1
      },
      "SOSP": {},
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hypersphere Secure Sketch Revisited: Probabilistic Linear Regression Attack on IronMask in Multiple Usage",
        "conference": "PETS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6903,
    "paper_ids": [
      5741
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rachel Thomas",
    "display_name": "Rachel Thomas",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CheckOut: User-Controlled Anonymization for Customer Loyalty Programs",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6904,
    "paper_ids": [
      1513
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Caelin Kaplan",
    "display_name": "Caelin Kaplan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6905,
    "paper_ids": [
      3898
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Othmane Marfoq",
    "display_name": "Othmane Marfoq",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6906,
    "paper_ids": [
      3898
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Giovanni Neglia",
    "display_name": "Giovanni Neglia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6907,
    "paper_ids": [
      3898
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anderson Santana de Oliveira",
    "display_name": "Anderson Santana de Oliveira",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the impact of generalization techniques on the interplay among privacy utility and fairness",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 6908,
    "paper_ids": [
      3898
    ],
    "papers_without_artifact_ids": [
      5742
    ]
  },
  {
    "name": "Prashant Agrawal",
    "display_name": "Prashant Agrawal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Traceable mixnets",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6909,
    "paper_ids": [
      5743
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abhinav Nakarmi",
    "display_name": "Abhinav Nakarmi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Traceable mixnets",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6910,
    "paper_ids": [
      5743
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mahabir Prasad Jhanwar",
    "display_name": "Mahabir Prasad Jhanwar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Traceable mixnets",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6911,
    "paper_ids": [
      5743
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Subodh Sharma 0001",
    "display_name": "Subodh Sharma",
    "affiliation": "IIT Delhi",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "SC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "SC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Traceable mixnets",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6912,
    "paper_ids": [
      5743
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Subhashis Banerjee",
    "display_name": "Subhashis Banerjee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Traceable mixnets",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6913,
    "paper_ids": [
      5743
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minjun Long",
    "display_name": "Minjun Long",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Evaluating Google's Protected Audience Protocol",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "senrev measurement of personal information disclosure in online health communities",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 6914,
    "paper_ids": [
      5744
    ],
    "papers_without_artifact_ids": [
      1532
    ]
  },
  {
    "name": "David Evans",
    "display_name": "David Evans",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Evaluating Google's Protected Audience Protocol",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6915,
    "paper_ids": [
      5744
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lorin Schöni",
    "display_name": "Lorin Schöni",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Block Cookies, Not Websites: Analysing Mental Models and Usability of the Privacy-Preserving Browser Extension CookieBlock",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "navigating autonomy unveiling security experts perspectives on augmented intelligence in cybersecurity",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 8133,
    "paper_ids": [
      2472
    ],
    "papers_without_artifact_ids": [
      5745
    ]
  },
  {
    "name": "Verena Zimmermann",
    "display_name": "Verena Zimmermann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2021": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Block Cookies, Not Websites: Analysing Mental Models and Usability of the Privacy-Preserving Browser Extension CookieBlock",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ai is from the devil behaviors and concerns toward personal data sharing with llmbased conversational agents",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "navigating autonomy unveiling security experts perspectives on augmented intelligence in cybersecurity",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "beyond fear and frustration towards a holistic understanding of emotions in cybersecurity",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "sok still plenty of phish in the sea a taxonomy of useroriented phishing interventions and avenues for future research",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6917,
    "paper_ids": [
      2472
    ],
    "papers_without_artifact_ids": [
      5746,
      5745,
      5747,
      3418
    ]
  },
  {
    "name": "Sofia Belikovetsky",
    "display_name": "Sofia Belikovetsky",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "WOOT": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "WOOT": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SocIoTy: Practical Cryptography in Smart Home Contexts",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6918,
    "paper_ids": [
      3237
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joseph Carrigan",
    "display_name": "Joseph Carrigan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SocIoTy: Practical Cryptography in Smart Home Contexts",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6919,
    "paper_ids": [
      3237
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Logan Kostick",
    "display_name": "Logan Kostick",
    "affiliation": "Johns Hopkins University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SocIoTy: Practical Cryptography in Smart Home Contexts",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6920,
    "paper_ids": [
      3237
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aviel D. Rubin",
    "display_name": "Aviel D. Rubin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0,
      "FAST": 1,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "ACSAC": {},
      "FAST": {
        "2005": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SocIoTy: Practical Cryptography in Smart Home Contexts",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secure deletion for a versioning file system",
        "conference": "FAST",
        "year": 2005
      }
    ],
    "author_id": 6921,
    "paper_ids": [
      3237
    ],
    "papers_without_artifact_ids": [
      4832
    ]
  },
  {
    "name": "Muhammad Abu Bakar Aziz",
    "display_name": "Muhammad Abu Bakar Aziz",
    "affiliation": "Northeastern University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Johnny Still Can't Opt-out: Assessing the IAB CCPA Compliance Framework",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6922,
    "paper_ids": [
      4514
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Julian Todt",
    "display_name": "Julian Todt",
    "affiliation": "Karlsruhe Institute of Technology",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fantômas: Understanding Face Anonymization Reversibility",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a false sense of privacy towards a reliable evaluation methodology for the anonymization of biometric data",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 8134,
    "paper_ids": [
      2176
    ],
    "papers_without_artifact_ids": [
      2179
    ]
  },
  {
    "name": "Sam Cutler",
    "display_name": "Sam Cutler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6923,
    "paper_ids": [
      2914
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Goldelman",
    "display_name": "Daniel Goldelman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Website Data Transparency in the Browser",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6924,
    "paper_ids": [
      3425
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Owen Kaplan",
    "display_name": "Owen Kaplan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Website Data Transparency in the Browser",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6925,
    "paper_ids": [
      3425
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Logan Brown",
    "display_name": "Logan Brown",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Website Data Transparency in the Browser",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6926,
    "paper_ids": [
      3425
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Justin Casler",
    "display_name": "Justin Casler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Website Data Transparency in the Browser",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6927,
    "paper_ids": [
      3425
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Judeley Jean-Charles",
    "display_name": "Judeley Jean-Charles",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Website Data Transparency in the Browser",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6928,
    "paper_ids": [
      3425
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Florian Dehling",
    "display_name": "Florian Dehling",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Internet Users' Willingness to Disclose Biometric Data for Continuous Online Account Protection: An Empirical Investigation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploring mental models of the right to informational selfdetermination of office workers in germany",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 6929,
    "paper_ids": [
      5748
    ],
    "papers_without_artifact_ids": [
      5749
    ]
  },
  {
    "name": "Jan Tolsdorf",
    "display_name": "Jan Tolsdorf",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Internet Users' Willingness to Disclose Biometric Data for Continuous Online Account Protection: An Empirical Investigation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "employees privacy perceptions exploring the dimensionality and antecedents of personal data sensitivity and willingness to disclose",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "exploring mental models of the right to informational selfdetermination of office workers in germany",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 6930,
    "paper_ids": [
      5748
    ],
    "papers_without_artifact_ids": [
      5750,
      5749
    ]
  },
  {
    "name": "Hannes Federrath",
    "display_name": "Hannes Federrath",
    "affiliation": "University of Hamburg",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2024": 1
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Internet Users' Willingness to Disclose Biometric Data for Continuous Online Account Protection: An Empirical Investigation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enhanced performance and privacy for tls over tcp fast open",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "tracking users across the web via tls session resumption",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 6931,
    "paper_ids": [
      5748
    ],
    "papers_without_artifact_ids": [
      5114,
      5115
    ]
  },
  {
    "name": "Luigi Lo Iacono",
    "display_name": "Luigi Lo Iacono",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 3,
      "ACSAC": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2024": 1,
        "2021": 1
      },
      "ACSAC": {
        "2020": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Internet Users' Willingness to Disclose Biometric Data for Continuous Online Account Protection: An Empirical Investigation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "employees privacy perceptions exploring the dimensionality and antecedents of personal data sensitivity and willingness to disclose",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "exploring mental models of the right to informational selfdetermination of office workers in germany",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "more than just good passwords a study on usability and security perceptions of riskbased authentication",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 6932,
    "paper_ids": [
      5748
    ],
    "papers_without_artifact_ids": [
      5750,
      5749,
      5507
    ]
  },
  {
    "name": "Chuan Yan",
    "display_name": "Chuan Yan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Quality of Privacy Policy Documents of Virtual Personal Assistant Applications",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6933,
    "paper_ids": [
      2966
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fuman Xie",
    "display_name": "Fuman Xie",
    "affiliation": "The University of Queensland",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Quality of Privacy Policy Documents of Virtual Personal Assistant Applications",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6934,
    "paper_ids": [
      2966
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mark Huasong Meng",
    "display_name": "Mark Huasong Meng",
    "affiliation": "Institute for Infocomm Research, Singapore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "On the Quality of Privacy Policy Documents of Virtual Personal Assistant Applications",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6935,
    "paper_ids": [
      2966
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Md. Jakaria",
    "display_name": "Md. Jakaria",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Connecting the Dots: Tracing Data Endpoints in IoT Devices",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6936,
    "paper_ids": [
      1823
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Danny Yuxing Huang",
    "display_name": "Danny Yuxing Huang",
    "affiliation": "New York University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0,
      "USENIXSEC": 4,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "ACSAC": {},
      "USENIXSEC": {
        "2024": 1,
        "2023": 3
      },
      "NDSS": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Connecting the Dots: Tracing Data Endpoints in IoT Devices",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "wellintended but halfhearted hosts consideration of guests privacy using smart devices on rental properties",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "exploring tenants preferences of privacy negotiation in airbnb",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "abuse vectors a framework for conceptualizing iotenabled interpersonal abuse",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "sneaky spy devices and defective detectors the ecosystem of intimate partner surveillance with covert devices",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6937,
    "paper_ids": [
      1823
    ],
    "papers_without_artifact_ids": [
      3264,
      5640,
      2551,
      2554
    ]
  },
  {
    "name": "John Abascal",
    "display_name": "John Abascal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TMI! Finetuned Models Leak Private Information from their Pretraining Data",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6938,
    "paper_ids": [
      3992
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stanley Wu",
    "display_name": "Stanley Wu",
    "affiliation": "University of Chicago",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TMI! Finetuned Models Leak Private Information from their Pretraining Data",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how to combine membershipinference attacks on multiple updated machine learning models",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 6939,
    "paper_ids": [
      3992
    ],
    "papers_without_artifact_ids": [
      2680
    ]
  },
  {
    "name": "Jonathan R. Ullman",
    "display_name": "Jonathan R. Ullman",
    "affiliation": "Northeastern University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TMI! Finetuned Models Leak Private Information from their Pretraining Data",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how to combine membershipinference attacks on multiple updated machine learning models",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 6940,
    "paper_ids": [
      3992
    ],
    "papers_without_artifact_ids": [
      2680
    ]
  },
  {
    "name": "Balázs Pejó",
    "display_name": "Balázs Pejó",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeVoS: Deniable Yet Verifiable Vote Updating",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok differential privacies",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 8135,
    "paper_ids": [
      4577
    ],
    "papers_without_artifact_ids": [
      4505
    ]
  },
  {
    "name": "Ivan Pryvalov",
    "display_name": "Ivan Pryvalov",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeVoS: Deniable Yet Verifiable Vote Updating",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok secure evoting with everlasting privacy",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 6942,
    "paper_ids": [
      4577
    ],
    "papers_without_artifact_ids": [
      4579
    ]
  },
  {
    "name": "Dennis Murphy",
    "display_name": "Dennis Murphy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6943,
    "paper_ids": [
      3423
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Noah Kamangar",
    "display_name": "Noah Kamangar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Black-Box Privacy Analysis of Messaging Service Providers' Chat Message Processing",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6944,
    "paper_ids": [
      224
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Aumüller 0001",
    "display_name": "Martin Aumüller",
    "affiliation": "IT University of Copenhagen",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PLAN: Variance-Aware Private Mean Estimation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8136,
    "paper_ids": [
      5751
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christian Janos Lebeda",
    "display_name": "Christian Janos Lebeda",
    "affiliation": "Inria, France",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PLAN: Variance-Aware Private Mean Estimation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6946,
    "paper_ids": [
      5751
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Boel Nelson",
    "display_name": "Boel Nelson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1,
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PLAN: Variance-Aware Private Mean Estimation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "user perceptions and attitudes toward untraceability in messaging platforms",
        "conference": "PETS",
        "year": 2026
      }
    ],
    "author_id": 6947,
    "paper_ids": [
      5751
    ],
    "papers_without_artifact_ids": [
      5752
    ]
  },
  {
    "name": "Rasmus Pagh",
    "display_name": "Rasmus Pagh",
    "affiliation": "University of Copenhagen",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PLAN: Variance-Aware Private Mean Estimation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6948,
    "paper_ids": [
      5751
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lawrence Lim",
    "display_name": "Lawrence Lim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "QUICKeR: Quicker Updates Involving Continuous Key Rotation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6949,
    "paper_ids": [
      3492
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei-Yee Goh",
    "display_name": "Wei-Yee Goh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "QUICKeR: Quicker Updates Involving Continuous Key Rotation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6950,
    "paper_ids": [
      3492
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Héber Hwang Arcolezi",
    "display_name": "Héber Hwang Arcolezi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Revealing the True Cost of Locally Differentially Private Protocols: An Auditing Perspective",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8137,
    "paper_ids": [
      2607
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Amirhossein Adavoudi Jolfaei",
    "display_name": "Amirhossein Adavoudi Jolfaei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6952,
    "paper_ids": [
      4526
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andy Rupp",
    "display_name": "Andy Rupp",
    "affiliation": "University of Trier",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 4,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 2,
        "2022": 1,
        "2024": 1
      },
      "CHES": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "puba privacypreserving userdata bookkeeping and analytics",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "p4tc provablysecure yet practical privacypreserving toll collection",
        "conference": "PETS",
        "year": 2020
      },
      {
        "title": "blackbox wallets fast anonymous twoway payments for constrained devices",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 6953,
    "paper_ids": [
      4526
    ],
    "papers_without_artifact_ids": [
      5619,
      5753,
      5754
    ]
  },
  {
    "name": "Stefan Schiffner",
    "display_name": "Stefan Schiffner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6954,
    "paper_ids": [
      4526
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sarah Abdelwahab Gaballah",
    "display_name": "Sarah Abdelwahab Gaballah",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 2,
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Anonify: Decentralized Dual-level Anonymity for Medical Data Donation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "its not my data anymore exploring nonusers privacy perceptions of medical data donation apps",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "ai is from the devil behaviors and concerns toward personal data sharing with llmbased conversational agents",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 6955,
    "paper_ids": [
      4320
    ],
    "papers_without_artifact_ids": [
      1246,
      5746
    ]
  },
  {
    "name": "Lamya Abdullah",
    "display_name": "Lamya Abdullah",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Anonify: Decentralized Dual-level Anonymity for Medical Data Donation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "its not my data anymore exploring nonusers privacy perceptions of medical data donation apps",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 6956,
    "paper_ids": [
      4320
    ],
    "papers_without_artifact_ids": [
      1246
    ]
  },
  {
    "name": "Mina Alishahi",
    "display_name": "Mina Alishahi",
    "affiliation": "Eindhoven University of Technology, The Netherlands",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Anonify: Decentralized Dual-level Anonymity for Medical Data Donation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6957,
    "paper_ids": [
      4320
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thanh Hoang Long Nguyen",
    "display_name": "Thanh Hoang Long Nguyen",
    "affiliation": "University of Oregon",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Anonify: Decentralized Dual-level Anonymity for Medical Data Donation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6958,
    "paper_ids": [
      4320
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ephraim Zimmer",
    "display_name": "Ephraim Zimmer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2025": 1,
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Anonify: Decentralized Dual-level Anonymity for Medical Data Donation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "its not my data anymore exploring nonusers privacy perceptions of medical data donation apps",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "userlevel label leakage from gradients in federated learning",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 6959,
    "paper_ids": [
      4320
    ],
    "papers_without_artifact_ids": [
      1246,
      4324
    ]
  },
  {
    "name": "Karola Marky",
    "display_name": "Karola Marky",
    "affiliation": "Ruhr-University Bochum",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "PETS": 4,
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2025": 2,
        "2024": 1
      },
      "USENIXSEC": {
        "2023": 1,
        "2022": 2
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Anonify: Decentralized Dual-level Anonymity for Medical Data Donation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "its not my data anymore exploring nonusers privacy perceptions of medical data donation apps",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "ai is from the devil behaviors and concerns toward personal data sharing with llmbased conversational agents",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "in the quest to protect users from sidechannel attacks a usercentred design space to mitigate thermal attacks on public payment terminals",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "you offer privacy like you offer tea investigating mechanisms for improving guest privacy in iotequipped households",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "the nerd factor the potential of sp adepts to serve as a social resource in the users quest for more secure and privacypreserving behavior",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "investigating stateoftheart practices for fostering subjective trust in online voting through interviews",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 6960,
    "paper_ids": [
      4320
    ],
    "papers_without_artifact_ids": [
      1246,
      5746,
      5087,
      4323,
      5755,
      4325
    ]
  },
  {
    "name": "Mir Masood Ali",
    "display_name": "Mir Masood Ali",
    "affiliation": "University of Illinois Chicago",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 3
      },
      "NDSS": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lost in translation exploring the risks of webtocrossplatform application migration",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "fledging will continue until privacy improves empirical analysis of googles privacypreserving targeted advertising",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "i would not install an app with this label privacy label impact on risk perception and willingness to install ios apps",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "rise of inspectron automated blackbox auditing of crossplatform electron apps",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 6961,
    "paper_ids": [
      863
    ],
    "papers_without_artifact_ids": [
      3914,
      3915,
      865,
      3917
    ]
  },
  {
    "name": "Monica Kodwani",
    "display_name": "Monica Kodwani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6962,
    "paper_ids": [
      863
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chris Kanich",
    "display_name": "Chris Kanich",
    "affiliation": "University of Illinois at Chicago",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 3,
      "WOOT": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2021": 1
      },
      "WOOT": {},
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i would not install an app with this label privacy label impact on risk perception and willingness to install ios apps",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "rise of inspectron automated blackbox auditing of crossplatform electron apps",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "helping users automatically find and manage sensitive expendable files in cloud storage",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6963,
    "paper_ids": [
      863
    ],
    "papers_without_artifact_ids": [
      865,
      3917,
      5597
    ]
  },
  {
    "name": "Eliza Kuller",
    "display_name": "Eliza Kuller",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Generalizable Active Privacy Choice: Designing a Graphical User Interface for Global Privacy Control",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6964,
    "paper_ids": [
      3426
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chunyue Ma",
    "display_name": "Chunyue Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Generalizable Active Privacy Choice: Designing a Graphical User Interface for Global Privacy Control",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6965,
    "paper_ids": [
      3426
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bella Tassone",
    "display_name": "Bella Tassone",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Generalizable Active Privacy Choice: Designing a Graphical User Interface for Global Privacy Control",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6966,
    "paper_ids": [
      3426
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Faxing Wang",
    "display_name": "Faxing Wang",
    "affiliation": "University of Melbourne",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NOTRY: Deniable messaging with retroactive avowal",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6967,
    "paper_ids": [
      3143
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shaanan Cohney",
    "display_name": "Shaanan Cohney",
    "affiliation": "University of Melbourne",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2022": 1,
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NOTRY: Deniable messaging with retroactive avowal",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "watching the watchers bias and vulnerability in remote proctoring software",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "virtual classrooms and real harms remote learning at us universities",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 6968,
    "paper_ids": [
      3143
    ],
    "papers_without_artifact_ids": [
      5756,
      5334
    ]
  },
  {
    "name": "Denis Obrezkov",
    "display_name": "Denis Obrezkov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy Protection Behaviors from a New Angle: Exploratory Analysis on a Russian Sample",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6969,
    "paper_ids": [
      5757
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arthur Américo",
    "display_name": "Arthur Américo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Defining and Controlling Information Leakage in US Equities Trading",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8138,
    "paper_ids": [
      5758
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Allison Bishop",
    "display_name": "Allison Bishop",
    "affiliation": "Columbia University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Defining and Controlling Information Leakage in US Equities Trading",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6971,
    "paper_ids": [
      5758
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Paul Cesaretti",
    "display_name": "Paul Cesaretti",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Defining and Controlling Information Leakage in US Equities Trading",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6972,
    "paper_ids": [
      5758
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Garrison Grogan",
    "display_name": "Garrison Grogan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Defining and Controlling Information Leakage in US Equities Trading",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6973,
    "paper_ids": [
      5758
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Adam McKoy",
    "display_name": "Adam McKoy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Defining and Controlling Information Leakage in US Equities Trading",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6974,
    "paper_ids": [
      5758
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Robert Moss",
    "display_name": "Robert Moss",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Defining and Controlling Information Leakage in US Equities Trading",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6975,
    "paper_ids": [
      5758
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lisa Oakley",
    "display_name": "Lisa Oakley",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Defining and Controlling Information Leakage in US Equities Trading",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6976,
    "paper_ids": [
      5758
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marcel Ribeiro",
    "display_name": "Marcel Ribeiro",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Defining and Controlling Information Leakage in US Equities Trading",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6977,
    "paper_ids": [
      5758
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mohammad Shokri",
    "display_name": "Mohammad Shokri",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Defining and Controlling Information Leakage in US Equities Trading",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6978,
    "paper_ids": [
      5758
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "James K. Holland",
    "display_name": "James K. Holland",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeTorrent: An Adversarial Padding-only Traffic Analysis Defense",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "regulator a straightforward website fingerprinting defense",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 6979,
    "paper_ids": [
      4580
    ],
    "papers_without_artifact_ids": [
      4581
    ]
  },
  {
    "name": "Jason Carpenter",
    "display_name": "Jason Carpenter",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DeTorrent: An Adversarial Padding-only Traffic Analysis Defense",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6980,
    "paper_ids": [
      4580
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Duncan Russell",
    "display_name": "Duncan Russell",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6981,
    "paper_ids": [
      4582
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Liangqin Ren",
    "display_name": "Liangqin Ren",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6982,
    "paper_ids": [
      2241
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zeyan Liu",
    "display_name": "Zeyan Liu",
    "affiliation": "University of Kansas",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "certificate transparency revisited the public inspections on thirdparty monitors",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 6983,
    "paper_ids": [
      2241
    ],
    "papers_without_artifact_ids": [
      2986
    ]
  },
  {
    "name": "Zhu Li",
    "display_name": "Zhu Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6984,
    "paper_ids": [
      2241
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abdelkarim Kati",
    "display_name": "Abdelkarim Kati",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MAPLE: MArkov Process Leakage attacks on Encrypted Search",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6985,
    "paper_ids": [
      4361
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jamie DeMaria",
    "display_name": "Jamie DeMaria",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MAPLE: MArkov Process Leakage attacks on Encrypted Search",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6986,
    "paper_ids": [
      4361
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Amos Treiber",
    "display_name": "Amos Treiber",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MAPLE: MArkov Process Leakage attacks on Encrypted Search",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6987,
    "paper_ids": [
      4361
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pengzhi Huang",
    "display_name": "Pengzhi Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6988,
    "paper_ids": [
      1404
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yueying Li",
    "display_name": "Yueying Li",
    "affiliation": "Cornell University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6989,
    "paper_ids": [
      1404
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "G. Edward Suh",
    "display_name": "G. Edward Suh",
    "affiliation": "Cornell University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "information flow control in machine learning through modular model architecture",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "stealthy tracking of autonomous vehicles with cache side channels",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 6990,
    "paper_ids": [
      1404
    ],
    "papers_without_artifact_ids": [
      5759,
      5760
    ]
  },
  {
    "name": "Neha Jawalkar",
    "display_name": "Neha Jawalkar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SIGMA: Secure GPT Inference with Function Secret Sharing",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6991,
    "paper_ids": [
      2536
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ananta Mukherjee",
    "display_name": "Ananta Mukherjee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SIGMA: Secure GPT Inference with Function Secret Sharing",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6992,
    "paper_ids": [
      2536
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rahul Sharma 0001",
    "display_name": "Rahul Sharma",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 3,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 1,
        "2024": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SIGMA: Secure GPT Inference with Function Secret Sharing",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "communication efficient secure and private multiparty deep learning",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "endtoend privacy preserving training and inference for air pollution forecasting with data from rival fleets",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "secure floatingpoint training",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 6993,
    "paper_ids": [
      2536
    ],
    "papers_without_artifact_ids": [
      2537,
      2538,
      2540
    ]
  },
  {
    "name": "Enrique Argones-Rúa",
    "display_name": "Enrique Argones-Rúa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "MixMatch: Flow Matching for Mixnet Traffic",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8139,
    "paper_ids": [
      1908
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benjamin Mixon-Baca",
    "display_name": "Benjamin Mixon-Baca",
    "affiliation": "Arizona State University/Breakpointing Bad",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attacking Connection Tracking Frameworks as used by Virtual Private Networks",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6995,
    "paper_ids": [
      4291
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Diwen Xue",
    "display_name": "Diwen Xue",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 3,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2022": 1
      },
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attacking Connection Tracking Frameworks as used by Virtual Private Networks",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the discriminative power of crosslayer rtts in fingerprinting proxy traffic",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "cenpush blockingresistant control channel using push notifications",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "fingerprinting obfuscated proxy traffic with encapsulated tls handshakes",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "bridging barriers a survey of challenges and priorities in the censorship circumvention landscape",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "openvpn is open to vpn fingerprinting",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 6996,
    "paper_ids": [
      4291
    ],
    "papers_without_artifact_ids": [
      4292,
      4293,
      890,
      4297,
      4300
    ]
  },
  {
    "name": "Tarun Ayyagari",
    "display_name": "Tarun Ayyagari",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attacking Connection Tracking Frameworks as used by Virtual Private Networks",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6997,
    "paper_ids": [
      4291
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Deepak Kapur",
    "display_name": "Deepak Kapur",
    "affiliation": "University of New Mexico",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attacking Connection Tracking Frameworks as used by Virtual Private Networks",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6998,
    "paper_ids": [
      4291
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jasmin Zalonis",
    "display_name": "Jasmin Zalonis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Differentially Private Functional Encryption",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 6999,
    "paper_ids": [
      1712
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Linda Scheu-Hachtel",
    "display_name": "Linda Scheu-Hachtel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Differentially Private Functional Encryption",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7000,
    "paper_ids": [
      1712
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jan Oupický",
    "display_name": "Jan Oupický",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Post-quantum XML and SAML Single Sign-On",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8140,
    "paper_ids": [
      4578
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "James Choncholas",
    "display_name": "James Choncholas",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Snail: Secure Single Iteration Localization",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7002,
    "paper_ids": [
      3685
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pujith Kachana",
    "display_name": "Pujith Kachana",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Snail: Secure Single Iteration Localization",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7003,
    "paper_ids": [
      3685
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "André Mateus 0001",
    "display_name": "André Mateus",
    "affiliation": "University of Kentucky",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Snail: Secure Single Iteration Localization",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8141,
    "paper_ids": [
      3685
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gregoire Phillips",
    "display_name": "Gregoire Phillips",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Snail: Secure Single Iteration Localization",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7005,
    "paper_ids": [
      3685
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Micha Horlboge",
    "display_name": "Micha Horlboge",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "I still know it's you! On Challenges in Anonymizing Source Code",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7006,
    "paper_ids": [
      539
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Roland Meyer 0001",
    "display_name": "Roland Meyer",
    "affiliation": "TU Braunschweig",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "I still know it's you! On Challenges in Anonymizing Source Code",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7007,
    "paper_ids": [
      539
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "François Hublet",
    "display_name": "François Hublet",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "User-Controlled Privacy: Taint, Track, and Control",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8142,
    "paper_ids": [
      448
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Hasselquist",
    "display_name": "David Hasselquist",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Raising the Bar: Improved Fingerprinting Attacks and Defenses for Video Streaming Traffic",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7009,
    "paper_ids": [
      1918
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "August Carlson",
    "display_name": "August Carlson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Raising the Bar: Improved Fingerprinting Attacks and Defenses for Video Streaming Traffic",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7010,
    "paper_ids": [
      1918
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Niklas Johansson",
    "display_name": "Niklas Johansson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Raising the Bar: Improved Fingerprinting Attacks and Defenses for Video Streaming Traffic",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7011,
    "paper_ids": [
      1918
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Laura Utz",
    "display_name": "Laura Utz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Supporting Informed Choices about Browser Cookies: The Impact of Personalised Cookie Banners",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7012,
    "paper_ids": [
      3413
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Jones",
    "display_name": "Daniel Jones",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7013,
    "paper_ids": [
      3194
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ferran Alborch Escobar",
    "display_name": "Ferran Alborch Escobar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Computational Differential Privacy for Encrypted Databases Supporting Linear Queries",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7014,
    "paper_ids": [
      5761
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sébastien Canard",
    "display_name": "Sébastien Canard",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Computational Differential Privacy for Encrypted Databases Supporting Linear Queries",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8143,
    "paper_ids": [
      5761
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fabien Laguillaumie",
    "display_name": "Fabien Laguillaumie",
    "affiliation": "Ecole Normale Superieure de Lyon",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Computational Differential Privacy for Encrypted Databases Supporting Linear Queries",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7016,
    "paper_ids": [
      5761
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Duong Hieu Phan",
    "display_name": "Duong Hieu Phan",
    "affiliation": "Ecole Normale Superieure",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Computational Differential Privacy for Encrypted Databases Supporting Linear Queries",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the selfanticensorship nature of encryption on the prevalence of anamorphic cryptography",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 7017,
    "paper_ids": [
      5761
    ],
    "papers_without_artifact_ids": [
      4131
    ]
  },
  {
    "name": "Aamir Hamid",
    "display_name": "Aamir Hamid",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7018,
    "paper_ids": [
      4557
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hemanth Reddy Samidi",
    "display_name": "Hemanth Reddy Samidi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7019,
    "paper_ids": [
      4557
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tim Finin",
    "display_name": "Tim Finin",
    "affiliation": "Univ. of Maryland - Baltimore County",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7020,
    "paper_ids": [
      4557
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Roberto Yus",
    "display_name": "Roberto Yus",
    "affiliation": "Univ. of Maryland - Baltimore County",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7021,
    "paper_ids": [
      4557
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ben Galili",
    "display_name": "Ben Galili",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy Preserving Feature Selection for Sparse Linear Regression",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7022,
    "paper_ids": [
      4535
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mor Weiss",
    "display_name": "Mor Weiss",
    "affiliation": "Bar-Ilan University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy Preserving Feature Selection for Sparse Linear Regression",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7023,
    "paper_ids": [
      4535
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zohar Yakhini",
    "display_name": "Zohar Yakhini",
    "affiliation": "Reichman University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy Preserving Feature Selection for Sparse Linear Regression",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7024,
    "paper_ids": [
      4535
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Connor Bell",
    "display_name": "Connor Bell",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Anonymous Complaint Aggregation for Secure Messaging",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7025,
    "paper_ids": [
      1514
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tingting Tang",
    "display_name": "Tingting Tang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Edge Private Graph Neural Networks with Singular Value Perturbation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7026,
    "paper_ids": [
      2603
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yue Niu",
    "display_name": "Yue Niu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Edge Private Graph Neural Networks with Singular Value Perturbation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "3legrace privacypreserving dnn training over tees and gpus",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 7027,
    "paper_ids": [
      2603
    ],
    "papers_without_artifact_ids": [
      5762
    ]
  },
  {
    "name": "Salman Avestimehr",
    "display_name": "Salman Avestimehr",
    "affiliation": "University of Southern California",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 4,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2023": 1,
        "2024": 2
      },
      "SC": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Edge Private Graph Neural Networks with Singular Value Perturbation",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hawk accurate and fast privacypreserving machine learning using secure lookup table computation",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "how much privacy does federated learning with secure aggregation guarantee",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "3legrace privacypreserving dnn training over tees and gpus",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 7028,
    "paper_ids": [
      2603
    ],
    "papers_without_artifact_ids": [
      5763,
      4570,
      5762
    ]
  },
  {
    "name": "Hoang Nguyen Phuoc Bao",
    "display_name": "Hoang Nguyen Phuoc Bao",
    "affiliation": "ETH Zurich",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Model-driven Privacy",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7029,
    "paper_ids": [
      449
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nan Cheng 0002",
    "display_name": "Nan Cheng",
    "affiliation": "University of Southern Mississippi",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Constant-Round Private Decision Tree Evaluation for Secret Shared Data",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7030,
    "paper_ids": [
      4396
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Naman Gupta",
    "display_name": "Naman Gupta",
    "affiliation": "University of Wisconsin-Madison",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Constant-Round Private Decision Tree Evaluation for Secret Shared Data",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "i really just leaned on my community for support barriers challenges and coping mechanisms used by survivors of technologyfacilitated abuse to seek social support",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "dice a formally verified implementation of dice measured boot",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 7031,
    "paper_ids": [
      4396
    ],
    "papers_without_artifact_ids": [
      2550,
      5480
    ]
  },
  {
    "name": "Aikaterini Mitrokotsa",
    "display_name": "Aikaterini Mitrokotsa",
    "affiliation": "Chalmers/GU",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Constant-Round Private Decision Tree Evaluation for Secret Shared Data",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7032,
    "paper_ids": [
      4396
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonathan Takeshita",
    "display_name": "Jonathan Takeshita",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7033,
    "paper_ids": [
      4576
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jeremy Stevens",
    "display_name": "Jeremy Stevens",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7034,
    "paper_ids": [
      4576
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sebastian Linsner",
    "display_name": "Sebastian Linsner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 2,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "support personas a concept for tailored support of users of privacyenhancing technologies",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "the role of privacy in digitalization analyzing perspectives of german farmers",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 7035,
    "paper_ids": [
      3414
    ],
    "papers_without_artifact_ids": [
      3415,
      3417
    ]
  },
  {
    "name": "Kilian Demuth",
    "display_name": "Kilian Demuth",
    "affiliation": "TU Darmstadt, Science and Technology for Peace and Security (PEASEC), Germany",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "support personas a concept for tailored support of users of privacyenhancing technologies",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 7036,
    "paper_ids": [
      3414
    ],
    "papers_without_artifact_ids": [
      3415
    ]
  },
  {
    "name": "Marc Fischlin",
    "display_name": "Marc Fischlin",
    "affiliation": "TU Darmstadt",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7037,
    "paper_ids": [
      3414
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Masny",
    "display_name": "Daniel Masny",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Delegated Private Matching For Compute",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7038,
    "paper_ids": [
      2598
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shubho Sengupta",
    "display_name": "Shubho Sengupta",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Delegated Private Matching For Compute",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7039,
    "paper_ids": [
      2598
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Prasad Buddhavarapu",
    "display_name": "Prasad Buddhavarapu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Delegated Private Matching For Compute",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7040,
    "paper_ids": [
      2598
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benjamin M. Case",
    "display_name": "Benjamin M. Case",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Delegated Private Matching For Compute",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7041,
    "paper_ids": [
      2598
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Emily Wenger",
    "display_name": "Emily Wenger",
    "affiliation": "Duke University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Data Isotopes for Data Provenance in DNNs",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "glaze protecting artists from style mimicry by texttoimage models",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "blacklight scalable defense for neural networks against querybased blackbox attacks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "fawkes protecting privacy against unauthorized deep learning models",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 7042,
    "paper_ids": [
      1845
    ],
    "papers_without_artifact_ids": [
      5764,
      5765,
      5766
    ]
  },
  {
    "name": "Xiuyu Li",
    "display_name": "Xiuyu Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Data Isotopes for Data Provenance in DNNs",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7043,
    "paper_ids": [
      1845
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ben Y. Zhao",
    "display_name": "Ben Y. Zhao",
    "affiliation": "University of Chicago",
    "artifact_count": 1,
    "total_papers": 12,
    "total_papers_by_conf": {
      "PETS": 2,
      "EUROSYS": 0,
      "FAST": 1,
      "USENIXSEC": 6,
      "NSDI": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2024": 1
      },
      "EUROSYS": {},
      "FAST": {
        "2003": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 2,
        "2022": 2
      },
      "NSDI": {
        "2010": 1,
        "2016": 1,
        "2005": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 8.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Data Isotopes for Data Provenance in DNNs",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "can virtual reality protect users from keystroke inference attacks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "my face my rules enabling personalized protection against unacceptable face editing",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "glaze protecting artists from style mimicry by texttoimage models",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "towards a general videobased keystroke inference attack",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "poison forensics traceback of data poisoning attacks in neural networks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "blacklight scalable defense for neural networks against querybased blackbox attacks",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "fawkes protecting privacy against unauthorized deep learning models",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "exploring crossapplication cellular traffic optimization with baidu trafficguard",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "supporting demanding wireless applications with frequencyagile radios",
        "conference": "NSDI",
        "year": 2010
      },
      {
        "title": "cashmere resilient anonymous routing",
        "conference": "NSDI",
        "year": 2005
      },
      {
        "title": "pond the oceanstore prototype",
        "conference": "FAST",
        "year": 2003
      }
    ],
    "author_id": 7044,
    "paper_ids": [
      1845
    ],
    "papers_without_artifact_ids": [
      5767,
      4636,
      5764,
      5768,
      5769,
      5765,
      5766,
      635,
      5770,
      5771,
      5011
    ]
  },
  {
    "name": "Abdullah Çaglar Öksüz",
    "display_name": "Abdullah Çaglar Öksüz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AUTOLYCUS: Exploiting Explainable Artificial Intelligence (XAI) for Model Extraction Attacks against Interpretable Models",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8144,
    "paper_ids": [
      2559
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bogdan Warinschi",
    "display_name": "Bogdan Warinschi",
    "affiliation": "University of Bristol",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 2,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 2
      },
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SWiSSSE: System-Wide Security for Searchable Symmetric Encryption",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "understanding leakage in searchable encryption a quantitative approach",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "decentralized and stateful serverless computing on the internet computer blockchain",
        "conference": "ATC",
        "year": 2023
      }
    ],
    "author_id": 7046,
    "paper_ids": [
      4224
    ],
    "papers_without_artifact_ids": [
      4225,
      5772
    ]
  },
  {
    "name": "Bruce Wen",
    "display_name": "Bruce Wen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "What Does It Mean to Be Creepy? Responses to Visualizations of Personal Browsing Activity, Online Tracking, and Targeted Ads",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7047,
    "paper_ids": [
      1261
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Blase Ur",
    "display_name": "Blase Ur",
    "affiliation": "University of Chicago",
    "artifact_count": 1,
    "total_papers": 12,
    "total_papers_by_conf": {
      "PETS": 1,
      "ATC": 0,
      "USENIXSEC": 11
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1
      },
      "ATC": {},
      "USENIXSEC": {
        "2024": 2,
        "2020": 1,
        "2023": 2,
        "2022": 1,
        "2021": 5
      }
    },
    "artifact_rate": 8.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "What Does It Mean to Be Creepy? Responses to Visualizations of Personal Browsing Activity, Online Tracking, and Targeted Ads",
        "conference": "PETS",
        "year": 2024,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "data subjects reactions to exercising their right of access",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "why arent we using passkeys obstacles companies face deploying fido2 passwordless authentication",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "defining broken user experiences and remediation tactics when adblocking or trackingprotection tools break a websites user experience",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "a twodecade retrospective analysis of a universitys vulnerability to attacks exploiting reused passwords",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "the same pin just longer on the insecurity of upgrading pins from 4 to 6 digits",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "pursuing usable and useful data downloads under gdprccpa access rights via codesign",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "helping users automatically find and manage sensitive expendable files in cloud storage",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "on the limited impact of visualizing encryption perceptions of e2e messaging security",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "user perceptions of the usability and security of smartphones as fido2 roaming authenticators",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "its stored hopefully on an encrypted server mitigating users misconceptions about fido2 biometric webauthn",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "what twitter knows characterizing ad targeting practices user perceptions and ad explanations through users own twitter data",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 7048,
    "paper_ids": [
      1261
    ],
    "papers_without_artifact_ids": [
      1268,
      5458,
      5685,
      5459,
      867,
      1274,
      5597,
      1254,
      5773,
      5460,
      1278
    ]
  },
  {
    "name": "Lukas Müller",
    "display_name": "Lukas Müller",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8145,
    "paper_ids": [
      1441
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christoph Bösch 0001",
    "display_name": "Christoph Bösch",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8146,
    "paper_ids": [
      1441
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Johannes Ernst",
    "display_name": "Johannes Ernst",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Private Stream Aggregation with Labels in the Standard Model",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7051,
    "paper_ids": [
      5774
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexander Koch 0001",
    "display_name": "Alexander Koch",
    "affiliation": "University of Kentucky",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Private Stream Aggregation with Labels in the Standard Model",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fortified multiparty computation taking advantage of simple secure hardware modules",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 7052,
    "paper_ids": [
      5774
    ],
    "papers_without_artifact_ids": [
      5775
    ]
  },
  {
    "name": "Jaewoo Lee",
    "display_name": "Jaewoo Lee",
    "affiliation": "University of Georgia",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scaling up Differentially Private Deep Learning with Fast Per-Example Gradient Clipping",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards a practical differentially private collaborative phone blacklisting system",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 7053,
    "paper_ids": [
      5776
    ],
    "papers_without_artifact_ids": [
      5777
    ]
  },
  {
    "name": "Daniel Kifer",
    "display_name": "Daniel Kifer",
    "affiliation": "Pennsylvania State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Scaling up Differentially Private Deep Learning with Fast Per-Example Gradient Clipping",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7054,
    "paper_ids": [
      5776
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yusuke Kawamoto 0001",
    "display_name": "Yusuke Kawamoto",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces with Cluster-Specific Features",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7055,
    "paper_ids": [
      4516
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aditya Hegde 0003",
    "display_name": "Aditya Hegde",
    "affiliation": "Johns Hopkins University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Efficient Privacy-preserving Clustering",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7056,
    "paper_ids": [
      2970
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Helen Möllering",
    "display_name": "Helen Möllering",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SoK: Efficient Privacy-preserving Clustering",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flame taming backdoors in federated learning",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 8147,
    "paper_ids": [
      2970
    ],
    "papers_without_artifact_ids": [
      2318
    ]
  },
  {
    "name": "Aditya Damodaran",
    "display_name": "Aditya Damodaran",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unlinkable Updatable Hiding Databases and Privacy-Preserving Loyalty Programs",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7058,
    "paper_ids": [
      4524
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maximilian Hils",
    "display_name": "Maximilian Hils",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy Preference Signals: Past, Present and Future",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7059,
    "paper_ids": [
      5778
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel W. Woods",
    "display_name": "Daniel W. Woods",
    "affiliation": "University of Edinburgh",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy Preference Signals: Past, Present and Future",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lessons lost incident response in the age of cyber insurance and breach attorneys",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7060,
    "paper_ids": [
      5778
    ],
    "papers_without_artifact_ids": [
      5779
    ]
  },
  {
    "name": "Rainer Böhme",
    "display_name": "Rainer Böhme",
    "affiliation": "University of Innsbruck",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2020": 1,
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy Preference Signals: Past, Present and Future",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "landscape more secure than portrait zooming into the directionality of digital images with security implications",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "anatomy of a highprofile data breach dissecting the aftermath of a cryptowallet case",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "lessons lost incident response in the age of cyber insurance and breach attorneys",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "multiple purposes multiple problems a user study of consent dialogs after gdpr",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 8148,
    "paper_ids": [
      5778
    ],
    "papers_without_artifact_ids": [
      5780,
      5781,
      5779,
      5782
    ]
  },
  {
    "name": "Konstantinos Chalkias",
    "display_name": "Konstantinos Chalkias",
    "affiliation": "Mysten Labs, Palo Alto, CA, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HashWires: Hyperefficient Credential-Based Range Proofs",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7062,
    "paper_ids": [
      5783
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shir Cohen",
    "display_name": "Shir Cohen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HashWires: Hyperefficient Credential-Based Range Proofs",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7063,
    "paper_ids": [
      5783
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kevin Lewi",
    "display_name": "Kevin Lewi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HashWires: Hyperefficient Credential-Based Range Proofs",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7064,
    "paper_ids": [
      5783
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fredric Moezinia",
    "display_name": "Fredric Moezinia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HashWires: Hyperefficient Credential-Based Range Proofs",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7065,
    "paper_ids": [
      5783
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yolan Romailler",
    "display_name": "Yolan Romailler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "HashWires: Hyperefficient Credential-Based Range Proofs",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7066,
    "paper_ids": [
      5783
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexandra Dirksen",
    "display_name": "Alexandra Dirksen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LogPicker: Strengthening Certificate Transparency Against Covert Adversaries",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "network responses to russias invasion of ukraine in 2022 a cautionary tale for internet freedom",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7067,
    "paper_ids": [
      225
    ],
    "papers_without_artifact_ids": [
      4187
    ]
  },
  {
    "name": "Robert Michael",
    "display_name": "Robert Michael",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LogPicker: Strengthening Certificate Transparency Against Covert Adversaries",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7068,
    "paper_ids": [
      225
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tilman Stehr",
    "display_name": "Tilman Stehr",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LogPicker: Strengthening Certificate Transparency Against Covert Adversaries",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7069,
    "paper_ids": [
      225
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vikas Mishra",
    "display_name": "Vikas Mishra",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Déjà vu: Abusing Browser Cache Headers to Identify and Track Online Users",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8149,
    "paper_ids": [
      4470
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Walter Rudametkin",
    "display_name": "Walter Rudametkin",
    "affiliation": "CRIStAL",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2024": 1,
        "2021": 1
      },
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Déjà vu: Abusing Browser Cache Headers to Identify and Track Online Users",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "clientside and serverside tracking on meta effectiveness and accuracy",
        "conference": "PETS",
        "year": 2024
      }
    ],
    "author_id": 8150,
    "paper_ids": [
      4470
    ],
    "papers_without_artifact_ids": [
      5784
    ]
  },
  {
    "name": "Romain Rouvoy",
    "display_name": "Romain Rouvoy",
    "affiliation": "CRIStAL",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "SC": 0,
      "EUROSYS": 0,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "SC": {},
      "EUROSYS": {},
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Déjà vu: Abusing Browser Cache Headers to Identify and Track Online Users",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8151,
    "paper_ids": [
      4470
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jong-Min Choi",
    "display_name": "Jong-Min Choi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated Extraction and Presentation of Data Practices in Privacy Policies",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7070,
    "paper_ids": [
      4405
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junbum Shin",
    "display_name": "Junbum Shin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Automated Extraction and Presentation of Data Practices in Privacy Policies",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7071,
    "paper_ids": [
      4405
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Giorgio Di Tizio",
    "display_name": "Giorgio Di Tizio",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Calculus of Tracking: Theory and Practice",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7072,
    "paper_ids": [
      5785
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fabio Massacci",
    "display_name": "Fabio Massacci",
    "affiliation": "University of Trento",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Calculus of Tracking: Theory and Practice",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7073,
    "paper_ids": [
      5785
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fabrice Benhamouda",
    "display_name": "Fabrice Benhamouda",
    "affiliation": "Amazon AWS, New York, USA",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "gage mpc bypassing residual function leakage for noninteractive mpc",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 7074,
    "paper_ids": [
      138
    ],
    "papers_without_artifact_ids": [
      2465
    ]
  },
  {
    "name": "Eyal Kushilevitz",
    "display_name": "Eyal Kushilevitz",
    "affiliation": "Technion",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7075,
    "paper_ids": [
      138
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christian Mouchet",
    "display_name": "Christian Mouchet",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Multiparty Homomorphic Encryption from Ring-Learning-with-Errors",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7076,
    "paper_ids": [
      3400
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jean-Philippe Bossuat",
    "display_name": "Jean-Philippe Bossuat",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 4,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2025": 1,
        "2021": 2
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Multiparty Homomorphic Encryption from Ring-Learning-with-Errors",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tetris composing fhe techniques for private functional exploration over large datasets",
        "conference": "PETS",
        "year": 2025
      },
      {
        "title": "privacypreserving federated recurrent neural networks",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "scalable privacypreserving distributed learning",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 7077,
    "paper_ids": [
      3400
    ],
    "papers_without_artifact_ids": [
      5786,
      3401,
      3402
    ]
  },
  {
    "name": "Zhiyi Zhang 0001",
    "display_name": "Zhiyi Zhang",
    "affiliation": "Harbin Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EL PASSO: Efficient and Lightweight Privacy-preserving Single Sign On",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7078,
    "paper_ids": [
      2915
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lixia Zhang 0001",
    "display_name": "Lixia Zhang",
    "affiliation": "Univ. of California - Los Angeles",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ATC": 0,
      "ACSAC": 0,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "ATC": {},
      "ACSAC": {},
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EL PASSO: Efficient and Lightweight Privacy-preserving Single Sign On",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7079,
    "paper_ids": [
      2915
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arian Akhavan Niaki",
    "display_name": "Arian Akhavan Niaki",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Domain name encryption is not enough: privacy leakage via IP-based website fingerprinting",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how great is the great firewall measuring chinas dns censorship",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "triplet censors demystifying great firewalls dns censorship behavior",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 7080,
    "paper_ids": [
      2989
    ],
    "papers_without_artifact_ids": [
      2993,
      893
    ]
  },
  {
    "name": "Phillipa Gill",
    "display_name": "Phillipa Gill",
    "affiliation": "University of Massachusetts - Amherst",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "PETS": 1,
      "FAST": 1,
      "USENIXSEC": 2,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "FAST": {
        "2010": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2021": 1
      },
      "NSDI": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Domain name encryption is not enough: privacy leakage via IP-based website fingerprinting",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "capa an architecture for operating cluster networks with high availability",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "how great is the great firewall measuring chinas dns censorship",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "triplet censors demystifying great firewalls dns censorship behavior",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "understanding latent sector errors and how to protect against them",
        "conference": "FAST",
        "year": 2010
      }
    ],
    "author_id": 7081,
    "paper_ids": [
      2989
    ],
    "papers_without_artifact_ids": [
      5787,
      2993,
      893,
      5788
    ]
  },
  {
    "name": "Varun Chandrasekaran",
    "display_name": "Varun Chandrasekaran",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2021": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Face-Off: Adversarial Face Obfuscation",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "entangled watermarks as a defense against model extraction",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "powercut and obfuscator an exploration of the design space for privacypreserving interventions for smart speakers",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "exploring connections between active learning and model extraction",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 7082,
    "paper_ids": [
      3390
    ],
    "papers_without_artifact_ids": [
      5789,
      3398,
      4012
    ]
  },
  {
    "name": "Chuhan Gao",
    "display_name": "Chuhan Gao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "NSDI": {
        "2018": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Face-Off: Adversarial Face Obfuscation",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "livetag sensing humanobject interaction through passive chipless wifi tags",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 7083,
    "paper_ids": [
      3390
    ],
    "papers_without_artifact_ids": [
      5790
    ]
  },
  {
    "name": "Suman Banerjee 0001",
    "display_name": "Suman Banerjee",
    "affiliation": "University of Wisconsin - Madison",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "PETS": 1,
      "ATC": 0,
      "USENIXSEC": 1,
      "NSDI": 5,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      },
      "ATC": {},
      "USENIXSEC": {
        "2021": 1
      },
      "NSDI": {
        "2024": 1,
        "2023": 1,
        "2010": 1,
        "2012": 1,
        "2011": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Face-Off: Adversarial Face Obfuscation",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cloudlora enabling cloud radio access lora networks using reinforcement learning based bandwidthadaptive compression",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "openlora validating lora implementations through an extensible and opensourced framework",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "powercut and obfuscator an exploration of the design space for privacypreserving interventions for smart speakers",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "catching whales and minnows using wifinet deconstructing nonwifi interference using wifi hardware",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "pie in the sky online passive interference estimation for enterprise wlans",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "scalable wifi media delivery through adaptive broadcasts",
        "conference": "NSDI",
        "year": 2010
      }
    ],
    "author_id": 7084,
    "paper_ids": [
      3390
    ],
    "papers_without_artifact_ids": [
      5791,
      5792,
      3398,
      5793,
      5794,
      5795
    ]
  },
  {
    "name": "Logan Arkema",
    "display_name": "Logan Arkema",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Residue-Free Computing",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7085,
    "paper_ids": [
      1142
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Frédéric Ladouceur",
    "display_name": "Frédéric Ladouceur",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Growing synthetic data through differentially-private vine copulas",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8152,
    "paper_ids": [
      2608
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Antoine Laurent",
    "display_name": "Antoine Laurent",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Growing synthetic data through differentially-private vine copulas",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7087,
    "paper_ids": [
      2608
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexandre Roy-Gaumond",
    "display_name": "Alexandre Roy-Gaumond",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Growing synthetic data through differentially-private vine copulas",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7088,
    "paper_ids": [
      2608
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tim Kornhuber",
    "display_name": "Tim Kornhuber",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System",
        "conference": "PETS",
        "year": 2021,
        "badges": [],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7089,
    "paper_ids": [
      417
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alexander Yang",
    "display_name": "Alexander Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "How Experts Personalize Privacy & Security Advice for At-Risk Users",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7090,
    "paper_ids": [
      1263
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nathan Malkin",
    "display_name": "Nathan Malkin",
    "affiliation": "NJIT",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "PETS": 2,
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2026": 1
      },
      "USENIXSEC": {
        "2024": 2,
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "How Experts Personalize Privacy & Security Advice for At-Risk Users",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privacy solution or menace investigating perceptions of radiofrequency sensing",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "understanding how people share passwords",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "write read or fix exploring alternative methods for secure development studies",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "effects of privacy permissions on user choices in voice assistant app stores",
        "conference": "PETS",
        "year": 2022
      },
      {
        "title": "runtime permissions for privacy in proactive intelligent assistants",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 7091,
    "paper_ids": [
      1263
    ],
    "papers_without_artifact_ids": [
      2503,
      1265,
      1266,
      5796,
      3927
    ]
  },
  {
    "name": "Thomas Cory",
    "display_name": "Thomas Cory",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Word-level Annotation of GDPR Transparency Compliance in Privacy Policies using Large Language Models",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "beyond the request harnessing http response headers for crossbrowser web tracker detection in an imbalanced setting",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 7092,
    "paper_ids": [
      5797
    ],
    "papers_without_artifact_ids": [
      5798
    ]
  },
  {
    "name": "Wolf Rieder",
    "display_name": "Wolf Rieder",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Word-level Annotation of GDPR Transparency Compliance in Privacy Policies using Large Language Models",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "beyond the request harnessing http response headers for crossbrowser web tracker detection in an imbalanced setting",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 7093,
    "paper_ids": [
      5797
    ],
    "papers_without_artifact_ids": [
      5798
    ]
  },
  {
    "name": "Julia Krämer",
    "display_name": "Julia Krämer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Word-level Annotation of GDPR Transparency Compliance in Privacy Policies using Large Language Models",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8153,
    "paper_ids": [
      5797
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Philip Raschke",
    "display_name": "Philip Raschke",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2025": 1,
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Word-level Annotation of GDPR Transparency Compliance in Privacy Policies using Large Language Models",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "beyond the request harnessing http response headers for crossbrowser web tracker detection in an imbalanced setting",
        "conference": "PETS",
        "year": 2025
      }
    ],
    "author_id": 7095,
    "paper_ids": [
      5797
    ],
    "papers_without_artifact_ids": [
      5798
    ]
  },
  {
    "name": "Patrick Herbke",
    "display_name": "Patrick Herbke",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Word-level Annotation of GDPR Transparency Compliance in Privacy Policies using Large Language Models",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7096,
    "paper_ids": [
      5797
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Axel Küpper",
    "display_name": "Axel Küpper",
    "affiliation": "TU Berlin",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Word-level Annotation of GDPR Transparency Compliance in Privacy Policies using Large Language Models",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8154,
    "paper_ids": [
      5797
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hassan Asghar 0001",
    "display_name": "Hassan Asghar",
    "affiliation": "Macquarie University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "dX-Privacy for Text and the Curse of Dimensionality",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7098,
    "paper_ids": [
      4554
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Robin Carpentier",
    "display_name": "Robin Carpentier",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "dX-Privacy for Text and the Curse of Dimensionality",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7099,
    "paper_ids": [
      4554
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benjamin Zi Hao Zhao",
    "display_name": "Benjamin Zi Hao Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 3,
      "ACSAC": 0,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2021": 1,
        "2026": 1
      },
      "ACSAC": {},
      "USENIXSEC": {
        "2024": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "dX-Privacy for Text and the Curse of Dimensionality",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dnngp diagnosing and mitigating models faults using latent concepts",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "unintended memorization and timing attacks in named entity recognition models",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "the audio auditor userlevel membership inference in internet of things voice services",
        "conference": "PETS",
        "year": 2021
      }
    ],
    "author_id": 7100,
    "paper_ids": [
      4554
    ],
    "papers_without_artifact_ids": [
      1579,
      4550,
      1580
    ]
  },
  {
    "name": "Chong Kai Lau",
    "display_name": "Chong Kai Lau",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Bot Among Us: Exploring User Awareness and Privacy Concerns About Chatbots in Group Chats",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7101,
    "paper_ids": [
      3353
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ahsan Zafar",
    "display_name": "Ahsan Zafar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "PriVA-C: Defending Voice Assistants from Fingerprinting Attacks",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7102,
    "paper_ids": [
      1824
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "McKenna McCall",
    "display_name": "McKenna McCall",
    "affiliation": "Colorado State University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Location-Enhanced Information Flow for Home Automations",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7103,
    "paper_ids": [
      2587
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ben Weinshel",
    "display_name": "Ben Weinshel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Location-Enhanced Information Flow for Home Automations",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "what twitter knows characterizing ad targeting practices user perceptions and ad explanations through users own twitter data",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 7104,
    "paper_ids": [
      2587
    ],
    "papers_without_artifact_ids": [
      1278
    ]
  },
  {
    "name": "Kunlin Cai",
    "display_name": "Kunlin Cai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Location-Enhanced Information Flow for Home Automations",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "remote keylogging attacks in multiuser vr applications",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 7105,
    "paper_ids": [
      2587
    ],
    "papers_without_artifact_ids": [
      1156
    ]
  },
  {
    "name": "Ying Li 0095",
    "display_name": "Ying Li",
    "affiliation": "University of California, Los Angeles",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      },
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Location-Enhanced Information Flow for Home Automations",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok towards effective automated vulnerability repair",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 7106,
    "paper_ids": [
      2587
    ],
    "papers_without_artifact_ids": [
      1530
    ]
  },
  {
    "name": "Devika Manohar",
    "display_name": "Devika Manohar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Location-Enhanced Information Flow for Home Automations",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7107,
    "paper_ids": [
      2587
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "João Afonso Vilalonga",
    "display_name": "João Afonso Vilalonga",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Obscura: Enabling Ephemeral Proxies for Traffic Encapsulation in WebRTC Media Streams Against Cost-Effective Censors",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "redunt automatically deriving redundancy relations for pure opbased crdts",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 8155,
    "paper_ids": [
      4591
    ],
    "papers_without_artifact_ids": [
      4906
    ]
  },
  {
    "name": "João S. Resende",
    "display_name": "João S. Resende",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Obscura: Enabling Ephemeral Proxies for Traffic Encapsulation in WebRTC Media Streams Against Cost-Effective Censors",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8156,
    "paper_ids": [
      4591
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Henrique Domingos",
    "display_name": "Henrique Domingos",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Obscura: Enabling Ephemeral Proxies for Traffic Encapsulation in WebRTC Media Streams Against Cost-Effective Censors",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "redunt automatically deriving redundancy relations for pure opbased crdts",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 7110,
    "paper_ids": [
      4591
    ],
    "papers_without_artifact_ids": [
      4906
    ]
  },
  {
    "name": "Ismail Hossain",
    "display_name": "Ismail Hossain",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AI-in-the-Loop: Privacy Preserving Real-Time Scam Detection and Conversational Scam-baiting by Leveraging LLMs and Federated Learning",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7111,
    "paper_ids": [
      5799
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sai Puppala",
    "display_name": "Sai Puppala",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AI-in-the-Loop: Privacy Preserving Real-Time Scam Detection and Conversational Scam-baiting by Leveraging LLMs and Federated Learning",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7112,
    "paper_ids": [
      5799
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Md Jahangir Alam 0003",
    "display_name": "Md Jahangir Alam",
    "affiliation": "Southern Illinois University Carbondale, School of Computing, IL, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AI-in-the-Loop: Privacy Preserving Real-Time Scam Detection and Conversational Scam-baiting by Leveraging LLMs and Federated Learning",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7113,
    "paper_ids": [
      5799
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sajedul Talukder",
    "display_name": "Sajedul Talukder",
    "affiliation": "University of Texas - El Paso",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "AI-in-the-Loop: Privacy Preserving Real-Time Scam Detection and Conversational Scam-baiting by Leveraging LLMs and Federated Learning",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7114,
    "paper_ids": [
      5799
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Karlo Lukic",
    "display_name": "Karlo Lukic",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Privacy vs. Profit: The Impact of Google's Manifest Version 3 (MV3) Update on Ad Blocker Effectiveness",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7115,
    "paper_ids": [
      5800
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lazaros Papadopoulos",
    "display_name": "Lazaros Papadopoulos",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Privacy vs. Profit: The Impact of Google's Manifest Version 3 (MV3) Update on Ad Blocker Effectiveness",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7116,
    "paper_ids": [
      5800
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zishuai Cheng",
    "display_name": "Zishuai Cheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "What-App? App Usage Detection Using Encrypted LTE/5G Traffic",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "watching your call breaking volte privacy in lte5g networks",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 7117,
    "paper_ids": [
      4143
    ],
    "papers_without_artifact_ids": [
      5218
    ]
  },
  {
    "name": "Mihai Ordean",
    "display_name": "Mihai Ordean",
    "affiliation": "University of Birmingham",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "PETS": 2,
      "ACSAC": 1,
      "CHES": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2026": 1
      },
      "ACSAC": {
        "2017": 1
      },
      "CHES": {
        "2021": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "What-App? App Usage Detection Using Encrypted LTE/5G Traffic",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "watching your call breaking volte privacy in lte5g networks",
        "conference": "PETS",
        "year": 2023
      },
      {
        "title": "cutting through the complexity of reverse engineering embedded devices",
        "conference": "CHES",
        "year": 2021
      },
      {
        "title": "traks a universal key management scheme for ertms",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 7118,
    "paper_ids": [
      4143
    ],
    "papers_without_artifact_ids": [
      5218,
      5217,
      5317
    ]
  },
  {
    "name": "Baojiang Cui",
    "display_name": "Baojiang Cui",
    "affiliation": "BUPT",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2023": 1,
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "What-App? App Usage Detection Using Encrypted LTE/5G Traffic",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "watching your call breaking volte privacy in lte5g networks",
        "conference": "PETS",
        "year": 2023
      }
    ],
    "author_id": 7119,
    "paper_ids": [
      4143
    ],
    "papers_without_artifact_ids": [
      5218
    ]
  },
  {
    "name": "Bipin Paudel",
    "display_name": "Bipin Paudel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sanitization or Deception? Rethinking Privacy Protection in Large Language Models",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "neural fuzzy extractors a secure way to use artificial neural networks for biometric user authentication",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 7120,
    "paper_ids": [
      5801
    ],
    "papers_without_artifact_ids": [
      5802
    ]
  },
  {
    "name": "Bishwas Mandal",
    "display_name": "Bishwas Mandal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sanitization or Deception? Rethinking Privacy Protection in Large Language Models",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7121,
    "paper_ids": [
      5801
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "George T. Amariucai",
    "display_name": "George T. Amariucai",
    "affiliation": "Kansas State University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2022": 1,
        "2026": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sanitization or Deception? Rethinking Privacy Protection in Large Language Models",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "neural fuzzy extractors a secure way to use artificial neural networks for biometric user authentication",
        "conference": "PETS",
        "year": 2022
      }
    ],
    "author_id": 7122,
    "paper_ids": [
      5801
    ],
    "papers_without_artifact_ids": [
      5802
    ]
  },
  {
    "name": "Shuangqing Wei",
    "display_name": "Shuangqing Wei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Sanitization or Deception? Rethinking Privacy Protection in Large Language Models",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7123,
    "paper_ids": [
      5801
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Francesco Capano",
    "display_name": "Francesco Capano",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SPRINT: Scalable Secure & Differentially Private Inference for Transformers",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7124,
    "paper_ids": [
      5803
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonas Böhler",
    "display_name": "Jonas Böhler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "USENIXSEC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      },
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SPRINT: Scalable Secure & Differentially Private Inference for Transformers",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "secure multiparty computation of differentially private median",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 8157,
    "paper_ids": [
      5803
    ],
    "papers_without_artifact_ids": [
      1222
    ]
  },
  {
    "name": "Benjamin Weggenmann",
    "display_name": "Benjamin Weggenmann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SPRINT: Scalable Secure & Differentially Private Inference for Transformers",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7126,
    "paper_ids": [
      5803
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David Breuer",
    "display_name": "David Breuer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ad Personalization and Transparency in Mobile Ecosystems: A Comparative Analysis of Google's and Apple's EU App Stores",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7127,
    "paper_ids": [
      418
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jose Luis Martin-Navarro",
    "display_name": "Jose Luis Martin-Navarro",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Personal Data Flows and Privacy Policy Traceability in Third-party LLM Apps in the GPT Ecosystem",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7128,
    "paper_ids": [
      4451
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rongjun Ma",
    "display_name": "Rongjun Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Personal Data Flows and Privacy Policy Traceability in Third-party LLM Apps in the GPT Ecosystem",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7129,
    "paper_ids": [
      4451
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kyle Hogan",
    "display_name": "Kyle Hogan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Making Sense of Private Advertising: A Principled Approach to a Complex Ecosystem",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7130,
    "paper_ids": [
      2445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shun Takagi",
    "display_name": "Shun Takagi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Securing Private Federated Learning in a Malicious Setting: A Scalable TEE-Based Approach with Client Auditing",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7131,
    "paper_ids": [
      5804
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Satoshi Hasegawa",
    "display_name": "Satoshi Hasegawa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Securing Private Federated Learning in a Malicious Setting: A Scalable TEE-Based Approach with Client Auditing",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7132,
    "paper_ids": [
      5804
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cameron Cartier",
    "display_name": "Cameron Cartier",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "PETS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ReporTor: Facilitating User Reporting of Issues Encountered in Naturalistic Web Browsing via Tor Browser",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "where the wild things are bruteforce ssh attacks in the wild and how to stop them",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 7133,
    "paper_ids": [
      4195
    ],
    "papers_without_artifact_ids": [
      4196
    ]
  },
  {
    "name": "Lucas Zagal",
    "display_name": "Lucas Zagal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ReporTor: Facilitating User Reporting of Issues Encountered in Naturalistic Web Browsing via Tor Browser",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7134,
    "paper_ids": [
      4195
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Topi Korhonen",
    "display_name": "Topi Korhonen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "PETS": {
        "2026": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "PETS"
    ],
    "years": [
      2026
    ],
    "year_range": "2026-2026",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ephemeral Network-Layer Fingerprinting Defenses",
        "conference": "PETS",
        "year": 2026,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7135,
    "paper_ids": [
      1919
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hossam ElAtali",
    "display_name": "Hossam ElAtali",
    "affiliation": "University of Waterloo",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7136,
    "paper_ids": [
      1195
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Linkang Du",
    "display_name": "Linkang Du",
    "affiliation": "Xi'an Jiaotong University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privgraph differentially private graph data publication by exploiting community information",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7137,
    "paper_ids": [
      1542
    ],
    "papers_without_artifact_ids": [
      2330
    ]
  },
  {
    "name": "Mingyang Sun",
    "display_name": "Mingyang Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privgraph differentially private graph data publication by exploiting community information",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7138,
    "paper_ids": [
      1542
    ],
    "papers_without_artifact_ids": [
      2330
    ]
  },
  {
    "name": "Peng Cheng 0001",
    "display_name": "Peng Cheng",
    "affiliation": "Queen's University Belfast",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "NDSS": 2,
      "ACSAC": 1,
      "USENIXSEC": 3,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 2
      },
      "ACSAC": {
        "2023": 1
      },
      "USENIXSEC": {
        "2023": 2,
        "2021": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mock optimizing kernel fuzzing mutation with contextaware dependency",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "poseidon a consolidated virtual network controller that manages millions of tenants via config tree",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "sepanner analyzing semantics of controller variables in industrial control systems based on network traffic",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "privgraph differentially private graph data publication by exploiting community information",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "miner a hybrid datadriven approach for rest api fuzzing",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "unifuzz a holistic and pragmatic metricsdriven platform for evaluating fuzzers",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 7139,
    "paper_ids": [
      1542
    ],
    "papers_without_artifact_ids": [
      1545,
      5805,
      841,
      2330,
      1552,
      1558
    ]
  },
  {
    "name": "Jiming Chen 0001",
    "display_name": "Jiming Chen",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "NDSS": 2,
      "ACSAC": 1,
      "USENIXSEC": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 2
      },
      "ACSAC": {
        "2023": 1
      },
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mock optimizing kernel fuzzing mutation with contextaware dependency",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "poseidon a consolidated virtual network controller that manages millions of tenants via config tree",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "sepanner analyzing semantics of controller variables in industrial control systems based on network traffic",
        "conference": "ACSAC",
        "year": 2023
      },
      {
        "title": "privtrace differentially private trajectory synthesis by adaptive markov models",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "privsyn differentially private data synthesis",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 7140,
    "paper_ids": [
      1542
    ],
    "papers_without_artifact_ids": [
      1545,
      5805,
      841,
      202,
      210
    ]
  },
  {
    "name": "Ruijie Meng",
    "display_name": "Ruijie Meng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Large Language Model guided Protocol Fuzzing",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7141,
    "paper_ids": [
      3296
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Mirchev",
    "display_name": "Martin Mirchev",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Large Language Model guided Protocol Fuzzing",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7142,
    "paper_ids": [
      3296
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tejas Kannan",
    "display_name": "Tejas Kannan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Acoustic Keystroke Leakage on Smart Televisions",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7143,
    "paper_ids": [
      3378
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Synthia Qia Wang 0001",
    "display_name": "Synthia Qia Wang",
    "affiliation": "IIT Bombay",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Acoustic Keystroke Leakage on Smart Televisions",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7144,
    "paper_ids": [
      3378
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Max Sunog",
    "display_name": "Max Sunog",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Acoustic Keystroke Leakage on Smart Televisions",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7145,
    "paper_ids": [
      3378
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abraham Bueno de Mesquita",
    "display_name": "Abraham Bueno de Mesquita",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Acoustic Keystroke Leakage on Smart Televisions",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7146,
    "paper_ids": [
      3378
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniela Lopes",
    "display_name": "Daniela Lopes",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7147,
    "paper_ids": [
      3148
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pedro Medeiros",
    "display_name": "Pedro Medeiros",
    "affiliation": "Universidade NOVA de Lisboa",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7148,
    "paper_ids": [
      3148
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Daniel Castro 0004",
    "display_name": "Daniel Castro",
    "affiliation": "University of Lisbon",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "spht scalable persistent hardware transactions",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 7149,
    "paper_ids": [
      3148
    ],
    "papers_without_artifact_ids": [
      5806
    ]
  },
  {
    "name": "Bernardo Portela",
    "display_name": "Bernardo Portela",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7150,
    "paper_ids": [
      3148
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "João Vinagre",
    "display_name": "João Vinagre",
    "affiliation": "INESC TEC",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8158,
    "paper_ids": [
      3148
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bernardo Ferreira",
    "display_name": "Bernardo Ferreira",
    "affiliation": "Universidade de Lisboa",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7152,
    "paper_ids": [
      3148
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nuno Santos 0001",
    "display_name": "Nuno Santos",
    "affiliation": "Universidade de Lisboa",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2022": 1
      },
      "PETS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "rezone disarming trustzone with tee privilege reduction",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 7153,
    "paper_ids": [
      3148
    ],
    "papers_without_artifact_ids": [
      5260
    ]
  },
  {
    "name": "Wenjun Zhu",
    "display_name": "Wenjun Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2023": 2,
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CamPro: Camera-based Anti-Facial Recognition",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "neural invisibility cloak concealing adversary in images via compromised aidriven image signal processing",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "capatch physical adversarial patch against image captioning systems",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "tpatch a triggered physical adversarial patch",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7154,
    "paper_ids": [
      5807
    ],
    "papers_without_artifact_ids": [
      5808,
      5809,
      5810
    ]
  },
  {
    "name": "Yuan Sun",
    "display_name": "Yuan Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CamPro: Camera-based Anti-Facial Recognition",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7155,
    "paper_ids": [
      5807
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiani Liu 0009",
    "display_name": "Jiani Liu",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CamPro: Camera-based Anti-Facial Recognition",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7156,
    "paper_ids": [
      5807
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yushi Cheng",
    "display_name": "Yushi Cheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "NDSS": 2,
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 2
      },
      "USENIXSEC": {
        "2023": 2,
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CamPro: Camera-based Anti-Facial Recognition",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "uniid spoofing face authentication system by universal identity",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "capatch physical adversarial patch against image captioning systems",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "tpatch a triggered physical adversarial patch",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "ok siri or hey google evaluating voiceprint distinctiveness via contentbased prole score",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "mid tracing screen photos via moiré patterns",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 7157,
    "paper_ids": [
      5807
    ],
    "papers_without_artifact_ids": [
      5811,
      5809,
      5810,
      5812,
      3299
    ]
  },
  {
    "name": "Xiaoyu Ji 0001",
    "display_name": "Xiaoyu Ji",
    "affiliation": "Sun Yat-sen University",
    "artifact_count": 1,
    "total_papers": 21,
    "total_papers_by_conf": {
      "NDSS": 10,
      "USENIXSEC": 11
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 5,
        "2025": 5
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 5,
        "2022": 3,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 4.8,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CamPro: Camera-based Anti-Facial Recognition",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lightantenna characterizing the limits of fluorescent lampinduced electromagnetic interference",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "phantomlidar crossmodality signal injection attacks against lidar",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "powerradio manipulate sensor measurement via power gnd radiation",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "rethink reveal the threat of electromagnetic interference on power inverters",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "ghostshot manipulating the image of ccd cameras with electromagnetic interference",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "neural invisibility cloak concealing adversary in images via compromised aidriven image signal processing",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "em eye characterizing electromagnetic sidechannel eavesdropping on embedded cameras",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "ghosttype the limits of using contactless electromagnetic interference to inject phantom keys into analog circuits of keyboards",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "uniid spoofing face authentication system by universal identity",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "inaudible adversarial perturbation manipulating the recognition of user speech in real time",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "laseradv laser adversarial attacks on speech recognition systems",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "glitchhiker uncovering vulnerabilities of image signal transmission with iemi",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "learning normality is enough a softwarebased mitigation against inaudible voice attacks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "tpatch a triggered physical adversarial patch",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "remote attacks on speech recognition systems using sound from power supply",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "capatch physical adversarial patch against image captioning systems",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "ghosttouch targeted attacks on touchscreens without physical touch",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "ok siri or hey google evaluating voiceprint distinctiveness via contentbased prole score",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "rolling colors adversarial laser exploits against traffic light recognition",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "mid tracing screen photos via moiré patterns",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 7158,
    "paper_ids": [
      5807
    ],
    "papers_without_artifact_ids": [
      5813,
      5814,
      5815,
      5816,
      5817,
      5808,
      5818,
      5819,
      5811,
      5820,
      5821,
      5822,
      5823,
      5810,
      3628,
      5809,
      2319,
      5812,
      5824,
      3299
    ]
  },
  {
    "name": "Wenyuan Xu 0001",
    "display_name": "Wenyuan Xu",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 24,
    "total_papers_by_conf": {
      "NDSS": 12,
      "USENIXSEC": 12
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 5,
        "2025": 7
      },
      "USENIXSEC": {
        "2023": 7,
        "2022": 3,
        "2025": 1,
        "2021": 1
      }
    },
    "artifact_rate": 4.2,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CamPro: Camera-based Anti-Facial Recognition",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lightantenna characterizing the limits of fluorescent lampinduced electromagnetic interference",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "phantomlidar crossmodality signal injection attacks against lidar",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "powerradio manipulate sensor measurement via power gnd radiation",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "rethink reveal the threat of electromagnetic interference on power inverters",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "ghostshot manipulating the image of ccd cameras with electromagnetic interference",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "raconteur a knowledgeable insightful and portable llmpowered shell command explainer",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "barbie robust backdoor detection based on latent separability",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "neural invisibility cloak concealing adversary in images via compromised aidriven image signal processing",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "em eye characterizing electromagnetic sidechannel eavesdropping on embedded cameras",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "ghosttype the limits of using contactless electromagnetic interference to inject phantom keys into analog circuits of keyboards",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "uniid spoofing face authentication system by universal identity",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "inaudible adversarial perturbation manipulating the recognition of user speech in real time",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "glitchhiker uncovering vulnerabilities of image signal transmission with iemi",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "learning normality is enough a softwarebased mitigation against inaudible voice attacks",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "tpatch a triggered physical adversarial patch",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "vcloak intelligibility naturalness timbrepreserving realtime voice anonymization",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "catch you and i can revealing source voiceprint against voice conversion",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "capatch physical adversarial patch against image captioning systems",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "villain backdoor attacks against vertical split learning",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "ghosttouch targeted attacks on touchscreens without physical touch",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "ok siri or hey google evaluating voiceprint distinctiveness via contentbased prole score",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "rolling colors adversarial laser exploits against traffic light recognition",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "mid tracing screen photos via moiré patterns",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 7159,
    "paper_ids": [
      5807
    ],
    "papers_without_artifact_ids": [
      5813,
      5814,
      5815,
      5816,
      5817,
      4247,
      5489,
      5808,
      5818,
      5819,
      5811,
      5820,
      5822,
      5823,
      5810,
      5491,
      5488,
      5809,
      5490,
      2319,
      5812,
      5824,
      3299
    ]
  },
  {
    "name": "Weiran Lin",
    "display_name": "Weiran Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Group-based Robustness: A General Framework for Customized Robustness in the Real World",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "adversarial training for rawbinary malware classifiers",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7160,
    "paper_ids": [
      2588
    ],
    "papers_without_artifact_ids": [
      2593
    ]
  },
  {
    "name": "Keane Lucas",
    "display_name": "Keane Lucas",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Group-based Robustness: A General Framework for Customized Robustness in the Real World",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "adversarial training for rawbinary malware classifiers",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7161,
    "paper_ids": [
      2588
    ],
    "papers_without_artifact_ids": [
      2593
    ]
  },
  {
    "name": "Neo Eyal",
    "display_name": "Neo Eyal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Group-based Robustness: A General Framework for Customized Robustness in the Real World",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7162,
    "paper_ids": [
      2588
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiameng Shi",
    "display_name": "Jiameng Shi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7163,
    "paper_ids": [
      2403
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenqiang Li",
    "display_name": "Wenqiang Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7164,
    "paper_ids": [
      2403
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenwen Wang 0001",
    "display_name": "Wenwen Wang",
    "affiliation": "University of Georgia",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1,
      "SOSP": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "SOSP": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7165,
    "paper_ids": [
      2403
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Geoff Twardokus",
    "display_name": "Geoff Twardokus",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7166,
    "paper_ids": [
      5825
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nina Bindel",
    "display_name": "Nina Bindel",
    "affiliation": "SandboxAQ, Palo Alto, CA, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7167,
    "paper_ids": [
      5825
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hanif Rahbari",
    "display_name": "Hanif Rahbari",
    "affiliation": "Rochester Inst. of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7168,
    "paper_ids": [
      5825
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sarah McCarthy",
    "display_name": "Sarah McCarthy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7169,
    "paper_ids": [
      5825
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yikang Chen",
    "display_name": "Yikang Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Precise Reporting of Cryptographic Misuses",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7170,
    "paper_ids": [
      3973
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yibo Liu",
    "display_name": "Yibo Liu",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Precise Reporting of Cryptographic Misuses",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tygr type inference on stripped binaries using graph neural networks",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 7171,
    "paper_ids": [
      3973
    ],
    "papers_without_artifact_ids": [
      825
    ]
  },
  {
    "name": "Ka Lok Wu",
    "display_name": "Ka Lok Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Precise Reporting of Cryptographic Misuses",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "back to school on the insecurity of academic vpns",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7172,
    "paper_ids": [
      3973
    ],
    "papers_without_artifact_ids": [
      3975
    ]
  },
  {
    "name": "Duc Viet Le 0001",
    "display_name": "Duc Viet Le",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "PETS": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Towards Precise Reporting of Cryptographic Misuses",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a tale of two trees one writes and other reads",
        "conference": "PETS",
        "year": 2020
      }
    ],
    "author_id": 7173,
    "paper_ids": [
      3973
    ],
    "papers_without_artifact_ids": [
      2579
    ]
  },
  {
    "name": "Yibin Xu",
    "display_name": "Yibin Xu",
    "affiliation": "University of Copenhagen",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7174,
    "paper_ids": [
      4434
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Boris Düdder",
    "display_name": "Boris Düdder",
    "affiliation": "University of Copenhagen",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8159,
    "paper_ids": [
      4434
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tijs Slaats",
    "display_name": "Tijs Slaats",
    "affiliation": "University of Copenhagen",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7176,
    "paper_ids": [
      4434
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yongluan Zhou",
    "display_name": "Yongluan Zhou",
    "affiliation": "University of Copenhagen",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7177,
    "paper_ids": [
      4434
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bang Wu 0004",
    "display_name": "Bang Wu",
    "affiliation": "RMIT University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7178,
    "paper_ids": [
      1565
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "He Zhang 0012",
    "display_name": "He Zhang",
    "affiliation": "Monash University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7179,
    "paper_ids": [
      1565
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiangwen Yang",
    "display_name": "Xiangwen Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7180,
    "paper_ids": [
      1565
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Srivatsan Sridhar",
    "display_name": "Srivatsan Sridhar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Content Censorship in the InterPlanetary File System",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7181,
    "paper_ids": [
      4586
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Onur Ascigil",
    "display_name": "Onur Ascigil",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Content Censorship in the InterPlanetary File System",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "guardians of the galaxy content moderation in the interplanetary file system",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 7182,
    "paper_ids": [
      4586
    ],
    "papers_without_artifact_ids": [
      4587
    ]
  },
  {
    "name": "Navin V. Keizer",
    "display_name": "Navin V. Keizer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Content Censorship in the InterPlanetary File System",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7183,
    "paper_ids": [
      4586
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "François Genon",
    "display_name": "François Genon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Content Censorship in the InterPlanetary File System",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8160,
    "paper_ids": [
      4586
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sébastien Pierre",
    "display_name": "Sébastien Pierre",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Content Censorship in the InterPlanetary File System",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8161,
    "paper_ids": [
      4586
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yiannis Psaras",
    "display_name": "Yiannis Psaras",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Content Censorship in the InterPlanetary File System",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the eternal tussle exploring the role of centralization in ipfs",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 7186,
    "paper_ids": [
      4586
    ],
    "papers_without_artifact_ids": [
      5361
    ]
  },
  {
    "name": "Abbas Acar",
    "display_name": "Abbas Acar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "NDSS": 2,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "50 Shades of Support: A Device-Centric Analysis of Android Security Updates",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "speak up im listening extracting speech from zeropermission vr sensors",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "evoke efficient revocation of verifiable credentials in iot networks",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "røb ransomware over modern web browsers",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7187,
    "paper_ids": [
      4136
    ],
    "papers_without_artifact_ids": [
      1135,
      4137,
      4139
    ]
  },
  {
    "name": "Güliz Seray Tuncay",
    "display_name": "Güliz Seray Tuncay",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "NDSS": 2,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "50 Shades of Support: A Device-Centric Analysis of Android Security Updates",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scopeverif analyzing the security of androids scoped storage via differential analysis",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "røb ransomware over modern web browsers",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "see no evil phishing for permissions with false transparency",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 8162,
    "paper_ids": [
      4136
    ],
    "papers_without_artifact_ids": [
      1734,
      4139,
      5073
    ]
  },
  {
    "name": "Esteban Luques",
    "display_name": "Esteban Luques",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "50 Shades of Support: A Device-Centric Analysis of Android Security Updates",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7189,
    "paper_ids": [
      4136
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Harun Oz",
    "display_name": "Harun Oz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "50 Shades of Support: A Device-Centric Analysis of Android Security Updates",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "røb ransomware over modern web browsers",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7190,
    "paper_ids": [
      4136
    ],
    "papers_without_artifact_ids": [
      4139
    ]
  },
  {
    "name": "Ahmet Aris",
    "display_name": "Ahmet Aris",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "50 Shades of Support: A Device-Centric Analysis of Android Security Updates",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "røb ransomware over modern web browsers",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7191,
    "paper_ids": [
      4136
    ],
    "papers_without_artifact_ids": [
      4139
    ]
  },
  {
    "name": "Gorka Abad",
    "display_name": "Gorka Abad",
    "affiliation": "Radboud University & Ikerlan Research Centre",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7192,
    "paper_ids": [
      3021
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Oguzhan Ersoy",
    "display_name": "Oguzhan Ersoy",
    "affiliation": "TU Delft",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7193,
    "paper_ids": [
      3021
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aitor Urbieta",
    "display_name": "Aitor Urbieta",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7194,
    "paper_ids": [
      3021
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Clement Fung",
    "display_name": "Clement Fung",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attributions for ML-based ICS Anomaly Detection: From Theory to Practice",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7195,
    "paper_ids": [
      2589
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Trevor Dunlap",
    "display_name": "Trevor Dunlap",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "UntrustIDE: Exploiting Weaknesses in VS Code Extensions",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diving into robocall content with snorcall",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7196,
    "paper_ids": [
      2265
    ],
    "papers_without_artifact_ids": [
      5380
    ]
  },
  {
    "name": "Levi Taiji Li",
    "display_name": "Levi Taiji Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VETEOS: Statically Vetting EOSIO Contracts for the \"Groundhog Day\" Vulnerabilities",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7197,
    "paper_ids": [
      4330
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ayomide Akinsanya",
    "display_name": "Ayomide Akinsanya",
    "affiliation": "Stevens Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Timing Channels in Adaptive Neural Networks",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7198,
    "paper_ids": [
      5826
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tegan Brennan",
    "display_name": "Tegan Brennan",
    "affiliation": "Stevens Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Timing Channels in Adaptive Neural Networks",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7199,
    "paper_ids": [
      5826
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Beomjin Jin",
    "display_name": "Beomjin Jin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sharing cyber threat intelligence: Does it really help?",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7200,
    "paper_ids": [
      1126
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hyunwoo Lee 0001",
    "display_name": "Hyunwoo Lee",
    "affiliation": "Boğaziçi University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sharing cyber threat intelligence: Does it really help?",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7201,
    "paper_ids": [
      1126
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gianluca Scopelliti",
    "display_name": "Gianluca Scopelliti",
    "affiliation": "Politecnico di Torino, Dromt",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient and Timely Revocation of V2X Credentials",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7202,
    "paper_ids": [
      3085
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christoph Baumann",
    "display_name": "Christoph Baumann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient and Timely Revocation of V2X Credentials",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7203,
    "paper_ids": [
      3085
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eddy Truyen",
    "display_name": "Eddy Truyen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient and Timely Revocation of V2X Credentials",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7204,
    "paper_ids": [
      3085
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zian Zhao",
    "display_name": "Zian Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7205,
    "paper_ids": [
      2567
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ran Mao",
    "display_name": "Ran Mao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7206,
    "paper_ids": [
      2567
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kohei Suenaga",
    "display_name": "Kohei Suenaga",
    "affiliation": "Kyoto University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7207,
    "paper_ids": [
      2567
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chitrabhanu Gupta",
    "display_name": "Chitrabhanu Gupta",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Private Aggregate Queries to Untrusted Databases",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7208,
    "paper_ids": [
      4080
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Warren Wnuck",
    "display_name": "Warren Wnuck",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Private Aggregate Queries to Untrusted Databases",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7209,
    "paper_ids": [
      4080
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Brijesh Vora",
    "display_name": "Brijesh Vora",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Private Aggregate Queries to Untrusted Databases",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7210,
    "paper_ids": [
      4080
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chen-Nee Chuah",
    "display_name": "Chen-Nee Chuah",
    "affiliation": "Univ. of California - Davis",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "ACSAC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Private Aggregate Queries to Untrusted Databases",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "differentially private map matching for mobility trajectories",
        "conference": "ACSAC",
        "year": 2022
      }
    ],
    "author_id": 7211,
    "paper_ids": [
      4080
    ],
    "papers_without_artifact_ids": [
      5827
    ]
  },
  {
    "name": "Tian Qiu",
    "display_name": "Tian Qiu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "ACSAC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pisces: Private and Compliable Cryptocurrency Exchange",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "can we leverage predictive uncertainty to detect dataset shift and adversarial examples in android malware detection",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 7212,
    "paper_ids": [
      3310
    ],
    "papers_without_artifact_ids": [
      5525
    ]
  },
  {
    "name": "Tarun Kumar Yadav",
    "display_name": "Tarun Kumar Yadav",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "USENIXSEC": {
        "2023": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Security and Usability Analysis of Local Attacks Against FIDO2",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "if i could do this i feel anyone could the design and evaluation of a secondary authentication factor manager",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "cryptographic deniability a multiperspective study of user perceptions and expectations",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7213,
    "paper_ids": [
      5828
    ],
    "papers_without_artifact_ids": [
      5139,
      5686
    ]
  },
  {
    "name": "Kent E. Seamons",
    "display_name": "Kent E. Seamons",
    "affiliation": "Brigham Young University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "NDSS": 1,
      "SC": 0,
      "ACSAC": 1,
      "USENIXSEC": 2,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "SC": {},
      "ACSAC": {
        "2019": 1
      },
      "USENIXSEC": {
        "2023": 2
      },
      "PETS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "A Security and Usability Analysis of Local Attacks Against FIDO2",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "if i could do this i feel anyone could the design and evaluation of a secondary authentication factor manager",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "cryptographic deniability a multiperspective study of user perceptions and expectations",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "leveraging locality of reference for certificate revocation",
        "conference": "ACSAC",
        "year": 2019
      }
    ],
    "author_id": 7214,
    "paper_ids": [
      5828
    ],
    "papers_without_artifact_ids": [
      5139,
      5686,
      5829
    ]
  },
  {
    "name": "Phillip A. Porras",
    "display_name": "Phillip A. Porras",
    "affiliation": "SRI International, Menlo Park, CA, USA",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 2,
      "USENIXSEC": 0,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "ACSAC": {
        "2019": 1,
        "2017": 1
      },
      "USENIXSEC": {},
      "PETS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "coordinated dataflow protection for ultrahigh bandwidth science networks",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "a securitymode for carriergrade sdn controllers",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 7215,
    "paper_ids": [
      386
    ],
    "papers_without_artifact_ids": [
      4240,
      4241
    ]
  },
  {
    "name": "Ashish Gehani",
    "display_name": "Ashish Gehani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "SC": 0,
      "ATC": 0,
      "ACSAC": 0,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      },
      "SC": {},
      "ATC": {},
      "ACSAC": {},
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards reproducible ransomware analysis",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "clarion sound and clear provenance tracking for microservice deployments",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 7216,
    "paper_ids": [
      386
    ],
    "papers_without_artifact_ids": [
      5659,
      4239
    ]
  },
  {
    "name": "Lian Gao",
    "display_name": "Lian Gao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7217,
    "paper_ids": [
      2275
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Moshe Levy",
    "display_name": "Moshe Levy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Transpose Attack: Stealing Datasets with Bidirectional Training",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7218,
    "paper_ids": [
      2441
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yue Xiao",
    "display_name": "Yue Xiao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7219,
    "paper_ids": [
      550
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaoli Zhang 0003",
    "display_name": "Xiaoli Zhang",
    "affiliation": "Zhejiang University of Technology, Department of Computer Science, Hangzhou, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7220,
    "paper_ids": [
      550
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Renjie Xie",
    "display_name": "Renjie Xie",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 2
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices",
        "conference": "NDSS",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lordma a new lowrate dos attack in rdma networks",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "rosetta enabling robust tls encrypted traffic classification in diverse network environments with tcpaware traffic augmentation",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7221,
    "paper_ids": [
      550
    ],
    "papers_without_artifact_ids": [
      4930,
      571
    ]
  },
  {
    "name": "Yue Xiao 0007",
    "display_name": "Yue Xiao",
    "affiliation": "College of William and Mary",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "NDSS": 2,
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 2
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 1,
        "2022": 1,
        "2021": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automated expansion of privacy data taxonomy for compliant data breach notification",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "ihunter hunting privacy violations at scale in the software supply chain on ios",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "lalaine measuring and characterizing noncompliance of apple privacy labels",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "osaware vulnerability prioritization via differential severity analysis",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "understanding malicious crosslibrary data harvesting on android",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 7222,
    "paper_ids": [
      2452
    ],
    "papers_without_artifact_ids": [
      3159,
      2454,
      2455,
      3161,
      612
    ]
  },
  {
    "name": "Dhilung Kirat",
    "display_name": "Dhilung Kirat",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 0,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {},
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7223,
    "paper_ids": [
      2452
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "He Shuang",
    "display_name": "He Shuang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Duumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7224,
    "paper_ids": [
      1688
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lianying Zhao",
    "display_name": "Lianying Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Duumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "racing for tls certificate validation a hijackers guide to the android tls galaxy",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 7225,
    "paper_ids": [
      1688
    ],
    "papers_without_artifact_ids": [
      5327
    ]
  },
  {
    "name": "Jing Shang",
    "display_name": "Jing Shang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7226,
    "paper_ids": [
      1424
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jian Wang 0015",
    "display_name": "Jian Wang",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7227,
    "paper_ids": [
      1424
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kailun Wang",
    "display_name": "Kailun Wang",
    "affiliation": "Washington State University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "siniel distributed privacypreserving zksnark",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 7228,
    "paper_ids": [
      1424
    ],
    "papers_without_artifact_ids": [
      4418
    ]
  },
  {
    "name": "Nan Jiang 0005",
    "display_name": "Nan Jiang",
    "affiliation": "Beijing University of Technology, Faculty of Information Technology, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7229,
    "paper_ids": [
      1424
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Md. Armanuzzaman",
    "display_name": "Md. Armanuzzaman",
    "affiliation": "University of Texas - El Paso",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7230,
    "paper_ids": [
      1424
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tim Recktenwald",
    "display_name": "Tim Recktenwald",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "YuraScanner: Leveraging LLMs for Task-driven Web App Scanning",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7231,
    "paper_ids": [
      2325
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gianluca De Stefano",
    "display_name": "Gianluca De Stefano",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "YuraScanner: Leveraging LLMs for Task-driven Web App Scanning",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7232,
    "paper_ids": [
      2325
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Soheil Khodayari",
    "display_name": "Soheil Khodayari",
    "affiliation": "CISPA Helmholtz Center for Information Security",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 2,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 2
      },
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "YuraScanner: Leveraging LLMs for Task-driven Web App Scanning",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "do not follow the white rabbit challenging the myth of harmless open redirection",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "jaw studying clientside csrf with hybrid property graphs and declarative traversals",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 7233,
    "paper_ids": [
      2325
    ],
    "papers_without_artifact_ids": [
      2326,
      2327
    ]
  },
  {
    "name": "Yuefeng Peng",
    "display_name": "Yuefeng Peng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Diffence: Fencing Membership Privacy With Diffusion Models",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7234,
    "paper_ids": [
      886
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ali Naseh",
    "display_name": "Ali Naseh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Diffence: Fencing Membership Privacy With Diffusion Models",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "backdooring bias b2 into stable diffusion models",
        "conference": "USENIXSEC",
        "year": 2025
      }
    ],
    "author_id": 7235,
    "paper_ids": [
      886
    ],
    "papers_without_artifact_ids": [
      889
    ]
  },
  {
    "name": "Shixin Song",
    "display_name": "Shixin Song",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Oreo: Protecting ASLR Against Microarchitectural Attacks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7236,
    "paper_ids": [
      4185
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dzung Pham 0002",
    "display_name": "Dzung Pham",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data Manipulation",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7237,
    "paper_ids": [
      887
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shreyas Kulkarni",
    "display_name": "Shreyas Kulkarni",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data Manipulation",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7238,
    "paper_ids": [
      887
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aditya Sirish A Yelgundhalli",
    "display_name": "Aditya Sirish A Yelgundhalli",
    "affiliation": "New York University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rethinking Trust in Forge-Based Git Security",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7239,
    "paper_ids": [
      3911
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andes Y. L. Kei",
    "display_name": "Andes Y. L. Kei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SHAFT: Secure, Handy, Accurate and Fast Transformer Inference",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7240,
    "paper_ids": [
      1723
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Huaibing Peng",
    "display_name": "Huaibing Peng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum!",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7241,
    "paper_ids": [
      1397
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hua Ma",
    "display_name": "Hua Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum!",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7242,
    "paper_ids": [
      1397
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rayne Holland",
    "display_name": "Rayne Holland",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum!",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the philosophers stone trojaning plugins of large language models",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 7243,
    "paper_ids": [
      1397
    ],
    "papers_without_artifact_ids": [
      1572
    ]
  },
  {
    "name": "Derek Abbott",
    "display_name": "Derek Abbott",
    "affiliation": "University of Adelaide",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum!",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7244,
    "paper_ids": [
      1397
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaochen Li",
    "display_name": "Xiaochen Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Delay-allowed Differentially Private Data Stream Release",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7245,
    "paper_ids": [
      303
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuya Feng",
    "display_name": "Shuya Feng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Delay-allowed Differentially Private Data Stream Release",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7246,
    "paper_ids": [
      303
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nuno Sabino",
    "display_name": "Nuno Sabino",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7247,
    "paper_ids": [
      3405
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Min-Chien Hsu",
    "display_name": "Min-Chien Hsu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7248,
    "paper_ids": [
      3405
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ruben Martins",
    "display_name": "Ruben Martins",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "NSDI": {
        "2021": 1,
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "towards provably performant congestion control",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "finding invariants of distributed systems its a small enough world after all",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 7249,
    "paper_ids": [
      3405
    ],
    "papers_without_artifact_ids": [
      5830,
      725
    ]
  },
  {
    "name": "Cheng Zhang 0035",
    "display_name": "Cheng Zhang",
    "affiliation": "Hunan University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MingledPie: A Cluster Mingling Approach for Mitigating Preference Profiling in CFL",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7250,
    "paper_ids": [
      3931
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yang Xu 0013",
    "display_name": "Yang Xu",
    "affiliation": "Hunan University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MingledPie: A Cluster Mingling Approach for Mitigating Preference Profiling in CFL",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7251,
    "paper_ids": [
      3931
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianghao Tan",
    "display_name": "Jianghao Tan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MingledPie: A Cluster Mingling Approach for Mitigating Preference Profiling in CFL",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7252,
    "paper_ids": [
      3931
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiajie An",
    "display_name": "Jiajie An",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MingledPie: A Cluster Mingling Approach for Mitigating Preference Profiling in CFL",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7253,
    "paper_ids": [
      3931
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eduardo Chielle",
    "display_name": "Eduardo Chielle",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Recurrent Private Set Intersection for Unbalanced Databases with Cuckoo Hashing and Leveled FHE",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7254,
    "paper_ids": [
      2517
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dung Thuy Nguyen",
    "display_name": "Dung Thuy Nguyen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PBP: Post-training Backdoor Purification for Malware Classifiers",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7255,
    "paper_ids": [
      5831
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ngoc N. Tran",
    "display_name": "Ngoc N. Tran",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PBP: Post-training Backdoor Purification for Malware Classifiers",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7256,
    "paper_ids": [
      5831
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Taylor T. Johnson",
    "display_name": "Taylor T. Johnson",
    "affiliation": "Vanderbilt University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PBP: Post-training Backdoor Purification for Malware Classifiers",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7257,
    "paper_ids": [
      5831
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kevin Leach",
    "display_name": "Kevin Leach",
    "affiliation": "Vanderbilt University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PBP: Post-training Backdoor Purification for Malware Classifiers",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cage complementing arm cca with gpu extensions",
        "conference": "NDSS",
        "year": 2024
      }
    ],
    "author_id": 7258,
    "paper_ids": [
      5831
    ],
    "papers_without_artifact_ids": [
      2154
    ]
  },
  {
    "name": "Zelun Kong",
    "display_name": "Zelun Kong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based Compartmentalization",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7259,
    "paper_ids": [
      176
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minkyung Park",
    "display_name": "Minkyung Park",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based Compartmentalization",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7260,
    "paper_ids": [
      176
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chung Hwan Kim",
    "display_name": "Chung Hwan Kim",
    "affiliation": "University of Texas at Dallas",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 2,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2019": 1,
        "2017": 1
      },
      "USENIXSEC": {
        "2020": 1,
        "2021": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based Compartmentalization",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pasan detecting peripheral access concurrency bugs within baremetal embedded applications",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "from control model to program investigating robotic aerial vehicle accidents with mayday",
        "conference": "USENIXSEC",
        "year": 2020
      },
      {
        "title": "progressive processing of systembehavioral query",
        "conference": "ACSAC",
        "year": 2019
      },
      {
        "title": "revarm a platformagnostic arm binary rewriter for security applications",
        "conference": "ACSAC",
        "year": 2017
      }
    ],
    "author_id": 7261,
    "paper_ids": [
      176
    ],
    "papers_without_artifact_ids": [
      4181,
      4182,
      5421,
      1454
    ]
  },
  {
    "name": "Kay Friedrich",
    "display_name": "Kay Friedrich",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7262,
    "paper_ids": [
      1245
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Niklas Busch",
    "display_name": "Niklas Busch",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cloudy with a chance of misconceptions exploring users perceptions and expectations of security and privacy in cloud office suites",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 7263,
    "paper_ids": [
      1245
    ],
    "papers_without_artifact_ids": [
      1257
    ]
  },
  {
    "name": "Chaoyu Zhang",
    "display_name": "Chaoyu Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7264,
    "paper_ids": [
      2291
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yi Shi 0001",
    "display_name": "Yi Shi",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7265,
    "paper_ids": [
      2291
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Giulia Scaffino",
    "display_name": "Giulia Scaffino",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Alba: The Dawn of Scalable Bridges for Blockchains",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "glimpse ondemand pow light client with constantsize storage for defi",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7266,
    "paper_ids": [
      2411
    ],
    "papers_without_artifact_ids": [
      2412
    ]
  },
  {
    "name": "Lukas Aumayr",
    "display_name": "Lukas Aumayr",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Alba: The Dawn of Scalable Bridges for Blockchains",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "glimpse ondemand pow light client with constantsize storage for defi",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "blitz secure multihop payments without twophase commits",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 7267,
    "paper_ids": [
      2411
    ],
    "papers_without_artifact_ids": [
      2412,
      2413
    ]
  },
  {
    "name": "Mahsa Bastankhah",
    "display_name": "Mahsa Bastankhah",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Alba: The Dawn of Scalable Bridges for Blockchains",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7268,
    "paper_ids": [
      2411
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zeta Avarikioti",
    "display_name": "Zeta Avarikioti",
    "affiliation": "TU Wien",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Alba: The Dawn of Scalable Bridges for Blockchains",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "thunderdome timelockfree rationallysecure virtual channels",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "glimpse ondemand pow light client with constantsize storage for defi",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7269,
    "paper_ids": [
      2411
    ],
    "papers_without_artifact_ids": [
      5485,
      2412
    ]
  },
  {
    "name": "Nicolas Badoux",
    "display_name": "Nicolas Badoux",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "type++: Prohibiting Type Confusion with Inline Type Information",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7270,
    "paper_ids": [
      17
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuseok Jeon",
    "display_name": "Yuseok Jeon",
    "affiliation": "Korea University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ATC": 0,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "ATC": {},
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "type++: Prohibiting Type Confusion with Inline Type Information",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "pspray timing sidechannel based linux kernel heap exploitation technique",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7271,
    "paper_ids": [
      17
    ],
    "papers_without_artifact_ids": [
      2768
    ]
  },
  {
    "name": "Jonathan Levin 0002",
    "display_name": "Jonathan Levin",
    "affiliation": "Academia Sinica, Taipei, Taiwan",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PQConnect: Automated Post-Quantum End-to-End Tunnels",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7272,
    "paper_ids": [
      437
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fabian Portner",
    "display_name": "Fabian Portner",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Starshields for iOS: Navigating the Security Cosmos in Satellite Communication",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7273,
    "paper_ids": [
      419
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Felix Rohrbach",
    "display_name": "Felix Rohrbach",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Starshields for iOS: Navigating the Security Cosmos in Satellite Communication",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "firmware insider bluetooth randomness is mostly random",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 7274,
    "paper_ids": [
      419
    ],
    "papers_without_artifact_ids": [
      427
    ]
  },
  {
    "name": "Angeliki Aktypi",
    "display_name": "Angeliki Aktypi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Iris: Dynamic Privacy Preserving Search in Authenticated Chord Peer-to-Peer Networks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7275,
    "paper_ids": [
      4091
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andi Liu",
    "display_name": "Andi Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7276,
    "paper_ids": [
      1134
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhuocheng Pan",
    "display_name": "Zhuocheng Pan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7277,
    "paper_ids": [
      1134
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yinuo Li",
    "display_name": "Yinuo Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7278,
    "paper_ids": [
      1134
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yangtao Deng",
    "display_name": "Yangtao Deng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "SOSP": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "SOSP": {},
      "NSDI": {
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "minder faulty machine detection for largescale distributed model training",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "starrynet empowering researchers to evaluate futuristic integrated space and terrestrial networks",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 7279,
    "paper_ids": [
      5832
    ],
    "papers_without_artifact_ids": [
      3668,
      5833
    ]
  },
  {
    "name": "Qian Wu 0001",
    "display_name": "Qian Wu",
    "affiliation": "University of Leeds",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "NSDI": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "democratizing directtocell low earth orbit satellite networks",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "starrynet empowering researchers to evaluate futuristic integrated space and terrestrial networks",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 7280,
    "paper_ids": [
      5832
    ],
    "papers_without_artifact_ids": [
      5834,
      5833
    ]
  },
  {
    "name": "Zeqi Lai",
    "display_name": "Zeqi Lai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "NSDI": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "democratizing directtocell low earth orbit satellite networks",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "starrynet empowering researchers to evaluate futuristic integrated space and terrestrial networks",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 7281,
    "paper_ids": [
      5832
    ],
    "papers_without_artifact_ids": [
      5834,
      5833
    ]
  },
  {
    "name": "Chenwei Gu",
    "display_name": "Chenwei Gu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7282,
    "paper_ids": [
      5832
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hewu Li",
    "display_name": "Hewu Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "NSDI": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "democratizing directtocell low earth orbit satellite networks",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "starrynet empowering researchers to evaluate futuristic integrated space and terrestrial networks",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 7283,
    "paper_ids": [
      5832
    ],
    "papers_without_artifact_ids": [
      5834,
      5833
    ]
  },
  {
    "name": "Yuanjie Li",
    "display_name": "Yuanjie Li",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "NDSS": 1,
      "NSDI": 4
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "NSDI": {
        "2021": 1,
        "2024": 1,
        "2023": 1,
        "2016": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "democratizing directtocell low earth orbit satellite networks",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "starrynet empowering researchers to evaluate futuristic integrated space and terrestrial networks",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "devicebased lte latency reduction at the application layer",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "icellular devicecustomized cellular network access on commodity smartphones",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 7284,
    "paper_ids": [
      5832
    ],
    "papers_without_artifact_ids": [
      5834,
      5833,
      4819,
      5835
    ]
  },
  {
    "name": "Jun Liu 0063",
    "display_name": "Jun Liu",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "NSDI": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "democratizing directtocell low earth orbit satellite networks",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "starrynet empowering researchers to evaluate futuristic integrated space and terrestrial networks",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 7285,
    "paper_ids": [
      5832
    ],
    "papers_without_artifact_ids": [
      5834,
      5833
    ]
  },
  {
    "name": "Linke Song",
    "display_name": "Linke Song",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The Road to Trust: Building Enclaves within Confidential VMs",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7286,
    "paper_ids": [
      602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benshan Mei",
    "display_name": "Benshan Mei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The Road to Trust: Building Enclaves within Confidential VMs",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7287,
    "paper_ids": [
      602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shijun Zhao",
    "display_name": "Shijun Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The Road to Trust: Building Enclaves within Confidential VMs",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7288,
    "paper_ids": [
      602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dan Meng 0002",
    "display_name": "Dan Meng",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 2
      },
      "ACSAC": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The Road to Trust: Building Enclaves within Confidential VMs",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "caspr contextaware security policy recommendation",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "guardspark finegrained purposeaware access control for secure data sharing and analysis in spark",
        "conference": "ACSAC",
        "year": 2020
      }
    ],
    "author_id": 7289,
    "paper_ids": [
      602
    ],
    "papers_without_artifact_ids": [
      5836,
      2245
    ]
  },
  {
    "name": "Rui Hou 0001",
    "display_name": "Rui Hou",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "NDSS": 3,
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 3
      },
      "CHES": {
        "2024": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The Road to Trust: Building Enclaves within Confidential VMs",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scrutinizer towards secure forensics on compromised trustzone",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "erwradar an adaptive detection system against evasive ransomware by contextual behavior detection and finegrained content analysis",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "elastic msm a fast elastic and modular preprocessing technique for multiscalar multiplication algorithm on gpus",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "faster ntrubased bootstrapping in less than 4 ms",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 7290,
    "paper_ids": [
      602
    ],
    "papers_without_artifact_ids": [
      776,
      5837,
      5838,
      5839
    ]
  },
  {
    "name": "Shaoke Xi",
    "display_name": "Shaoke Xi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MineShark: Cryptomining Traffic Detection at Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7291,
    "paper_ids": [
      304
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tianyi Fu",
    "display_name": "Tianyi Fu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MineShark: Cryptomining Traffic Detection at Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7292,
    "paper_ids": [
      304
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kai Bu",
    "display_name": "Kai Bu",
    "affiliation": "Zhejiang University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 2,
      "ACSAC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2024": 1,
        "2025": 1
      },
      "ACSAC": {
        "2018": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MineShark: Cryptomining Traffic Detection at Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "symphony path validation at scale",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "memcloak practical access obfuscation for untrusted memory",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 7293,
    "paper_ids": [
      304
    ],
    "papers_without_artifact_ids": [
      313,
      5455
    ]
  },
  {
    "name": "Chunling Yang",
    "display_name": "Chunling Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MineShark: Cryptomining Traffic Detection at Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7294,
    "paper_ids": [
      304
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhihua Chang",
    "display_name": "Zhihua Chang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MineShark: Cryptomining Traffic Detection at Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7295,
    "paper_ids": [
      304
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhou Ma",
    "display_name": "Zhou Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MineShark: Cryptomining Traffic Detection at Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7296,
    "paper_ids": [
      304
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chongjie Chen",
    "display_name": "Chongjie Chen",
    "affiliation": "Syracuse University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MineShark: Cryptomining Traffic Detection at Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7297,
    "paper_ids": [
      304
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yongsheng Shen",
    "display_name": "Yongsheng Shen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MineShark: Cryptomining Traffic Detection at Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7298,
    "paper_ids": [
      304
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Omar Alrawi",
    "display_name": "Omar Alrawi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "NDSS": 2,
      "ACSAC": 1,
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 2
      },
      "ACSAC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2023": 1,
        "2021": 2
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "evaluating machine learningbased iot device identification models for security applications",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "beyond the gates an empirical analysis of httpmanaged password stealers and operators",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "view from above exploring the malware ecosystem from the upper dns hierarchy",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "the circle of life a largescale study of the iot malware lifecycle",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "forecasting malware capabilities from cyber attack memory images",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 7299,
    "paper_ids": [
      1451
    ],
    "papers_without_artifact_ids": [
      5840,
      4927,
      4928,
      4925,
      1453
    ]
  },
  {
    "name": "Adrian Shuai Li",
    "display_name": "Adrian Shuai Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7300,
    "paper_ids": [
      1169
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arun Iyengar",
    "display_name": "Arun Iyengar",
    "affiliation": "IBM Research",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7301,
    "paper_ids": [
      1169
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Elijah Robert Bouma-Sims",
    "display_name": "Elijah Robert Bouma-Sims",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 3,
      "PETS": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2021": 1
      },
      "PETS": {
        "2024": 2
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Kids Are All Right: Investigating the Susceptibility of Teens and Adults to YouTube Giveaway Scams",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploring the privacy experiences of closeted users of online dating services in the us",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "crumbling cookie categories deconstructing common cookie categories to create categories that people understand",
        "conference": "PETS",
        "year": 2024
      },
      {
        "title": "it was honestly just gambling investigating the experiences of teenage cryptocurrency users on reddit",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "investigating web service account remediation advice",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "whos calling characterizing robocalls through audio and metadata analysis",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 7302,
    "paper_ids": [
      2501
    ],
    "papers_without_artifact_ids": [
      2504,
      5841,
      2506,
      2437,
      5381
    ]
  },
  {
    "name": "Lily Klucinec",
    "display_name": "Lily Klucinec",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Kids Are All Right: Investigating the Susceptibility of Teens and Adults to YouTube Giveaway Scams",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploring expandablegrid designs to make ios app privacy labels more usable",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 7303,
    "paper_ids": [
      2501
    ],
    "papers_without_artifact_ids": [
      2507
    ]
  },
  {
    "name": "Mandy Lanyon",
    "display_name": "Mandy Lanyon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Kids Are All Right: Investigating the Susceptibility of Teens and Adults to YouTube Giveaway Scams",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7304,
    "paper_ids": [
      2501
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Julie Downs",
    "display_name": "Julie Downs",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "The Kids Are All Right: Investigating the Susceptibility of Teens and Adults to YouTube Giveaway Scams",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7305,
    "paper_ids": [
      2501
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Myungsuk Moon",
    "display_name": "Myungsuk Moon",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environments",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7306,
    "paper_ids": [
      4215
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minhee Kim",
    "display_name": "Minhee Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environments",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7307,
    "paper_ids": [
      4215
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Joonkyo Jung",
    "display_name": "Joonkyo Jung",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environments",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "moneta exvivo gpu driver fuzzing by recalling invivo execution states",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 7308,
    "paper_ids": [
      4215
    ],
    "papers_without_artifact_ids": [
      3784
    ]
  },
  {
    "name": "Kyle Domico",
    "display_name": "Kyle Domico",
    "affiliation": "University of Wisconsin-Madison",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Secure IP Address Allocation at Cloud Scale",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7309,
    "paper_ids": [
      3038
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matteo Leonelli",
    "display_name": "Matteo Leonelli",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7310,
    "paper_ids": [
      111
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Addison Crump",
    "display_name": "Addison Crump",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "thehuzz instruction fuzzing of processors using goldenreference models for finding softwareexploitable vulnerabilities",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 7311,
    "paper_ids": [
      111
    ],
    "papers_without_artifact_ids": [
      2317
    ]
  },
  {
    "name": "Meng Wang",
    "display_name": "Meng Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 2,
      "SC": 0,
      "ATC": 0,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 2
      },
      "SC": {},
      "ATC": {},
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a comprehensive memory safety analysis of bootloaders",
        "conference": "NDSS",
        "year": 2025
      },
      {
        "title": "exploring covert thirdparty identifiers through external storage in the android new era",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 7312,
    "paper_ids": [
      111
    ],
    "papers_without_artifact_ids": [
      112,
      4349
    ]
  },
  {
    "name": "Florian Bauckholt",
    "display_name": "Florian Bauckholt",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7313,
    "paper_ids": [
      111
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tyler Tucker",
    "display_name": "Tyler Tucker",
    "affiliation": "University of Florida",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sok towards a unified approach to applied replicability for computer security",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "sok the good the bad and the unbalanced measuring structural limitations of deepfake media datasets",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 7314,
    "paper_ids": [
      1227
    ],
    "papers_without_artifact_ids": [
      2212,
      2213
    ]
  },
  {
    "name": "Nathaniel Bennett",
    "display_name": "Nathaniel Bennett",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7315,
    "paper_ids": [
      1227
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martin Kotuliak",
    "display_name": "Martin Kotuliak",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2021": 1
      },
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "glados locationaware denialofservice of cellular networks",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "ltrack stealthy tracking of mobile phones in lte",
        "conference": "USENIXSEC",
        "year": 2022
      },
      {
        "title": "security of multicarrier timeofflight ranging",
        "conference": "ACSAC",
        "year": 2021
      }
    ],
    "author_id": 7316,
    "paper_ids": [
      1227
    ],
    "papers_without_artifact_ids": [
      1228,
      1233,
      1234
    ]
  },
  {
    "name": "Simon Erni",
    "display_name": "Simon Erni",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "glados locationaware denialofservice of cellular networks",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "ltrack stealthy tracking of mobile phones in lte",
        "conference": "USENIXSEC",
        "year": 2022
      }
    ],
    "author_id": 7317,
    "paper_ids": [
      1227
    ],
    "papers_without_artifact_ids": [
      1228,
      1233
    ]
  },
  {
    "name": "Aydin Abadi",
    "display_name": "Aydin Abadi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7318,
    "paper_ids": [
      4060
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sumanta Sarkar",
    "display_name": "Sumanta Sarkar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "CHES": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "low tracecount template attacks on 32bit implementations of ascon aead",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 7319,
    "paper_ids": [
      4060
    ],
    "papers_without_artifact_ids": [
      5241
    ]
  },
  {
    "name": "Xiangzhe Xu",
    "display_name": "Xiangzhe Xu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "extracting protocol format as state machine via controlled static loop analysis",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7320,
    "paper_ids": [
      4453
    ],
    "papers_without_artifact_ids": [
      4459
    ]
  },
  {
    "name": "Zhuo Zhang 0002",
    "display_name": "Zhuo Zhang",
    "affiliation": "Columbia University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 1,
      "USENIXSEC": 3
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploring inherent backdoors in deep learning models",
        "conference": "ACSAC",
        "year": 2024
      },
      {
        "title": "costeffective attack forensics by recording and correlating file system changes",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "pelican exploiting backdoors of naturally trained deep learning models in binary code analysis",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "your exploit is mine instantly synthesizing counterattack smart contract",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7321,
    "paper_ids": [
      4453
    ],
    "papers_without_artifact_ids": [
      4454,
      4457,
      4458,
      393
    ]
  },
  {
    "name": "Ziyang Huang 0004",
    "display_name": "Ziyang Huang",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7322,
    "paper_ids": [
      4453
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shiwei Feng 0002",
    "display_name": "Shiwei Feng",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7323,
    "paper_ids": [
      4453
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yapeng Ye",
    "display_name": "Yapeng Ye",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "costeffective attack forensics by recording and correlating file system changes",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "pelican exploiting backdoors of naturally trained deep learning models in binary code analysis",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7324,
    "paper_ids": [
      4453
    ],
    "papers_without_artifact_ids": [
      4457,
      4458
    ]
  },
  {
    "name": "Nan Jiang 0012",
    "display_name": "Nan Jiang",
    "affiliation": "University of Texas - El Paso",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7325,
    "paper_ids": [
      4453
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Danning Xie",
    "display_name": "Danning Xie",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7326,
    "paper_ids": [
      4453
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lin Tan 0001",
    "display_name": "Lin Tan",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1,
      "SOSP": 0,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "SOSP": {},
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7327,
    "paper_ids": [
      4453
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jia-Ju Bai",
    "display_name": "Jia-Ju Bai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "NDSS": 1,
      "EUROSYS": 1,
      "ATC": 1,
      "USENIXSEC": 4
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {
        "2022": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2020": 1,
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "besa extending bugs triggered by runtime testing via static analysis",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "lrminer static race detection in os kernels by mining locking rules",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "dynsql stateful fuzzing for database management systems with complex and valid sql query generation",
        "conference": "USENIXSEC",
        "year": 2023
      },
      {
        "title": "dlos effective static detection of deadlocks in os kernels",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "static detection of unsafe dma accesses in device drivers",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "fuzzing error handling code using contextsensitive software fault injection",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 7328,
    "paper_ids": [
      648
    ],
    "papers_without_artifact_ids": [
      5842,
      5843,
      1033,
      5844,
      3964,
      3432
    ]
  },
  {
    "name": "Ming Zhao",
    "display_name": "Ming Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "FAST": {
        "2015": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how much can data compressibility help to improve nand flash memory lifetime",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 7329,
    "paper_ids": [
      648
    ],
    "papers_without_artifact_ids": [
      5845
    ]
  },
  {
    "name": "Ruyi Ding",
    "display_name": "Ruyi Ding",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1,
      "CHES": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "CHES": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7330,
    "paper_ids": [
      4507
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tong Zhou 0002",
    "display_name": "Tong Zhou",
    "affiliation": "Nanjing University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7331,
    "paper_ids": [
      4507
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lili Su",
    "display_name": "Lili Su",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7332,
    "paper_ids": [
      4507
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aidong Adam Ding",
    "display_name": "Aidong Adam Ding",
    "affiliation": "Northeastern University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7333,
    "paper_ids": [
      4507
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaolin Xu 0001",
    "display_name": "Xiaolin Xu",
    "affiliation": "Southeast University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "CHES": 0,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "CHES": {},
      "USENIXSEC": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "deepdup an adversarial weight duplication attack framework to crush deep neural network in multitenant fpga",
        "conference": "USENIXSEC",
        "year": 2021
      }
    ],
    "author_id": 7334,
    "paper_ids": [
      4507
    ],
    "papers_without_artifact_ids": [
      5476
    ]
  },
  {
    "name": "Haotian Zhu",
    "display_name": "Haotian Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7335,
    "paper_ids": [
      1571
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuchao Pang",
    "display_name": "Shuchao Pang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dppromise differentially private diffusion probabilistic models for image synthesis",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 7336,
    "paper_ids": [
      1571
    ],
    "papers_without_artifact_ids": [
      1577
    ]
  },
  {
    "name": "Yongbin Zhou",
    "display_name": "Yongbin Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "CHES": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "CHES": {
        "2021": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dppromise differentially private diffusion probabilistic models for image synthesis",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "revealing the weakness of addition chain based masked sbox implementations",
        "conference": "CHES",
        "year": 2021
      }
    ],
    "author_id": 7337,
    "paper_ids": [
      1571
    ],
    "papers_without_artifact_ids": [
      1577,
      5191
    ]
  },
  {
    "name": "Yichen Gong",
    "display_name": "Yichen Gong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Safety Misalignment Against Large Language Models",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7338,
    "paper_ids": [
      3371
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Delong Ran",
    "display_name": "Delong Ran",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Safety Misalignment Against Large Language Models",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7339,
    "paper_ids": [
      3371
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anyu Wang 0001",
    "display_name": "Anyu Wang",
    "affiliation": "University of Kentucky",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "CHES": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "CHES": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Safety Misalignment Against Large Language Models",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fast and accurate efficient fulldomain functional bootstrap and digit decomposition for homomorphic computation",
        "conference": "CHES",
        "year": 2024
      }
    ],
    "author_id": 7340,
    "paper_ids": [
      3371
    ],
    "papers_without_artifact_ids": [
      5846
    ]
  },
  {
    "name": "Xiaoyun Wang 0001",
    "display_name": "Xiaoyun Wang",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "NDSS": 1,
      "EUROSYS": 1,
      "CHES": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "CHES": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Safety Misalignment Against Large Language Models",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fast and accurate efficient fulldomain functional bootstrap and digit decomposition for homomorphic computation",
        "conference": "CHES",
        "year": 2024
      },
      {
        "title": "dashing and star byzantine fault tolerance with weak certificates",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "automatic search of meetinthemiddle differential fault analysis on aeslike ciphers",
        "conference": "CHES",
        "year": 2023
      }
    ],
    "author_id": 7341,
    "paper_ids": [
      3371
    ],
    "papers_without_artifact_ids": [
      5846,
      3191,
      5583
    ]
  },
  {
    "name": "Hao Yu 0017",
    "display_name": "Hao Yu",
    "affiliation": "Maynooth University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7342,
    "paper_ids": [
      4364
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chuan Ma 0001",
    "display_name": "Chuan Ma",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 2
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "impact tracing identifying the culprit of misinformation in encrypted messaging systems",
        "conference": "NDSS",
        "year": 2025
      }
    ],
    "author_id": 7343,
    "paper_ids": [
      4364
    ],
    "papers_without_artifact_ids": [
      4365
    ]
  },
  {
    "name": "Xinhang Wan",
    "display_name": "Xinhang Wan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7344,
    "paper_ids": [
      4364
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jun Wang 0118",
    "display_name": "Jun Wang",
    "affiliation": "China University of Geosciences, School of Computer Science, Wuhan, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7345,
    "paper_ids": [
      4364
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Meng Shen 0001",
    "display_name": "Meng Shen",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "transferability of whitebox perturbations queryefficient adversarial attacks against commercial dnn services",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "subverting website fingerprinting defenses with robust traffic representation",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7346,
    "paper_ids": [
      4364
    ],
    "papers_without_artifact_ids": [
      564,
      573
    ]
  },
  {
    "name": "Xinwang Liu 0002",
    "display_name": "Xinwang Liu",
    "affiliation": "National University of Defense Technology (NUDT), School of Computer, Changsha, China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7347,
    "paper_ids": [
      4364
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Liam Wachter",
    "display_name": "Liam Wachter",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7348,
    "paper_ids": [
      18
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Julian Gremminger",
    "display_name": "Julian Gremminger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7349,
    "paper_ids": [
      18
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Maximilian von Tschirschnitz",
    "display_name": "Maximilian von Tschirschnitz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rediscovering Method Confusion in Proposed Security Fixes for Bluetooth",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7350,
    "paper_ids": [
      3999
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ludwig Peuckert",
    "display_name": "Ludwig Peuckert",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rediscovering Method Confusion in Proposed Security Fixes for Bluetooth",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7351,
    "paper_ids": [
      3999
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Moritz Buhl",
    "display_name": "Moritz Buhl",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rediscovering Method Confusion in Proposed Security Fixes for Bluetooth",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7352,
    "paper_ids": [
      3999
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thomas Steinbauer",
    "display_name": "Thomas Steinbauer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "KernelSnitch: Side Channel-Attacks on Kernel Data Structures",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7353,
    "paper_ids": [
      276
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hithem Lamri",
    "display_name": "Hithem Lamri",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ICSQuartz: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial Control Systems",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7354,
    "paper_ids": [
      2518
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jin Yao",
    "display_name": "Jin Yao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TrajDeleter: Enabling Trajectory Forgetting in Offline Reinforcement Learning Agents",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7355,
    "paper_ids": [
      898
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuguang Wang",
    "display_name": "Shuguang Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "SOSP": 0,
      "NSDI": 1,
      "OSDI": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "SOSP": {},
      "NSDI": {
        "2025": 1
      },
      "OSDI": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Interventional Root Cause Analysis of Failures in Multi-Sensor Fusion Perception Systems",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "minder faulty machine detection for largescale distributed model training",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 1842,
    "paper_ids": [
      5847
    ],
    "papers_without_artifact_ids": [
      3668
    ]
  },
  {
    "name": "Qian Zhou",
    "display_name": "Qian Zhou",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Interventional Root Cause Analysis of Failures in Multi-Sensor Fusion Perception Systems",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7356,
    "paper_ids": [
      5847
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kui Wu 0001",
    "display_name": "Kui Wu",
    "affiliation": "University of Victoria",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Interventional Root Cause Analysis of Failures in Multi-Sensor Fusion Perception Systems",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7357,
    "paper_ids": [
      5847
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jinghuai Deng",
    "display_name": "Jinghuai Deng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Interventional Root Cause Analysis of Failures in Multi-Sensor Fusion Perception Systems",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7358,
    "paper_ids": [
      5847
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dapeng Wu 0001",
    "display_name": "Dapeng Wu",
    "affiliation": "City University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Interventional Root Cause Analysis of Failures in Multi-Sensor Fusion Perception Systems",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "passengers safety matters experiences of deploying a largescale indoor delivery monitoring system",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 7359,
    "paper_ids": [
      5847
    ],
    "papers_without_artifact_ids": [
      4699
    ]
  },
  {
    "name": "Wei-Bin Lee",
    "display_name": "Wei-Bin Lee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Interventional Root Cause Analysis of Failures in Multi-Sensor Fusion Perception Systems",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a first physicalworld trajectory prediction attack via lidarinduced deceptions in autonomous driving",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 7360,
    "paper_ids": [
      5847
    ],
    "papers_without_artifact_ids": [
      5848
    ]
  },
  {
    "name": "Jianping Wang 0001",
    "display_name": "Jianping Wang",
    "affiliation": "City University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ATC": 0,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "ATC": {},
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Interventional Root Cause Analysis of Failures in Multi-Sensor Fusion Perception Systems",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a first physicalworld trajectory prediction attack via lidarinduced deceptions in autonomous driving",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 7361,
    "paper_ids": [
      5847
    ],
    "papers_without_artifact_ids": [
      5848
    ]
  },
  {
    "name": "Xiangyu Guo",
    "display_name": "Xiangyu Guo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EvoCrawl: Exploring Web Application Code and State using Evolutionary Search",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7362,
    "paper_ids": [
      1689
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Akshay Kawlay",
    "display_name": "Akshay Kawlay",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EvoCrawl: Exploring Web Application Code and State using Evolutionary Search",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7363,
    "paper_ids": [
      1689
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eric Liu",
    "display_name": "Eric Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1,
      "ACSAC": 0
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      },
      "ACSAC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "EvoCrawl: Exploring Web Application Code and State using Evolutionary Search",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7364,
    "paper_ids": [
      1689
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yutong Wu 0009",
    "display_name": "Yutong Wu",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "THEMIS: Regulating Textual Inversion for Personalized Concept Censorship",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7365,
    "paper_ids": [
      735
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jie Zhang 0002",
    "display_name": "Jie Zhang",
    "affiliation": "Nanyang Technological University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "THEMIS: Regulating Textual Inversion for Personalized Concept Censorship",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7366,
    "paper_ids": [
      735
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Christian van Sloun",
    "display_name": "Christian van Sloun",
    "affiliation": "RWTH Aachen University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7367,
    "paper_ids": [
      3090
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vincent Woeste",
    "display_name": "Vincent Woeste",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "NDSS": {
        "2025": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "security",
    "conferences": [
      "NDSS"
    ],
    "years": [
      2025
    ],
    "year_range": "2025-2025",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach",
        "conference": "NDSS",
        "year": 2025,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "security",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7368,
    "paper_ids": [
      3090
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mingen Pan",
    "display_name": "Mingen Pan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Privacy Budget Scheduling",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7369,
    "paper_ids": [
      1354
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shaghayegh Mardani",
    "display_name": "Shaghayegh Mardani",
    "affiliation": "University of Texas at Austin",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Horcrux: Automatic JavaScript Parallelism for Resource-Efficient Web Computation",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "fawkes faster mobile page loads via appinspired static templating",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 7370,
    "paper_ids": [
      2609
    ],
    "papers_without_artifact_ids": [
      2627
    ]
  },
  {
    "name": "Ronny Ko",
    "display_name": "Ronny Ko",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "NSDI": {
        "2021": 1,
        "2019": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Horcrux: Automatic JavaScript Parallelism for Resource-Efficient Web Computation",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oblique accelerating page loads using symbolic execution",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "riverbed enforcing userdefined privacy constraints in distributed web services",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 7371,
    "paper_ids": [
      2609
    ],
    "papers_without_artifact_ids": [
      2626,
      5849
    ]
  },
  {
    "name": "Gushu Li",
    "display_name": "Gushu Li",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GNNAdvisor: An Adaptive and Efficient Runtime System for GNN Acceleration on GPUs",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7372,
    "paper_ids": [
      1677
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuangchen Li",
    "display_name": "Shuangchen Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GNNAdvisor: An Adaptive and Efficient Runtime System for GNN Acceleration on GPUs",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7373,
    "paper_ids": [
      1677
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lei Deng 0003",
    "display_name": "Lei Deng",
    "affiliation": "HKUST",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "GNNAdvisor: An Adaptive and Efficient Runtime System for GNN Acceleration on GPUs",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7374,
    "paper_ids": [
      1677
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuanzhi Li",
    "display_name": "Yuanzhi Li",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PET: Optimizing Tensor Programs with Partially Equivalent Transformations and Automated Corrections",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7375,
    "paper_ids": [
      1616
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kaiyuan Rong",
    "display_name": "Kaiyuan Rong",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PET: Optimizing Tensor Programs with Partially Equivalent Transformations and Automated Corrections",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7376,
    "paper_ids": [
      1616
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuanyong Chen",
    "display_name": "Yuanyong Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PET: Optimizing Tensor Programs with Partially Equivalent Transformations and Automated Corrections",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7377,
    "paper_ids": [
      1616
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lukas Burkhalter",
    "display_name": "Lukas Burkhalter",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "USENIXSEC": {
        "2020": 1
      },
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Zeph: Cryptographic Enforcement of End-to-End Data Privacy",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "timecrypt encrypted data stream processing at scale with cryptographic access control",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "droplet decentralized authorization and access control for encrypted data streams",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 7378,
    "paper_ids": [
      2459
    ],
    "papers_without_artifact_ids": [
      2460,
      2461
    ]
  },
  {
    "name": "Hossein Shafagh",
    "display_name": "Hossein Shafagh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "USENIXSEC": {
        "2020": 1
      },
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Zeph: Cryptographic Enforcement of End-to-End Data Privacy",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "timecrypt encrypted data stream processing at scale with cryptographic access control",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "droplet decentralized authorization and access control for encrypted data streams",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 7379,
    "paper_ids": [
      2459
    ],
    "papers_without_artifact_ids": [
      2460,
      2461
    ]
  },
  {
    "name": "Fan Lai 0001",
    "display_name": "Fan Lai",
    "affiliation": "Univ. of Illinois at Urbana-Champaign",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 0,
      "EUROSYS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2023": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2023": 1
      },
      "NSDI": {
        "2023": 1,
        "2020": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Oort: Efficient Federated Learning via Guided Participant Selection",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "egeria efficient dnn training with knowledgeguided layer freezing",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "modelkeeper accelerating dnn training via automated training warmup",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "adaembed adaptive embedding for largescale recommendation models",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "sol fast distributed computation over slow networks",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 7380,
    "paper_ids": [
      1947
    ],
    "papers_without_artifact_ids": [
      1949,
      1951,
      1952,
      1954
    ]
  },
  {
    "name": "Xiangfeng Zhu",
    "display_name": "Xiangfeng Zhu",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "NSDI": {
        "2025": 1,
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Oort: Efficient Federated Learning via Guided Participant Selection",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "highlevel programming for application networks",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "sol fast distributed computation over slow networks",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 7381,
    "paper_ids": [
      1947
    ],
    "papers_without_artifact_ids": [
      2116,
      1954
    ]
  },
  {
    "name": "Jooyoung Song",
    "display_name": "Jooyoung Song",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Modernizing File System through In-Storage Indexing",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7382,
    "paper_ids": [
      2074
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu Luo 0006",
    "display_name": "Yu Luo",
    "affiliation": "Jilin University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 3,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2022": 1,
        "2024": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "CLP: Efficient and Scalable Search on Compressed Text Logs",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "μslope high compression and fast search on semistructured logs",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "hubble performance debugging with inproduction justintime method tracing on android",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 7383,
    "paper_ids": [
      1633
    ],
    "papers_without_artifact_ids": [
      1634,
      1636
    ]
  },
  {
    "name": "Nico Lehmann",
    "display_name": "Nico Lehmann",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STORM: Refinement Types for Secure Web Applications",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7384,
    "paper_ids": [
      3198
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rose Kunkel",
    "display_name": "Rose Kunkel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STORM: Refinement Types for Secure Web Applications",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7385,
    "paper_ids": [
      3198
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jordan Brown",
    "display_name": "Jordan Brown",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STORM: Refinement Types for Secure Web Applications",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7386,
    "paper_ids": [
      3198
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jean Yang 0001",
    "display_name": "Jean Yang",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STORM: Refinement Types for Secure Web Applications",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7387,
    "paper_ids": [
      3198
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Niki Vazou",
    "display_name": "Niki Vazou",
    "affiliation": "IMDEA Software Institute",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STORM: Refinement Types for Secure Web Applications",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7388,
    "paper_ids": [
      3198
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nadia Polikarpova",
    "display_name": "Nadia Polikarpova",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STORM: Refinement Types for Secure Web Applications",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7389,
    "paper_ids": [
      3198
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ranjit Jhala",
    "display_name": "Ranjit Jhala",
    "affiliation": "Univ. of California - San Diego",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1,
      "USENIXSEC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "SOSP": {
        "2024": 1
      },
      "USENIXSEC": {},
      "NSDI": {
        "2007": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "STORM: Refinement Types for Secure Web Applications",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "icarus trustworthy justintime compilers with symbolic metaexecution",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "life death and the critical transition finding liveness bugs in systems code awarded best paper",
        "conference": "NSDI",
        "year": 2007
      }
    ],
    "author_id": 7390,
    "paper_ids": [
      3198
    ],
    "papers_without_artifact_ids": [
      3199,
      5850
    ]
  },
  {
    "name": "Henry Xu",
    "display_name": "Henry Xu",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Marius: Learning Massive Graph Embeddings on a Single Machine",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7391,
    "paper_ids": [
      1309
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stephen Ibanez",
    "display_name": "Stephen Ibanez",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The nanoPU: A Nanosecond Network Stack for Datacenters",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7392,
    "paper_ids": [
      3562
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alex Mallery",
    "display_name": "Alex Mallery",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The nanoPU: A Nanosecond Network Stack for Datacenters",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7393,
    "paper_ids": [
      3562
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Serhat Arslan",
    "display_name": "Serhat Arslan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The nanoPU: A Nanosecond Network Stack for Datacenters",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bolt subrtt congestion control for ultralow latency",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 7394,
    "paper_ids": [
      3562
    ],
    "papers_without_artifact_ids": [
      5851
    ]
  },
  {
    "name": "Theo Jepsen",
    "display_name": "Theo Jepsen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The nanoPU: A Nanosecond Network Stack for Datacenters",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7395,
    "paper_ids": [
      3562
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Changhoon Kim",
    "display_name": "Changhoon Kim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 12,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "ATC": 0,
      "FAST": 1,
      "USENIXSEC": 1,
      "NSDI": 9
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "SOSP": {},
      "ATC": {},
      "FAST": {
        "2019": 1
      },
      "USENIXSEC": {
        "2021": 1
      },
      "NSDI": {
        "2021": 1,
        "2013": 2,
        "2016": 1,
        "2020": 1,
        "2022": 1,
        "2018": 1,
        "2011": 2
      }
    },
    "artifact_rate": 8.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The nanoPU: A Nanosecond Network Stack for Datacenters",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bluebird highperformance sdn for baremetal cloud services",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "scaling distributed machine learning with innetwork aggregation",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "jaqen a highperformance switchnative approach for detecting and mitigating volumetric ddos attacks with programmable switches",
        "conference": "USENIXSEC",
        "year": 2021
      },
      {
        "title": "programmable calendar queues for highspeed packet scheduling",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "distcache provable load balancing for largescale storage systems with distributed caching",
        "conference": "FAST",
        "year": 2019
      },
      {
        "title": "netchain scalefree subrtt coordination",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "flowradar a better netflow for data centers",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "eyeq practical network performance isolation at the edge",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "chatty tenants and the cloud network sharing problem",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "sharing the data center network",
        "conference": "NSDI",
        "year": 2011
      },
      {
        "title": "profiling network performance for multitier data center applications",
        "conference": "NSDI",
        "year": 2011
      }
    ],
    "author_id": 7396,
    "paper_ids": [
      3562
    ],
    "papers_without_artifact_ids": [
      5852,
      1653,
      1012,
      4623,
      495,
      498,
      5061,
      3763,
      4780,
      4693,
      3182
    ]
  },
  {
    "name": "Nick McKeown",
    "display_name": "Nick McKeown",
    "affiliation": "Stanford University",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 0,
      "NSDI": 6
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "USENIXSEC": {},
      "NSDI": {
        "2013": 1,
        "2014": 2,
        "2010": 1,
        "2012": 1,
        "2015": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "The nanoPU: A Nanosecond Network Stack for Datacenters",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "compiling packet programs to reconfigurable switches",
        "conference": "NSDI",
        "year": 2015
      },
      {
        "title": "i know what your packet did last hop using packet histories to troubleshoot networks",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "libra divide and conquer to verify forwarding tables in huge networks",
        "conference": "NSDI",
        "year": 2014
      },
      {
        "title": "real time network policy checking using header space analysis",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "header space analysis static checking for networks",
        "conference": "NSDI",
        "year": 2012
      },
      {
        "title": "elastictree saving energy in data center networks",
        "conference": "NSDI",
        "year": 2010
      }
    ],
    "author_id": 7397,
    "paper_ids": [
      3562
    ],
    "papers_without_artifact_ids": [
      5853,
      4613,
      5854,
      5855,
      5856,
      5857
    ]
  },
  {
    "name": "Jaehyun Hwang",
    "display_name": "Jaehyun Hwang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "FAST": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "FAST": {
        "2026": 1
      },
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rearchitecting Linux Storage Stack for µs Latency and High Throughput",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lockify understanding linux distributed lock management overheads in shared storage",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "tcp rdma cpuefficient remote storage access with i10",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 8163,
    "paper_ids": [
      1367
    ],
    "papers_without_artifact_ids": [
      5858,
      2759
    ]
  },
  {
    "name": "John Thorpe",
    "display_name": "John Thorpe",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {},
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "bamboo making preemptible instances resilient for affordable training of large dnns",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 7398,
    "paper_ids": [
      1617
    ],
    "papers_without_artifact_ids": [
      1621
    ]
  },
  {
    "name": "Shen Teng",
    "display_name": "Shen Teng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7399,
    "paper_ids": [
      1617
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guanzhou Hu",
    "display_name": "Guanzhou Hu",
    "affiliation": "University of Wisconsin-Madison",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "SC": {},
      "FAST": {
        "2021": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "madfs perfile virtualization for userspace persistent memory filesystems",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "the storage hierarchy is not a hierarchy optimizing caching on modern storage devices with orthus",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 7400,
    "paper_ids": [
      1617
    ],
    "papers_without_artifact_ids": [
      2016,
      1645
    ]
  },
  {
    "name": "Jinliang Wei",
    "display_name": "Jinliang Wei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Dorylus: Affordable, Scalable, and Accurate GNN Training with Distributed CPU Servers and Serverless Threads",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7401,
    "paper_ids": [
      1617
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Erhu Feng",
    "display_name": "Erhu Feng",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scalable Memory Protection in the PENGLAI Enclave",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7402,
    "paper_ids": [
      41
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xu Lu",
    "display_name": "Xu Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scalable Memory Protection in the PENGLAI Enclave",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7403,
    "paper_ids": [
      41
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dong Du 0003",
    "display_name": "Dong Du",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 0,
      "ATC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2024": 1
      },
      "SOSP": {},
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2026": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scalable Memory Protection in the PENGLAI Enclave",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sharpen the spec cut the code a case for generative file system with sysspec",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "harmonizing efficiency and practicability optimizing resource utilization in serverless computing with jiagu",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "using dynamically layered definite releases for verifying the reffs file system",
        "conference": "OSDI",
        "year": 2024
      }
    ],
    "author_id": 7404,
    "paper_ids": [
      41
    ],
    "papers_without_artifact_ids": [
      49,
      53,
      57
    ]
  },
  {
    "name": "Bicheng Yang",
    "display_name": "Bicheng Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scalable Memory Protection in the PENGLAI Enclave",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7405,
    "paper_ids": [
      41
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xueqiang Jiang",
    "display_name": "Xueqiang Jiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Scalable Memory Protection in the PENGLAI Enclave",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7406,
    "paper_ids": [
      41
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sam Kumar",
    "display_name": "Sam Kumar",
    "affiliation": "Univ. of California - Los Angeles",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 0,
      "NSDI": 4
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "USENIXSEC": {},
      "NSDI": {
        "2025": 1,
        "2023": 1,
        "2020": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MAGE: Nearly Zero-Cost Virtual Memory for Secure Computation",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "highlevel programming for application networks",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "skyplane optimizing transfer cost and throughput using cloudaware overlays",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "performant tcp for lowpower wireless networks",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "ghostor toward a secure datasharing system from decentralized trust",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 7407,
    "paper_ids": [
      671
    ],
    "papers_without_artifact_ids": [
      2116,
      481,
      5859,
      676
    ]
  },
  {
    "name": "David E. Culler",
    "display_name": "David E. Culler",
    "affiliation": "Google Inc., USA",
    "artifact_count": 1,
    "total_papers": 11,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 1,
      "SC": 0,
      "ATC": 0,
      "FAST": 1,
      "USENIXSEC": 0,
      "NSDI": 7
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2022": 1
      },
      "SOSP": {
        "2023": 1
      },
      "SC": {},
      "ATC": {},
      "FAST": {
        "2016": 1
      },
      "USENIXSEC": {},
      "NSDI": {
        "2013": 1,
        "2020": 1,
        "2005": 2,
        "2004": 3
      }
    },
    "artifact_rate": 9.1,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MAGE: Nearly Zero-Cost Virtual Memory for Secure Computation",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "a cloudscale characterization of remote procedure calls",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "carbink faulttolerant far memory",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "performant tcp for lowpower wireless networks",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "btrdb optimizing storage system design for timeseries processing",
        "conference": "FAST",
        "year": 2016
      },
      {
        "title": "boss building operating system services",
        "conference": "NSDI",
        "year": 2013
      },
      {
        "title": "beacon vector routing scalable pointtopoint routing in wireless sensornets",
        "conference": "NSDI",
        "year": 2005
      },
      {
        "title": "active sensor networks",
        "conference": "NSDI",
        "year": 2005
      },
      {
        "title": "the emergence of networking abstractions and techniques in tinyos",
        "conference": "NSDI",
        "year": 2004
      },
      {
        "title": "trickle a selfregulating algorithm for code propagation and maintenance in wireless sensor networks awarded best paper",
        "conference": "NSDI",
        "year": 2004
      },
      {
        "title": "operating systems support for planetaryscale network services",
        "conference": "NSDI",
        "year": 2004
      }
    ],
    "author_id": 7408,
    "paper_ids": [
      671
    ],
    "papers_without_artifact_ids": [
      5352,
      5059,
      5859,
      5860,
      5861,
      520,
      4628,
      4629,
      4630,
      3608
    ]
  },
  {
    "name": "Jia-Chen Wang",
    "display_name": "Jia-Chen Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Polyjuice: High-Performance Transactions via Learned Concurrency Control",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7409,
    "paper_ids": [
      42
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ding Ding",
    "display_name": "Ding Ding",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Polyjuice: High-Performance Transactions via Learned Concurrency Control",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "runtime protocol refinement checking for distributed protocol implementations",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 7410,
    "paper_ids": [
      42
    ],
    "papers_without_artifact_ids": [
      2861
    ]
  },
  {
    "name": "Huan Wang",
    "display_name": "Huan Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Polyjuice: High-Performance Transactions via Learned Concurrency Control",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "msfrd mutation similarity based ssd failure rating and diagnosis for complex and volatile production environments",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 7411,
    "paper_ids": [
      42
    ],
    "papers_without_artifact_ids": [
      5862
    ]
  },
  {
    "name": "Conrad Christensen",
    "display_name": "Conrad Christensen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Polyjuice: High-Performance Transactions via Learned Concurrency Control",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7412,
    "paper_ids": [
      42
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhaoguo Wang",
    "display_name": "Zhaoguo Wang",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2023": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Polyjuice: High-Performance Transactions via Learned Concurrency Control",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automated verification of idempotence for stateful serverless applications",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "unifying timestamp with transaction ordering for mvcc with decentralized scalar timestamp",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 7413,
    "paper_ids": [
      42
    ],
    "papers_without_artifact_ids": [
      64,
      71
    ]
  },
  {
    "name": "Jinyang Li 0001",
    "display_name": "Jinyang Li",
    "affiliation": "New York University",
    "artifact_count": 1,
    "total_papers": 8,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "EUROSYS": 1,
      "ATC": 0,
      "NSDI": 6
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2025": 1
      },
      "ATC": {},
      "NSDI": {
        "2009": 2,
        "2025": 1,
        "2006": 1,
        "2005": 1,
        "2004": 1
      }
    },
    "artifact_rate": 12.5,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Polyjuice: High-Performance Transactions via Learned Concurrency Control",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "stateful large language model serving with pensieve",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "runtime protocol refinement checking for distributed protocol implementations",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "sybilresilient online content voting",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "flexible widearea storage for distributed systems with wheelfs",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "overcite a distributed cooperative citeseer",
        "conference": "NSDI",
        "year": 2006
      },
      {
        "title": "bandwidthefficient management of dht routing tables",
        "conference": "NSDI",
        "year": 2005
      },
      {
        "title": "designing a dht for low latency and high throughput",
        "conference": "NSDI",
        "year": 2004
      }
    ],
    "author_id": 1847,
    "paper_ids": [
      42
    ],
    "papers_without_artifact_ids": [
      5863,
      2861,
      5864,
      1296,
      1299,
      1302,
      1303
    ]
  },
  {
    "name": "Igor Smolyar",
    "display_name": "Igor Smolyar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Optimizing Storage Performance with Calibrated Interrupts",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7414,
    "paper_ids": [
      3443
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Wei",
    "display_name": "Michael Wei",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2017": 1,
        "2012": 1,
        "2022": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Optimizing Storage Performance with Calibrated Interrupts",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "graham synchronizing clocks by leveraging local clock properties",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "vcorfu a cloudscale object store on a shared log",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "corfu a shared log design for flash clusters",
        "conference": "NSDI",
        "year": 2012
      }
    ],
    "author_id": 7415,
    "paper_ids": [
      3443
    ],
    "papers_without_artifact_ids": [
      5865,
      3444,
      5866
    ]
  },
  {
    "name": "Pinjia He",
    "display_name": "Pinjia He",
    "affiliation": "CUHK (SZ)",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SANRAZOR: Reducing Redundant Sanitizer Checks in C/C++ Programs",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7416,
    "paper_ids": [
      951
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ankit Bhardwaj 0002",
    "display_name": "Ankit Bhardwaj",
    "affiliation": "Tufts University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "NrOS: Effective Replication and Sharing in an Operating System",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7417,
    "paper_ids": [
      527
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chinmay Kulkarni 0002",
    "display_name": "Chinmay Kulkarni",
    "affiliation": "University of Utah",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "SOSP": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "NrOS: Effective Replication and Sharing in an Operating System",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7418,
    "paper_ids": [
      527
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sang Keun Choe",
    "display_name": "Sang Keun Choe",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pollux: Co-adaptive Cluster Scheduling for Goodput-Optimized Deep Learning",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7419,
    "paper_ids": [
      1323
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Willie Neiswanger",
    "display_name": "Willie Neiswanger",
    "affiliation": "University of Southern California",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pollux: Co-adaptive Cluster Scheduling for Goodput-Optimized Deep Learning",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7420,
    "paper_ids": [
      1323
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qirong Ho",
    "display_name": "Qirong Ho",
    "affiliation": "MBZUAI",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pollux: Co-adaptive Cluster Scheduling for Goodput-Optimized Deep Learning",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7421,
    "paper_ids": [
      1323
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eric P. Xing",
    "display_name": "Eric P. Xing",
    "affiliation": "MBZUAI",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1,
        "2022": 1
      },
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pollux: Co-adaptive Cluster Scheduling for Goodput-Optimized Deep Learning",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "alpa automating inter and intraoperator parallelism for distributed deep learning",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 7422,
    "paper_ids": [
      1323
    ],
    "papers_without_artifact_ids": [
      488
    ]
  },
  {
    "name": "Kyuhwa Han",
    "display_name": "Kyuhwa Han",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ZNS+: Advanced Zoned Namespace Interface for Supporting In-Storage Zone Compaction",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7423,
    "paper_ids": [
      5867
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hyunho Gwak",
    "display_name": "Hyunho Gwak",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ZNS+: Advanced Zoned Namespace Interface for Supporting In-Storage Zone Compaction",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7424,
    "paper_ids": [
      5867
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dongkun Shin",
    "display_name": "Dongkun Shin",
    "affiliation": "Sungkyunkwan University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 0,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "ATC": {},
      "FAST": {
        "2017": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ZNS+: Advanced Zoned Namespace Interface for Supporting In-Storage Zone Compaction",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "d2fs devicedriven filesystem garbage collection",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "shrd improving spatial locality in flash storage accesses by sequentializing in host and randomizing in device",
        "conference": "FAST",
        "year": 2017
      }
    ],
    "author_id": 1244,
    "paper_ids": [
      5867
    ],
    "papers_without_artifact_ids": [
      4911,
      5868
    ]
  },
  {
    "name": "Jooyoung Hwang",
    "display_name": "Jooyoung Hwang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0,
      "ATC": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "SC": {},
      "ATC": {
        "2022": 1
      },
      "FAST": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ZNS+: Advanced Zoned Namespace Interface for Supporting In-Storage Zone Compaction",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vigilkv hardwaresoftware codesign to integrate strong latency determinism into logstructured merge keyvalue stores",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "dcstore eliminating noisy neighbor containers using deterministic io performance and resource isolation",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 7425,
    "paper_ids": [
      5867
    ],
    "papers_without_artifact_ids": [
      3553,
      3556
    ]
  },
  {
    "name": "Tanvir Ahmed Khan",
    "display_name": "Tanvir Ahmed Khan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "FAST": {
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DMon: Efficient Detection and Correction of Data Locality Problems Using Selective Profiling",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "aptget profileguided",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "rethinking file mapping for persistent memory",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 7426,
    "paper_ids": [
      1626
    ],
    "papers_without_artifact_ids": [
      1628,
      357
    ]
  },
  {
    "name": "Gilles Pokam",
    "display_name": "Gilles Pokam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DMon: Efficient Detection and Correction of Data Locality Problems Using Selective Profiling",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7427,
    "paper_ids": [
      1626
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Barzan Mozafari",
    "display_name": "Barzan Mozafari",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2021": 1
      },
      "EUROSYS": {},
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2021
    ],
    "year_range": "2021-2021",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "DMon: Efficient Detection and Correction of Data Locality Problems Using Selective Profiling",
        "conference": "OSDI",
        "year": 2021,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7428,
    "paper_ids": [
      1626
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Timothy Stamler",
    "display_name": "Timothy Stamler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "zIO: Accelerating IO-Intensive Applications with Transparent Zero-Copy IO",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7429,
    "paper_ids": [
      1368
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Deukyeon Hwang",
    "display_name": "Deukyeon Hwang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2023": 1
      },
      "FAST": {
        "2018": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "zIO: Accelerating IO-Intensive Applications with Transparent Zero-Copy IO",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "scaledb a scalable asynchronous inmemory database",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "endurable transient inconsistency in byteaddressable persistent btree",
        "conference": "FAST",
        "year": 2018
      }
    ],
    "author_id": 7430,
    "paper_ids": [
      1368
    ],
    "papers_without_artifact_ids": [
      1369,
      3502
    ]
  },
  {
    "name": "Lijun Chen",
    "display_name": "Lijun Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Immortal Threads: Multithreaded Event-driven Intermittent Computing on Ultra-Low-Power Microcontrollers",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7431,
    "paper_ids": [
      2824
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sujin Park",
    "display_name": "Sujin Park",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Application-Informed Kernel Synchronization Primitives",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7432,
    "paper_ids": [
      528
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Huanqi Cao",
    "display_name": "Huanqi Cao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TriCache: A User-Transparent Block Cache Enabling High-Performance Out-of-Core Processing with In-Memory Programs",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7433,
    "paper_ids": [
      2817
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bowen Yu 0003",
    "display_name": "Bowen Yu",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "TriCache: A User-Transparent Block Cache Enabling High-Performance Out-of-Core Processing with In-Memory Programs",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7434,
    "paper_ids": [
      2817
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chaoliang Zeng",
    "display_name": "Chaoliang Zeng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 2,
      "ATC": 0,
      "USENIXSEC": 1,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "EUROSYS": {
        "2025": 1,
        "2024": 1
      },
      "ATC": {},
      "USENIXSEC": {
        "2024": 1
      },
      "NSDI": {
        "2024": 1,
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FAERY: An FPGA-accelerated Embedding-based Retrieval System",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "achieving fairness generalizability for learningbased congestion control with jury",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "astraea towards fair and efficient learningbased congestion control",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "accelerating neural recommendation training with embedding scheduling",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "accelerating secure collaborative machine learning with protocolaware rdma",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "srnic a scalable architecture for rdma nics",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "tiara a scalable and efficient hardware acceleration architecture for stateful layer4 load balancing",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 7435,
    "paper_ids": [
      3711
    ],
    "papers_without_artifact_ids": [
      3854,
      3857,
      3858,
      3860,
      3862,
      3863
    ]
  },
  {
    "name": "Layong Luo",
    "display_name": "Layong Luo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "ATC": {},
      "NSDI": {
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FAERY: An FPGA-accelerated Embedding-based Retrieval System",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "srnic a scalable architecture for rdma nics",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "tiara a scalable and efficient hardware acceleration architecture for stateful layer4 load balancing",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 7436,
    "paper_ids": [
      3711
    ],
    "papers_without_artifact_ids": [
      3862,
      3863
    ]
  },
  {
    "name": "Qingsong Ning",
    "display_name": "Qingsong Ning",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FAERY: An FPGA-accelerated Embedding-based Retrieval System",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "srnic a scalable architecture for rdma nics",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 7437,
    "paper_ids": [
      3711
    ],
    "papers_without_artifact_ids": [
      3862
    ]
  },
  {
    "name": "Yuhang Jiang",
    "display_name": "Yuhang Jiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FAERY: An FPGA-accelerated Embedding-based Retrieval System",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7438,
    "paper_ids": [
      3711
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ding Tang",
    "display_name": "Ding Tang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FAERY: An FPGA-accelerated Embedding-based Retrieval System",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7439,
    "paper_ids": [
      3711
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zilong Wang 0007",
    "display_name": "Zilong Wang",
    "affiliation": "Hong Kong University of Science and Technology",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "USENIXSEC": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "EUROSYS": {
        "2025": 1
      },
      "USENIXSEC": {
        "2024": 1
      },
      "NSDI": {
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "FAERY: An FPGA-accelerated Embedding-based Retrieval System",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "achieving fairness generalizability for learningbased congestion control with jury",
        "conference": "EUROSYS",
        "year": 2025
      },
      {
        "title": "accelerating secure collaborative machine learning with protocolaware rdma",
        "conference": "USENIXSEC",
        "year": 2024
      },
      {
        "title": "srnic a scalable architecture for rdma nics",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "tiara a scalable and efficient hardware acceleration architecture for stateful layer4 load balancing",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 1851,
    "paper_ids": [
      3711
    ],
    "papers_without_artifact_ids": [
      3854,
      3860,
      3862,
      3863
    ]
  },
  {
    "name": "Janardhan Kulkarni",
    "display_name": "Janardhan Kulkarni",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Looking Beyond GPUs for DNN Scheduling on Multi-Tenant Clusters",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7440,
    "paper_ids": [
      2684
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hongyu Zhu 0003",
    "display_name": "Hongyu Zhu",
    "affiliation": "University of Toronto",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ROLLER: Fast and Efficient Tensor Compilation for Deep Learning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7441,
    "paper_ids": [
      150
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ruofan Wu",
    "display_name": "Ruofan Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ROLLER: Fast and Efficient Tensor Compilation for Deep Learning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7442,
    "paper_ids": [
      150
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yijia Diao",
    "display_name": "Yijia Diao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ROLLER: Fast and Efficient Tensor Compilation for Deep Learning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7443,
    "paper_ids": [
      150
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shanbin Ke",
    "display_name": "Shanbin Ke",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ROLLER: Fast and Efficient Tensor Compilation for Deep Learning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7444,
    "paper_ids": [
      150
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chen Zhang 0001",
    "display_name": "Chen Zhang",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 0,
      "SC": 0,
      "EUROSYS": 0,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2023": 1
      },
      "SOSP": {},
      "SC": {},
      "EUROSYS": {},
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ROLLER: Fast and Efficient Tensor Compilation for Deep Learning",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "magpy compiling eager mode dnn programs by monitoring execution states",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "cocktailer analyzing and optimizing dynamic control flow in deep learning",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 7445,
    "paper_ids": [
      150
    ],
    "papers_without_artifact_ids": [
      2099,
      162
    ]
  },
  {
    "name": "Yu Jian Wu",
    "display_name": "Yu Jian Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "XRP: In-Kernel Storage Functions with eBPF",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7446,
    "paper_ids": [
      1355
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ioannis Zarkadas",
    "display_name": "Ioannis Zarkadas",
    "affiliation": "Columbia University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "XRP: In-Kernel Storage Functions with eBPF",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7447,
    "paper_ids": [
      1355
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jeffrey Tao",
    "display_name": "Jeffrey Tao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "XRP: In-Kernel Storage Functions with eBPF",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7448,
    "paper_ids": [
      1355
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Evan Mesterhazy",
    "display_name": "Evan Mesterhazy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "XRP: In-Kernel Storage Functions with eBPF",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7449,
    "paper_ids": [
      1355
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Makris",
    "display_name": "Michael Makris",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "XRP: In-Kernel Storage Functions with eBPF",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7450,
    "paper_ids": [
      1355
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yongzhe Huang",
    "display_name": "Yongzhe Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ACSAC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "ACSAC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "KSplit: Automating Device Driver Isolation",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7451,
    "paper_ids": [
      2166
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tammam Mustafa",
    "display_name": "Tammam Mustafa",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practically Correct, Just-in-Time Shell Script Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "dish dynamic shellscript distribution",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 7452,
    "paper_ids": [
      3753
    ],
    "papers_without_artifact_ids": [
      3754
    ]
  },
  {
    "name": "Jan Bielak",
    "display_name": "Jan Bielak",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practically Correct, Just-in-Time Shell Script Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7453,
    "paper_ids": [
      3753
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dimitris Karnikis",
    "display_name": "Dimitris Karnikis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practically Correct, Just-in-Time Shell Script Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7454,
    "paper_ids": [
      3753
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Thurston H. Y. Dang",
    "display_name": "Thurston H. Y. Dang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practically Correct, Just-in-Time Shell Script Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7455,
    "paper_ids": [
      3753
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Michael Greenberg 0002",
    "display_name": "Michael Greenberg",
    "affiliation": "Stevens Institute of Technology",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "SOSP": {
        "2021": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Practically Correct, Just-in-Time Shell Script Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "filesasfilesystems for posix shell data processing",
        "conference": "SOSP",
        "year": 2021
      }
    ],
    "author_id": 7456,
    "paper_ids": [
      3753
    ],
    "papers_without_artifact_ids": [
      5869
    ]
  },
  {
    "name": "Xuhao Chen 0001",
    "display_name": "Xuhao Chen",
    "affiliation": "Massachusetts Institute of Technology",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient and Scalable Graph Pattern Mining on GPUs",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7457,
    "paper_ids": [
      5870
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Arvind 0001",
    "display_name": "Arvind",
    "affiliation": "University of Kentucky",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "SC": 0,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "SOSP": {},
      "SC": {},
      "ATC": {},
      "FAST": {
        "2016": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficient and Scalable Graph Pattern Mining on GPUs",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "applicationmanaged flash",
        "conference": "FAST",
        "year": 2016
      }
    ],
    "author_id": 7458,
    "paper_ids": [
      5870
    ],
    "papers_without_artifact_ids": [
      2082
    ]
  },
  {
    "name": "Christian Navasca",
    "display_name": "Christian Navasca",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "MemLiner: Lining up Tracing and Application for a Far-Memory-Friendly Runtime",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7459,
    "paper_ids": [
      2940
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jingyuan Zhu",
    "display_name": "Jingyuan Zhu",
    "affiliation": "Ohio University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Jawa: Web Archival in the Era of JavaScript",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sprinter speeding up highfidelity crawling of the modern web",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 7460,
    "paper_ids": [
      2610
    ],
    "papers_without_artifact_ids": [
      2616
    ]
  },
  {
    "name": "Ashraf Mahgoub",
    "display_name": "Ashraf Mahgoub",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ORION and the Three Rights: Sizing, Bundling, and Prewarming for Serverless DAGs",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7461,
    "paper_ids": [
      2913
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Edgardo Barsallo Yi",
    "display_name": "Edgardo Barsallo Yi",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ORION and the Three Rights: Sizing, Bundling, and Prewarming for Serverless DAGs",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7462,
    "paper_ids": [
      2913
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Karthick Shankar",
    "display_name": "Karthick Shankar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ORION and the Three Rights: Sizing, Bundling, and Prewarming for Serverless DAGs",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7463,
    "paper_ids": [
      2913
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenqing Luo",
    "display_name": "Wenqing Luo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Automatic Reliability Testing For Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7464,
    "paper_ids": [
      621
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chang Lou",
    "display_name": "Chang Lou",
    "affiliation": "University of Virginia",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 2
      },
      "ATC": {},
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Demystifying and Checking Silent Semantic Violations in Large Distributed Systems",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "resin a holistic service for dealing with memory leaks in production cloud infrastructure",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "understanding detecting and localizing partial failures in large system software",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 1860,
    "paper_ids": [
      1923
    ],
    "papers_without_artifact_ids": [
      1928,
      1930
    ]
  },
  {
    "name": "Yuzhuo Jing",
    "display_name": "Yuzhuo Jing",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 0,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 2
      },
      "SOSP": {},
      "SC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Demystifying and Checking Silent Semantic Violations in Large Distributed Systems",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "operating system support for safe and efficient auxiliary execution",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 1861,
    "paper_ids": [
      1923
    ],
    "papers_without_artifact_ids": [
      1929
    ]
  },
  {
    "name": "Lexiang Huang",
    "display_name": "Lexiang Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Metastable Failures in the Wild",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7465,
    "paper_ids": [
      2888
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matthew Magnusson",
    "display_name": "Matthew Magnusson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Metastable Failures in the Wild",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7466,
    "paper_ids": [
      2888
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abishek Bangalore Muralikrishna",
    "display_name": "Abishek Bangalore Muralikrishna",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Metastable Failures in the Wild",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7467,
    "paper_ids": [
      2888
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Salman Estyak",
    "display_name": "Salman Estyak",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Metastable Failures in the Wild",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7468,
    "paper_ids": [
      2888
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rebecca Isaacs",
    "display_name": "Rebecca Isaacs",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Metastable Failures in the Wild",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7469,
    "paper_ids": [
      2888
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Abutalib Aghayev",
    "display_name": "Abutalib Aghayev",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "ATC": 0,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "SOSP": {},
      "ATC": {},
      "FAST": {
        "2015": 1,
        "2017": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Metastable Failures in the Wild",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "evolving ext4 for shingled disks",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "skylighta window on shingled disk operation",
        "conference": "FAST",
        "year": 2015
      }
    ],
    "author_id": 7470,
    "paper_ids": [
      2888
    ],
    "papers_without_artifact_ids": [
      4870,
      4871
    ]
  },
  {
    "name": "Aleksey Charapko",
    "display_name": "Aleksey Charapko",
    "affiliation": "University of New Hampshire",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "EUROSYS": {
        "2023": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Metastable Failures in the Wild",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "linearizable lowlatency reads at the edge",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "readwrite quorum systems made practical",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 7471,
    "paper_ids": [
      2888
    ],
    "papers_without_artifact_ids": [
      5871,
      489
    ]
  },
  {
    "name": "Xuheng Li",
    "display_name": "Xuheng Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Design and Verification of the Arm Confidential Compute Architecture",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "spoq scaling machinecheckable systems verification in coq",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 7472,
    "paper_ids": [
      2001
    ],
    "papers_without_artifact_ids": [
      2002
    ]
  },
  {
    "name": "Christoffer Dall",
    "display_name": "Christoffer Dall",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "SOSP": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Design and Verification of the Arm Confidential Compute Architecture",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7473,
    "paper_ids": [
      2001
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yousuf Sait",
    "display_name": "Yousuf Sait",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Design and Verification of the Arm Confidential Compute Architecture",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7474,
    "paper_ids": [
      2001
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gareth Stockwell",
    "display_name": "Gareth Stockwell",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Design and Verification of the Arm Confidential Compute Architecture",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7475,
    "paper_ids": [
      2001
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhifei Yang",
    "display_name": "Zhifei Yang",
    "affiliation": "EPFL",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ODINFS: Scaling PM Performance with Opportunistic Delegation",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7476,
    "paper_ids": [
      529
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Colin Unger",
    "display_name": "Colin Unger",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unity: Accelerating DNN Training Through Joint Optimization of Algebraic Transformations and Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7477,
    "paper_ids": [
      1618
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei Wu 0016",
    "display_name": "Wei Wu",
    "affiliation": "UESTC",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unity: Accelerating DNN Training Through Joint Optimization of Algebraic Transformations and Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7478,
    "paper_ids": [
      1618
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sina Lin",
    "display_name": "Sina Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unity: Accelerating DNN Training Through Joint Optimization of Algebraic Transformations and Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7479,
    "paper_ids": [
      1618
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mandeep Baines",
    "display_name": "Mandeep Baines",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unity: Accelerating DNN Training Through Joint Optimization of Algebraic Transformations and Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7480,
    "paper_ids": [
      1618
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Carlos Efrain Quintero Narvaez",
    "display_name": "Carlos Efrain Quintero Narvaez",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unity: Accelerating DNN Training Through Joint Optimization of Algebraic Transformations and Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7481,
    "paper_ids": [
      1618
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Vinay Ramakrishnaiah",
    "display_name": "Vinay Ramakrishnaiah",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unity: Accelerating DNN Training Through Joint Optimization of Algebraic Transformations and Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7482,
    "paper_ids": [
      1618
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nirmal Prajapati",
    "display_name": "Nirmal Prajapati",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unity: Accelerating DNN Training Through Joint Optimization of Algebraic Transformations and Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7483,
    "paper_ids": [
      1618
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jamaludin Mohd-Yusof",
    "display_name": "Jamaludin Mohd-Yusof",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unity: Accelerating DNN Training Through Joint Optimization of Algebraic Transformations and Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7484,
    "paper_ids": [
      1618
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xi Luo",
    "display_name": "Xi Luo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unity: Accelerating DNN Training Through Joint Optimization of Algebraic Transformations and Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7485,
    "paper_ids": [
      1618
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dheevatsa Mudigere",
    "display_name": "Dheevatsa Mudigere",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0,
      "ATC": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "SC": {},
      "ATC": {
        "2024": 1
      },
      "NSDI": {
        "2023": 1,
        "2022": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unity: Accelerating DNN Training Through Joint Optimization of Algebraic Transformations and Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oper optimalityguided embedding table parallelization for largescale recommendation model",
        "conference": "ATC",
        "year": 2024
      },
      {
        "title": "topoopt cooptimizing network topology and parallelization strategy for distributed training jobs",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "checknrun a checkpointing system for training deep learning recommendation models",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 7486,
    "paper_ids": [
      1618
    ],
    "papers_without_artifact_ids": [
      1678,
      1622,
      2604
    ]
  },
  {
    "name": "Jongsoo Park",
    "display_name": "Jongsoo Park",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unity: Accelerating DNN Training Through Joint Optimization of Algebraic Transformations and Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "adaembed adaptive embedding for largescale recommendation models",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 7487,
    "paper_ids": [
      1618
    ],
    "papers_without_artifact_ids": [
      1952
    ]
  },
  {
    "name": "Misha Smelyanskiy",
    "display_name": "Misha Smelyanskiy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Unity: Accelerating DNN Training Through Joint Optimization of Algebraic Transformations and Parallelization",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "checknrun a checkpointing system for training deep learning recommendation models",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 7488,
    "paper_ids": [
      1618
    ],
    "papers_without_artifact_ids": [
      2604
    ]
  },
  {
    "name": "Bin Lin",
    "display_name": "Bin Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SparTA: Deep-Learning Model Sparsity via Tensor-with-Sparsity-Attribute",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7489,
    "paper_ids": [
      151
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yang Wang 0053",
    "display_name": "Yang Wang",
    "affiliation": "University of Electronic Science and Technology of China, MOE Key Laboratory of Optical Fiber Sensing and Communications, Chengdu, China",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2022
    ],
    "year_range": "2022-2022",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SparTA: Deep-Learning Model Sparsity via Tensor-with-Sparsity-Attribute",
        "conference": "OSDI",
        "year": 2022,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "superbench improving cloud ai infrastructure reliability with proactive validation",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 7490,
    "paper_ids": [
      151
    ],
    "papers_without_artifact_ids": [
      290
    ]
  },
  {
    "name": "Biao Sun 0002",
    "display_name": "Biao Sun",
    "affiliation": "VU Amsterdam",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Llumnix: Dynamic Scheduling for Large Language Model Serving",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7491,
    "paper_ids": [
      2885
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ziming Huang",
    "display_name": "Ziming Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Llumnix: Dynamic Scheduling for Large Language Model Serving",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7492,
    "paper_ids": [
      2885
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hanyu Zhao",
    "display_name": "Hanyu Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SC": 0,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2020": 1
      },
      "SC": {},
      "EUROSYS": {
        "2023": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Llumnix: Dynamic Scheduling for Large Language Model Serving",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "evolution of aegis fault diagnosis for ai model training service in production",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "silod a codesign of caching and scheduling for deep learning clusters",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "hived sharing a gpu cluster for deep learning with guarantees",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 7493,
    "paper_ids": [
      2885
    ],
    "papers_without_artifact_ids": [
      2886,
      160,
      163
    ]
  },
  {
    "name": "Xinyi Zhang",
    "display_name": "Xinyi Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "USENIXSEC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Llumnix: Dynamic Scheduling for Large Language Model Serving",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "improving realworld password guessing attacks via bidirectional transformers",
        "conference": "USENIXSEC",
        "year": 2023
      }
    ],
    "author_id": 7494,
    "paper_ids": [
      2885
    ],
    "papers_without_artifact_ids": [
      4401
    ]
  },
  {
    "name": "Minwoo Ahn",
    "display_name": "Minwoo Ahn",
    "affiliation": "Sungkyunkwan University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "ATC": 1,
      "FAST": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "FAST": {
        "2021": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Identifying On-/Off-CPU Bottlenecks Together with Blocked Samples",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "d2fq devicedirect fair queueing for nvme ssds",
        "conference": "FAST",
        "year": 2021
      }
    ],
    "author_id": 7495,
    "paper_ids": [
      351
    ],
    "papers_without_artifact_ids": [
      3866
    ]
  },
  {
    "name": "Jeongmin Han",
    "display_name": "Jeongmin Han",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Identifying On-/Off-CPU Bottlenecks Together with Blocked Samples",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7496,
    "paper_ids": [
      351
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shiyi Cao",
    "display_name": "Shiyi Cao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fairness in Serving Large Language Models",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7497,
    "paper_ids": [
      469
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Dacheng Li",
    "display_name": "Dacheng Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fairness in Serving Large Language Models",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7498,
    "paper_ids": [
      469
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Banghua Zhu",
    "display_name": "Banghua Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Fairness in Serving Large Language Models",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7499,
    "paper_ids": [
      469
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Weishu Deng",
    "display_name": "Weishu Deng",
    "affiliation": "The University of Texas at Arlington",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Nomad: Non-Exclusive Memory Tiering via Transactional Page Migration",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7500,
    "paper_ids": [
      2917
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yifan Yuan",
    "display_name": "Yifan Yuan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0,
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "EUROSYS": {},
      "ATC": {
        "2023": 1
      },
      "NSDI": {
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Nomad: Non-Exclusive Memory Tiering via Transactional Page Migration",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "styx exploiting smartnic capability to reduce datacenter memory tax",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "unlocking the power of inline floatingpoint operations on programmable switches",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 7501,
    "paper_ids": [
      2917
    ],
    "papers_without_artifact_ids": [
      2924,
      1651
    ]
  },
  {
    "name": "Ren Wang 0001",
    "display_name": "Ren Wang",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Nomad: Non-Exclusive Memory Tiering via Transactional Page Migration",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7502,
    "paper_ids": [
      2917
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Carl A. Waldspurger",
    "display_name": "Carl A. Waldspurger",
    "affiliation": "Independent consultant, Palo Alto, CA, USA",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1,
      "ATC": 0,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "SOSP": {
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2009": 1,
        "2015": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Managing Memory Tiers with CXL in Virtualized Environments",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "persistent memory research in the postoptane era",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "efficient mrc construction with shards",
        "conference": "FAST",
        "year": 2015
      },
      {
        "title": "parda proportional allocation of resources for distributed storage access",
        "conference": "FAST",
        "year": 2009
      }
    ],
    "author_id": 7503,
    "paper_ids": [
      1356
    ],
    "papers_without_artifact_ids": [
      4869,
      5872,
      5873
    ]
  },
  {
    "name": "Ryan Wee",
    "display_name": "Ryan Wee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Managing Memory Tiers with CXL in Virtualized Environments",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7504,
    "paper_ids": [
      1356
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ishwar Agarwal",
    "display_name": "Ishwar Agarwal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Managing Memory Tiers with CXL in Virtualized Environments",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7505,
    "paper_ids": [
      1356
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rajat Agarwal",
    "display_name": "Rajat Agarwal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Managing Memory Tiers with CXL in Virtualized Environments",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7506,
    "paper_ids": [
      1356
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Frank Hady",
    "display_name": "Frank Hady",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Managing Memory Tiers with CXL in Virtualized Environments",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7507,
    "paper_ids": [
      1356
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Karthik Kumar",
    "display_name": "Karthik Kumar",
    "affiliation": "CMI",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Managing Memory Tiers with CXL in Virtualized Environments",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7508,
    "paper_ids": [
      1356
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mark D. Hill",
    "display_name": "Mark D. Hill",
    "affiliation": "University of Wisconsin-Madison",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "SOSP": {},
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Managing Memory Tiers with CXL in Virtualized Environments",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7509,
    "paper_ids": [
      1356
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ruidong Zhu",
    "display_name": "Ruidong Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "dLoRA: Dynamically Orchestrating Requests and Adapters for LoRA LLM Serving",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7510,
    "paper_ids": [
      997
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zili Zhang",
    "display_name": "Zili Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 5
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "NSDI": {
        "2024": 2,
        "2025": 1,
        "2023": 2
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "dLoRA: Dynamically Orchestrating Requests and Adapters for LoRA LLM Serving",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "optimizing rlhf training for large language models with stage fusion",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "fast vector query processing for large datasets beyond gpu memory with reordered pipelining",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "jolteon unleashing the promise of serverless for serverless workflows",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "fast approximate vector queries on very large unstructured datasets",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "transparent gpu sharing in container clouds for deep learning workloads",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 7511,
    "paper_ids": [
      997
    ],
    "papers_without_artifact_ids": [
      999,
      1002,
      1003,
      1006,
      1007
    ]
  },
  {
    "name": "Anjali",
    "display_name": "Anjali",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "VeriSMo: A Verified Security Module for Confidential VMs",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7512,
    "paper_ids": [
      2056
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yi Zhai 0005",
    "display_name": "Yi Zhai",
    "affiliation": "University of Science and Technology of China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Tensor Language Model to Assist in Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7513,
    "paper_ids": [
      4602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sijia Yang",
    "display_name": "Sijia Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Tensor Language Model to Assist in Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7514,
    "paper_ids": [
      4602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Keyu Pan",
    "display_name": "Keyu Pan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Tensor Language Model to Assist in Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7515,
    "paper_ids": [
      4602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Renwei Zhang",
    "display_name": "Renwei Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Tensor Language Model to Assist in Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7516,
    "paper_ids": [
      4602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuo Liu 0019",
    "display_name": "Shuo Liu",
    "affiliation": "University of Science and Technology of China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Tensor Language Model to Assist in Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7517,
    "paper_ids": [
      4602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chao Liu",
    "display_name": "Chao Liu",
    "affiliation": "Stanford University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Tensor Language Model to Assist in Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7518,
    "paper_ids": [
      4602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zichun Ye",
    "display_name": "Zichun Ye",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Tensor Language Model to Assist in Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7519,
    "paper_ids": [
      4602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jianmin Ji",
    "display_name": "Jianmin Ji",
    "affiliation": "USTC",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Tensor Language Model to Assist in Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7520,
    "paper_ids": [
      4602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu Zhang 0086",
    "display_name": "Yu Zhang",
    "affiliation": "University of Science and Technology of China",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Tensor Language Model to Assist in Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7521,
    "paper_ids": [
      4602
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yanyong Zhang",
    "display_name": "Yanyong Zhang",
    "affiliation": "USTC",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Enabling Tensor Language Model to Assist in Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tmac cpu renaissance via table lookup for lowbit llm deployment on edge",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 7522,
    "paper_ids": [
      4602
    ],
    "papers_without_artifact_ids": [
      1024
    ]
  },
  {
    "name": "Shan Yu",
    "display_name": "Shan Yu",
    "affiliation": "University of California, Los Angeles",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DRust: Language-Guided Distributed Shared Memory with Fine Granularity, Full Transparency, and Ultra Efficiency",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7523,
    "paper_ids": [
      2088
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuanjiang Ni",
    "display_name": "Yuanjiang Ni",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DRust: Language-Guided Distributed Shared Memory with Fine Granularity, Full Transparency, and Ultra Efficiency",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7524,
    "paper_ids": [
      2088
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qingda Lu",
    "display_name": "Qingda Lu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "SC": {},
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DRust: Language-Guided Distributed Shared Memory with Fine Granularity, Full Transparency, and Ultra Efficiency",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hermit lowlatency highthroughput and transparent remote memory via feedbackdirected asynchrony",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 7525,
    "paper_ids": [
      2088
    ],
    "papers_without_artifact_ids": [
      2641
    ]
  },
  {
    "name": "Harry Xu 0001",
    "display_name": "Harry Xu",
    "affiliation": "Univ. of California - Los Angeles",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 0,
      "EUROSYS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 2
      },
      "SOSP": {},
      "EUROSYS": {
        "2023": 1
      },
      "NSDI": {
        "2024": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DRust: Language-Guided Distributed Shared Memory with Fine Granularity, Full Transparency, and Ultra Efficiency",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "parcae proactive liveputoptimized dnn training on preemptible instances",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "harvesting idle memory for applicationmanaged soft state with midas",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "a tale of two paths toward a hybrid data plane for efficient farmemory applications",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "accelerating graph mining systems with subgraph morphing",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 7526,
    "paper_ids": [
      2088
    ],
    "papers_without_artifact_ids": [
      1620,
      2638,
      1377,
      3749
    ]
  },
  {
    "name": "Amey Agrawal",
    "display_name": "Amey Agrawal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Taming Throughput-Latency Tradeoff in LLM Inference with Sarathi-Serve",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7527,
    "paper_ids": [
      3795
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nitin Kedia",
    "display_name": "Nitin Kedia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Taming Throughput-Latency Tradeoff in LLM Inference with Sarathi-Serve",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7528,
    "paper_ids": [
      3795
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Bhargav S. Gulavani",
    "display_name": "Bhargav S. Gulavani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "EUROSYS": {
        "2024": 1
      },
      "FAST": {
        "2019": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Taming Throughput-Latency Tradeoff in LLM Inference with Sarathi-Serve",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "justintime checkpointing low cost error recovery from deep learning training failures",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "instalytics cluster filesystem codesign for bigdata analytics",
        "conference": "FAST",
        "year": 2019
      }
    ],
    "author_id": 7529,
    "paper_ids": [
      3795
    ],
    "papers_without_artifact_ids": [
      3796,
      3549
    ]
  },
  {
    "name": "Alexey Tumanov",
    "display_name": "Alexey Tumanov",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "EUROSYS": 1,
      "ATC": 0,
      "FAST": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2021": 1
      },
      "ATC": {},
      "FAST": {
        "2014": 1
      },
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Taming Throughput-Latency Tradeoff in LLM Inference with Sarathi-Serve",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "superserve finegrained inference serving for unpredictable workloads",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "rubberband cloudbased hyperparameter tuning",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "springfs bridging agility and performance in elastic distributed storage",
        "conference": "FAST",
        "year": 2014
      }
    ],
    "author_id": 7530,
    "paper_ids": [
      3795
    ],
    "papers_without_artifact_ids": [
      475,
      490,
      1335
    ]
  },
  {
    "name": "Sudipta Saha Shubha",
    "display_name": "Sudipta Saha Shubha",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "USHER: Holistic Interference Avoidance for Resource Optimized ML Inference",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7531,
    "paper_ids": [
      3617
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Anand P. Iyer",
    "display_name": "Anand P. Iyer",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "SOSP": {
        "2024": 1
      },
      "NSDI": {
        "2024": 1,
        "2023": 1,
        "2015": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "USHER: Holistic Interference Avoidance for Resource Optimized ML Inference",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vulcan automatic query planning for live ml analytics",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "apparate rethinking early exits to tame latencythroughput tensions in ml serving",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "gemel model merging for memoryefficient realtime video analytics at the edge",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "celliq realtime cellular network analytics at scale",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 7532,
    "paper_ids": [
      3617
    ],
    "papers_without_artifact_ids": [
      1948,
      2617,
      2621,
      506
    ]
  },
  {
    "name": "Liangcheng Yu",
    "display_name": "Liangcheng Yu",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "NSDI": {
        "2025": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Beaver: Practical Partial Snapshots for Distributed Cloud Services",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enabling silent telemetry data transmission with invisiflow",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "orbweaver using idle cycles in programmable networks for opportunistic coordination",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 7533,
    "paper_ids": [
      1938
    ],
    "papers_without_artifact_ids": [
      1940,
      1942
    ]
  },
  {
    "name": "Xiao Zhang",
    "display_name": "Xiao Zhang",
    "affiliation": "University of Texas at Austin",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 0,
      "ATC": 0,
      "ACSAC": 0,
      "USENIXSEC": 0,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2020": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "ACSAC": {},
      "USENIXSEC": {},
      "NSDI": {
        "2023": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Beaver: Practical Partial Snapshots for Distributed Cloud Services",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flattened clos designing highperformance deadlockfree expander data center networks using graph contraction",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "thunderbolt throughputoptimized qualityofserviceaware power capping at scale",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 7534,
    "paper_ids": [
      1938
    ],
    "papers_without_artifact_ids": [
      5874,
      5875
    ]
  },
  {
    "name": "John Sonchack",
    "display_name": "John Sonchack",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "ACSAC": 0,
      "NSDI": 3,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "ACSAC": {},
      "NSDI": {
        "2021": 1,
        "2020": 1,
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Beaver: Practical Partial Snapshots for Distributed Cloud Services",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "orbweaver using idle cycles in programmable networks for opportunistic coordination",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "flightplan dataplane disaggregation and placement for p4 programs",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "tpprof a network traffic pattern profiler",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 7535,
    "paper_ids": [
      1938
    ],
    "papers_without_artifact_ids": [
      1942,
      5071,
      1943
    ]
  },
  {
    "name": "Wenjie Ma",
    "display_name": "Wenjie Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Anvil: Verifying Liveness of Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7536,
    "paper_ids": [
      622
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zicheng Ma",
    "display_name": "Zicheng Ma",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Anvil: Verifying Liveness of Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7537,
    "paper_ids": [
      622
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Adriana Szekeres",
    "display_name": "Adriana Szekeres",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Anvil: Verifying Liveness of Cluster Management Controllers",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "prism rethinking the rdma interface for distributed systems",
        "conference": "SOSP",
        "year": 2021
      }
    ],
    "author_id": 7538,
    "paper_ids": [
      622
    ],
    "papers_without_artifact_ids": [
      3490
    ]
  },
  {
    "name": "Shujian Qian",
    "display_name": "Shujian Qian",
    "affiliation": "University of Toronto",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "ATC": 1,
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "ATC": {
        "2024": 1
      },
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "ATC"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Massively Parallel Multi-Versioned Transaction Processing",
        "conference": "ATC",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7539,
    "paper_ids": [
      2721
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wonbeom Lee",
    "display_name": "Wonbeom Lee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "InfiniGen: Efficient Generative Inference of Large Language Models with Dynamic KV Cache Management",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7540,
    "paper_ids": [
      5876
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jungi Lee",
    "display_name": "Jungi Lee",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "InfiniGen: Efficient Generative Inference of Large Language Models with Dynamic KV Cache Management",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7541,
    "paper_ids": [
      5876
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Junghwan Seo",
    "display_name": "Junghwan Seo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "InfiniGen: Efficient Generative Inference of Large Language Models with Dynamic KV Cache Management",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7542,
    "paper_ids": [
      5876
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jaewoong Sim",
    "display_name": "Jaewoong Sim",
    "affiliation": "Seoul National University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "InfiniGen: Efficient Generative Inference of Large Language Models with Dynamic KV Cache Management",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7543,
    "paper_ids": [
      5876
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yilun Wu",
    "display_name": "Yilun Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IntOS: Persistent Embedded Operating System and Language Support for Multi-threaded Intermittent Computing",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7544,
    "paper_ids": [
      3504
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Byounguk Min",
    "display_name": "Byounguk Min",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IntOS: Persistent Embedded Operating System and Language Support for Multi-threaded Intermittent Computing",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7545,
    "paper_ids": [
      3504
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenjie Xiong 0001",
    "display_name": "Wenjie Xiong",
    "affiliation": "City University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "CHES": 0,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "CHES": {},
      "USENIXSEC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IntOS: Persistent Embedded Operating System and Language Support for Multi-threaded Intermittent Computing",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "information flow control in machine learning through modular model architecture",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 7546,
    "paper_ids": [
      3504
    ],
    "papers_without_artifact_ids": [
      5759
    ]
  },
  {
    "name": "Changhee Jung",
    "display_name": "Changhee Jung",
    "affiliation": "Purdue University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "SC": {},
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "IntOS: Persistent Embedded Operating System and Language Support for Multi-threaded Intermittent Computing",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7547,
    "paper_ids": [
      3504
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Martina Camaioni",
    "display_name": "Martina Camaioni",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chop Chop: Byzantine Atomic Broadcast to the Network Limit",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7548,
    "paper_ids": [
      1381
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matteo Monti",
    "display_name": "Matteo Monti",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chop Chop: Byzantine Atomic Broadcast to the Network Limit",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7549,
    "paper_ids": [
      1381
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pierre-Louis Roman",
    "display_name": "Pierre-Louis Roman",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chop Chop: Byzantine Atomic Broadcast to the Network Limit",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7550,
    "paper_ids": [
      1381
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Manuel Vidigueira",
    "display_name": "Manuel Vidigueira",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Chop Chop: Byzantine Atomic Broadcast to the Network Limit",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7551,
    "paper_ids": [
      1381
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sahand Kashani",
    "display_name": "Sahand Kashani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Performance Interfaces for Hardware Accelerators",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7552,
    "paper_ids": [
      1594
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mahyar Emami",
    "display_name": "Mahyar Emami",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Performance Interfaces for Hardware Accelerators",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7553,
    "paper_ids": [
      1594
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Darya Kaviani",
    "display_name": "Darya Kaviani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flock: A Framework for Deploying On-Demand Distributed Trust",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7554,
    "paper_ids": [
      672
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pravein Govindan Kannan",
    "display_name": "Pravein Govindan Kannan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "USENIXSEC": {},
      "NSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Flock: A Framework for Deploying On-Demand Distributed Trust",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "debugging transient faults in data centers using synchronized networkwide packet histories",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 7555,
    "paper_ids": [
      672
    ],
    "papers_without_artifact_ids": [
      5877
    ]
  },
  {
    "name": "Chaofan Lin",
    "display_name": "Chaofan Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Parrot: Efficient Serving of LLM-based Applications with Semantic Variable",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7556,
    "paper_ids": [
      152
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chen Chen 0067",
    "display_name": "Chen Chen",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Parrot: Efficient Serving of LLM-based Applications with Semantic Variable",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7557,
    "paper_ids": [
      152
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Nathan Taylor",
    "display_name": "Nathan Taylor",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SquirrelFS: using the Rust compiler to check file-system crash consistency",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7558,
    "paper_ids": [
      2685
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "James Bornholt",
    "display_name": "James Bornholt",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1,
      "EUROSYS": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "SOSP": {
        "2021": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "SquirrelFS: using the Rust compiler to check file-system crash consistency",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "chipmunk investigating crashconsistency in persistentmemory file systems",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "using lightweight formal methods to validate a keyvalue storage node in amazon s3",
        "conference": "SOSP",
        "year": 2021
      }
    ],
    "author_id": 7559,
    "paper_ids": [
      2685
    ],
    "papers_without_artifact_ids": [
      2686,
      5878
    ]
  },
  {
    "name": "Graeme Connell",
    "display_name": "Graeme Connell",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Secret Key Recovery in a Global-Scale End-to-End Encryption System",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7560,
    "paper_ids": [
      673
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Rolfe Schmidt",
    "display_name": "Rolfe Schmidt",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "USENIXSEC": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      },
      "USENIXSEC": {
        "2024": 1,
        "2025": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Secret Key Recovery in a Global-Scale End-to-End Encryption System",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "how to compare bandwidth constrained twoparty secure messaging protocols a quest for a more efficient and secure postquantum protocol",
        "conference": "USENIXSEC",
        "year": 2025
      },
      {
        "title": "formal verification of the pqxdh postquantum key agreement protocol for endtoend secure messaging",
        "conference": "USENIXSEC",
        "year": 2024
      }
    ],
    "author_id": 7561,
    "paper_ids": [
      673
    ],
    "papers_without_artifact_ids": [
      5470,
      2522
    ]
  },
  {
    "name": "Weixin Yu",
    "display_name": "Weixin Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "IronSpec: Increasing the Reliability of Formal Specifications",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7562,
    "paper_ids": [
      3817
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Seyed Armin Vakil-Ghahani",
    "display_name": "Seyed Armin Vakil-Ghahani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2024
    ],
    "year_range": "2024-2024",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "IronSpec: Increasing the Reliability of Formal Specifications",
        "conference": "OSDI",
        "year": 2024,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7563,
    "paper_ids": [
      3817
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chao Wang",
    "display_name": "Chao Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "ATC": {},
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SEPH: Scalable, Efficient, and Predictable Hashing on Persistent Memory",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "evolution of aegis fault diagnosis for ai model training service in production",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 7726,
    "paper_ids": [
      2774
    ],
    "papers_without_artifact_ids": [
      2886
    ]
  },
  {
    "name": "Tsun-Yu Yang",
    "display_name": "Tsun-Yu Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 0,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2024": 1,
        "2022": 1,
        "2025": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SEPH: Scalable, Efficient, and Predictable Hashing on Persistent Memory",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oasis an outofcore approximate graph system via alldistances sketches",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "seraph towards scalable and efficient fullyexternal graph computation via ondemand processing",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "practicably boosting the processing performance of bfslike algorithms on semiexternal graph system via ioefficient graph ordering",
        "conference": "FAST",
        "year": 2022
      }
    ],
    "author_id": 1245,
    "paper_ids": [
      2774
    ],
    "papers_without_artifact_ids": [
      2775,
      2776,
      2777
    ]
  },
  {
    "name": "Yuhong Liang",
    "display_name": "Yuhong Liang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 0,
      "FAST": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2024": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "SEPH: Scalable, Efficient, and Predictable Hashing on Persistent Memory",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "seraph towards scalable and efficient fullyexternal graph computation via ondemand processing",
        "conference": "FAST",
        "year": 2024
      },
      {
        "title": "practicably boosting the processing performance of bfslike algorithms on semiexternal graph system via ioefficient graph ordering",
        "conference": "FAST",
        "year": 2022
      }
    ],
    "author_id": 7727,
    "paper_ids": [
      2774
    ],
    "papers_without_artifact_ids": [
      2776,
      2777
    ]
  },
  {
    "name": "Muyan Hu",
    "display_name": "Muyan Hu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "EINNET: Optimizing Tensor Programs with Derivation-Based Transformations",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7728,
    "paper_ids": [
      1619
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tuowei Wang",
    "display_name": "Tuowei Wang",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "EINNET: Optimizing Tensor Programs with Derivation-Based Transformations",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7729,
    "paper_ids": [
      1619
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shuhong Huang",
    "display_name": "Shuhong Huang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "EINNET: Optimizing Tensor Programs with Derivation-Based Transformations",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7730,
    "paper_ids": [
      1619
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xupeng Miao",
    "display_name": "Xupeng Miao",
    "affiliation": "Peking University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1,
      "SC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "SOSP": {
        "2024": 1
      },
      "SC": {},
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "EINNET: Optimizing Tensor Programs with Derivation-Based Transformations",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "parcae proactive liveputoptimized dnn training on preemptible instances",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "enabling parallelism hot switching for efficient training of large language models",
        "conference": "SOSP",
        "year": 2024
      }
    ],
    "author_id": 1868,
    "paper_ids": [
      1619
    ],
    "papers_without_artifact_ids": [
      1620,
      3154
    ]
  },
  {
    "name": "Vasily A. Sartakov",
    "display_name": "Vasily A. Sartakov",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ORC: Increasing Cloud Memory Density via Object Reuse with Capabilities",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "capvms capabilitybased isolation and sharing in the cloud",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 7731,
    "paper_ids": [
      1389
    ],
    "papers_without_artifact_ids": [
      1394
    ]
  },
  {
    "name": "Munir Geden",
    "display_name": "Munir Geden",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ORC: Increasing Cloud Memory Density via Object Reuse with Capabilities",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7732,
    "paper_ids": [
      1389
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "David M. Eyers",
    "display_name": "David M. Eyers",
    "affiliation": "University of Otago",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2023": 1
      },
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "ORC: Increasing Cloud Memory Density via Object Reuse with Capabilities",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "capvms capabilitybased isolation and sharing in the cloud",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 7733,
    "paper_ids": [
      1389
    ],
    "papers_without_artifact_ids": [
      1394
    ]
  },
  {
    "name": "Chenxing Li",
    "display_name": "Chenxing Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LVMT: An Efficient Authenticated Storage for Blockchain",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7734,
    "paper_ids": [
      5879
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sidi Mohamed Beillahi",
    "display_name": "Sidi Mohamed Beillahi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LVMT: An Efficient Authenticated Storage for Blockchain",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7735,
    "paper_ids": [
      5879
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guang Yang 0020",
    "display_name": "Guang Yang",
    "affiliation": "Conflux - Tree-Graph Blockchain Research Institute",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LVMT: An Efficient Authenticated Storage for Blockchain",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7736,
    "paper_ids": [
      5879
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ming Wu 0007",
    "display_name": "Ming Wu",
    "affiliation": "Central South University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2009": 1,
        "2017": 1,
        "2008": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LVMT: An Efficient Authenticated Storage for Blockchain",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tux",
        "conference": "NSDI",
        "year": 2017
      },
      {
        "title": "modist transparent model checking of unmodified distributed systems",
        "conference": "NSDI",
        "year": 2009
      },
      {
        "title": "d3s debugging deployed distributed systems",
        "conference": "NSDI",
        "year": 2008
      }
    ],
    "author_id": 7737,
    "paper_ids": [
      5879
    ],
    "papers_without_artifact_ids": [
      291,
      294,
      1297
    ]
  },
  {
    "name": "Wei Xu 0005",
    "display_name": "Wei Xu",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "EUROSYS": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LVMT: An Efficient Authenticated Storage for Blockchain",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7738,
    "paper_ids": [
      5879
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fan Long",
    "display_name": "Fan Long",
    "affiliation": "University of Toronto",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 0,
      "NSDI": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "ATC": {},
      "NSDI": {
        "2009": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "LVMT: An Efficient Authenticated Storage for Blockchain",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "modist transparent model checking of unmodified distributed systems",
        "conference": "NSDI",
        "year": 2009
      }
    ],
    "author_id": 7739,
    "paper_ids": [
      5879
    ],
    "papers_without_artifact_ids": [
      294
    ]
  },
  {
    "name": "Xiang (Jenny) Ren",
    "display_name": "Xiang (Jenny) Ren",
    "affiliation": "Northeastern University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Relational Debugging - Pinpointing Root Causes of Performance Problems",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7740,
    "paper_ids": [
      623
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sitao Wang",
    "display_name": "Sitao Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Relational Debugging - Pinpointing Root Causes of Performance Problems",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7741,
    "paper_ids": [
      623
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ren Wang",
    "display_name": "Ren Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ensō: A Streaming Interface for NIC-Application Communication",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7742,
    "paper_ids": [
      2696
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Aditya Basu",
    "display_name": "Aditya Basu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "FAST": 1,
      "USENIXSEC": 1,
      "NDSS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "FAST": {
        "2023": 1
      },
      "USENIXSEC": {
        "2020": 1
      },
      "NDSS": {
        "2024": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Nimble: Rollback Protection for Confidential Cloud Services",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "talisman tamper analysis for reference monitors",
        "conference": "NDSS",
        "year": 2024
      },
      {
        "title": "unsafe at any copy name collisions from mixing case sensitivities",
        "conference": "FAST",
        "year": 2023
      },
      {
        "title": "automatic generation of compact printable shellcodes for x86",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 7743,
    "paper_ids": [
      1079
    ],
    "papers_without_artifact_ids": [
      3205,
      2226,
      5880
    ]
  },
  {
    "name": "Stella Lau",
    "display_name": "Stella Lau",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Nimble: Rollback Protection for Confidential Cloud Services",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7744,
    "paper_ids": [
      1079
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sudheesh Singanamalla",
    "display_name": "Sudheesh Singanamalla",
    "affiliation": "Netflix",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "PETS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1,
        "2020": 1
      },
      "PETS": {
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Nimble: Rollback Protection for Confidential Cloud Services",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "oblivious dns over https odoh a practical privacy enhancement to dns",
        "conference": "PETS",
        "year": 2021
      },
      {
        "title": "blockene a highthroughput blockchain over mobile devices",
        "conference": "OSDI",
        "year": 2020
      }
    ],
    "author_id": 7745,
    "paper_ids": [
      1079
    ],
    "papers_without_artifact_ids": [
      2945,
      2539
    ]
  },
  {
    "name": "Xuyang Zhao",
    "display_name": "Xuyang Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Encrypted Databases Made Secure Yet Maintainable",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7746,
    "paper_ids": [
      43
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Le Chen",
    "display_name": "Le Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "SOSP": {},
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Encrypted Databases Made Secure Yet Maintainable",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7747,
    "paper_ids": [
      43
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Huorong Li",
    "display_name": "Huorong Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Encrypted Databases Made Secure Yet Maintainable",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7748,
    "paper_ids": [
      43
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sheng Wang 0011",
    "display_name": "Sheng Wang",
    "affiliation": "Alibaba Cloud, Singapore",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "FAST": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Encrypted Databases Made Secure Yet Maintainable",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hotring a hotspotaware inmemory keyvalue store",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 7749,
    "paper_ids": [
      43
    ],
    "papers_without_artifact_ids": [
      5503
    ]
  },
  {
    "name": "Feifei Li 0001",
    "display_name": "Feifei Li",
    "affiliation": "Stanford University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 0,
      "FAST": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "ATC": {},
      "FAST": {
        "2020": 2,
        "2026": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Encrypted Databases Made Secure Yet Maintainable",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "polarstore highperformance data compression for largescale cloudnative databases",
        "conference": "FAST",
        "year": 2026
      },
      {
        "title": "fpgaaccelerated compactions for lsmbased keyvalue store",
        "conference": "FAST",
        "year": 2020
      },
      {
        "title": "hotring a hotspotaware inmemory keyvalue store",
        "conference": "FAST",
        "year": 2020
      }
    ],
    "author_id": 7750,
    "paper_ids": [
      43
    ],
    "papers_without_artifact_ids": [
      3810,
      4938,
      5503
    ]
  },
  {
    "name": "Bohdan Trach",
    "display_name": "Bohdan Trach",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BWoS: Formally Verified Block-based Work Stealing for Parallel Processing",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "specfuzz bringing spectretype vulnerabilities to the surface",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 7751,
    "paper_ids": [
      44
    ],
    "papers_without_artifact_ids": [
      3816
    ]
  },
  {
    "name": "Jonathan Schwender",
    "display_name": "Jonathan Schwender",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BWoS: Formally Verified Block-based Work Stealing for Parallel Processing",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7752,
    "paper_ids": [
      44
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yutao Liu",
    "display_name": "Yutao Liu",
    "affiliation": "Stony Brook University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2023": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BWoS: Formally Verified Block-based Work Stealing for Parallel Processing",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "microkernel goes general performance and compatibility in the hongmeng production microkernel",
        "conference": "OSDI",
        "year": 2024
      }
    ],
    "author_id": 7753,
    "paper_ids": [
      44
    ],
    "papers_without_artifact_ids": [
      58
    ]
  },
  {
    "name": "Viktor Vafeiadis",
    "display_name": "Viktor Vafeiadis",
    "affiliation": "Max Planck Society",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "BWoS: Formally Verified Block-based Work Stealing for Parallel Processing",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7754,
    "paper_ids": [
      44
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Danny Lin",
    "display_name": "Danny Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Accountable authentication with privacy protection: The Larch system for universal login",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7755,
    "paper_ids": [
      1018
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Shiwu Lo",
    "display_name": "Shiwu Lo",
    "affiliation": "National Chung Cheng University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RON: One-Way Circular Shortest Routing to Achieve Efficient and Bounded-waiting Spinlocks",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7756,
    "paper_ids": [
      4615
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Han-Ting Lin",
    "display_name": "Han-Ting Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RON: One-Way Circular Shortest Routing to Achieve Efficient and Bounded-waiting Spinlocks",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7757,
    "paper_ids": [
      4615
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yao-Hung Hsieh",
    "display_name": "Yao-Hung Hsieh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RON: One-Way Circular Shortest Routing to Achieve Efficient and Bounded-waiting Spinlocks",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7758,
    "paper_ids": [
      4615
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chao-Ting Lin",
    "display_name": "Chao-Ting Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RON: One-Way Circular Shortest Routing to Achieve Efficient and Bounded-waiting Spinlocks",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7759,
    "paper_ids": [
      4615
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu-Hsueh Fang",
    "display_name": "Yu-Hsueh Fang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RON: One-Way Circular Shortest Routing to Achieve Efficient and Bounded-waiting Spinlocks",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7760,
    "paper_ids": [
      4615
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ching-Shen Lin",
    "display_name": "Ching-Shen Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RON: One-Way Circular Shortest Routing to Achieve Efficient and Bounded-waiting Spinlocks",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7761,
    "paper_ids": [
      4615
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ching-Chun (Jim) Huang",
    "display_name": "Ching-Chun (Jim) Huang",
    "affiliation": "National Chiao Tung University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RON: One-Way Circular Shortest Routing to Achieve Efficient and Bounded-waiting Spinlocks",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7762,
    "paper_ids": [
      4615
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kam-Yiu Lam",
    "display_name": "Kam-Yiu Lam",
    "affiliation": "City University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RON: One-Way Circular Shortest Routing to Achieve Efficient and Bounded-waiting Spinlocks",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7763,
    "paper_ids": [
      4615
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yining Shi 0001",
    "display_name": "Yining Shi",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2023": 2
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Welder: Scheduling Deep Learning Memory Access via Tile-graph",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ladder enabling efficient lowprecision deep learning computing through hardwareaware tensor transformation",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "cocktailer analyzing and optimizing dynamic control flow in deep learning",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 7764,
    "paper_ids": [
      153
    ],
    "papers_without_artifact_ids": [
      159,
      162
    ]
  },
  {
    "name": "Yuxiao Guo 0001",
    "display_name": "Yuxiao Guo",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Welder: Scheduling Deep Learning Memory Access via Tile-graph",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7765,
    "paper_ids": [
      153
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Guoxin Sui",
    "display_name": "Guoxin Sui",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VBASE: Unifying Online Vector Similarity Search and Relational Queries via Relaxed Monotonicity",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7766,
    "paper_ids": [
      154
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiadong Xie 0002",
    "display_name": "Jiadong Xie",
    "affiliation": "Chinese University of Hong Kong",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "EUROSYS": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VBASE: Unifying Online Vector Similarity Search and Relational Queries via Relaxed Monotonicity",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "groot graphcentric row reordering with tree for sparse matrix multiplications on tensor cores",
        "conference": "EUROSYS",
        "year": 2025
      }
    ],
    "author_id": 7767,
    "paper_ids": [
      154
    ],
    "papers_without_artifact_ids": [
      5881
    ]
  },
  {
    "name": "Zhizhen Cai",
    "display_name": "Zhizhen Cai",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VBASE: Unifying Online Vector Similarity Search and Relational Queries via Relaxed Monotonicity",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7768,
    "paper_ids": [
      154
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yaoqi Chen",
    "display_name": "Yaoqi Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VBASE: Unifying Online Vector Similarity Search and Relational Queries via Relaxed Monotonicity",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7769,
    "paper_ids": [
      154
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yinxuan He",
    "display_name": "Yinxuan He",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "VBASE: Unifying Online Vector Similarity Search and Relational Queries via Relaxed Monotonicity",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7770,
    "paper_ids": [
      154
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lingji Ouyang",
    "display_name": "Lingji Ouyang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Optimizing Dynamic Neural Networks with Brainstorm",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7771,
    "paper_ids": [
      155
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yichuan Wang 0002",
    "display_name": "Yichuan Wang",
    "affiliation": "University of California, Berkeley",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Optimizing Dynamic Neural Networks with Brainstorm",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7772,
    "paper_ids": [
      155
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Haisheng Tan",
    "display_name": "Haisheng Tan",
    "affiliation": "USTC",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Optimizing Dynamic Neural Networks with Brainstorm",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "litepred transferable and scalable latency prediction for hardwareaware neural architecture search",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "tabi an efficient multilevel inference system for large language models",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 7773,
    "paper_ids": [
      155
    ],
    "papers_without_artifact_ids": [
      1025,
      3861
    ]
  },
  {
    "name": "Yizhou Shan",
    "display_name": "Yizhou Shan",
    "affiliation": "University of California, San Diego",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "SC": {},
      "ATC": {},
      "NSDI": {
        "2025": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "beehive a scalable disaggregated memory runtime exploiting asynchrony of multithreaded programs",
        "conference": "NSDI",
        "year": 2025
      }
    ],
    "author_id": 1869,
    "paper_ids": [
      3448
    ],
    "papers_without_artifact_ids": [
      2780
    ]
  },
  {
    "name": "Xinyang Ge",
    "display_name": "Xinyang Ge",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "ATC": 0,
      "ACSAC": 0,
      "USENIXSEC": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "SOSP": {},
      "ATC": {},
      "ACSAC": {},
      "USENIXSEC": {},
      "NDSS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7774,
    "paper_ids": [
      3448
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrew Baumann",
    "display_name": "Andrew Baumann",
    "affiliation": "Google",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2015": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tardigrade leveraging lightweight virtual machines to easily and efficiently construct faulttolerant services",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 7775,
    "paper_ids": [
      3448
    ],
    "papers_without_artifact_ids": [
      4712
    ]
  },
  {
    "name": "Yi Zhou 0025",
    "display_name": "Yi Zhou",
    "affiliation": "Carnegie Mellon University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Sharding the State Machine: Automated Modular Reasoning for Complex Concurrent Systems",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7776,
    "paper_ids": [
      721
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Stephanie Wang",
    "display_name": "Stephanie Wang",
    "affiliation": "University of Washington",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "SOSP": {},
      "NSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ExoFlow: A Universal Workflow System for Exactly-Once DAGs",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ownership a distributed futures system for finegrained tasks",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 1870,
    "paper_ids": [
      470
    ],
    "papers_without_artifact_ids": [
      494
    ]
  },
  {
    "name": "Eric Liang",
    "display_name": "Eric Liang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "NSDI": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ExoFlow: A Universal Workflow System for Exactly-Once DAGs",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ownership a distributed futures system for finegrained tasks",
        "conference": "NSDI",
        "year": 2021
      }
    ],
    "author_id": 7777,
    "paper_ids": [
      470
    ],
    "papers_without_artifact_ids": [
      494
    ]
  },
  {
    "name": "Yi Cheng",
    "display_name": "Yi Cheng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "ExoFlow: A Universal Workflow System for Exactly-Once DAGs",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7778,
    "paper_ids": [
      470
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhe Zhou 0001",
    "display_name": "Zhe Zhou",
    "affiliation": "Fudan University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ACSAC": 3,
      "USENIXSEC": 0,
      "PETS": 0,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "ACSAC": {
        "2021": 1,
        "2018": 1,
        "2022": 1
      },
      "USENIXSEC": {},
      "PETS": {},
      "NDSS": {}
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Userspace Bypass: Accelerating Syscall-intensive Applications",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "play the imitation game model extraction attack against autonomous driving localization",
        "conference": "ACSAC",
        "year": 2022
      },
      {
        "title": "the manyfaced god attacking face verification system with embedding and image recovery",
        "conference": "ACSAC",
        "year": 2021
      },
      {
        "title": "beware of your screen anonymous fingerprinting of device screens for offline payment protection",
        "conference": "ACSAC",
        "year": 2018
      }
    ],
    "author_id": 7779,
    "paper_ids": [
      3053
    ],
    "papers_without_artifact_ids": [
      3055,
      3056,
      2930
    ]
  },
  {
    "name": "Yangfan Zhou",
    "display_name": "Yangfan Zhou",
    "affiliation": "Fudan University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Userspace Bypass: Accelerating Syscall-intensive Applications",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7780,
    "paper_ids": [
      3053
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Siyuan Feng",
    "display_name": "Siyuan Feng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Effectively Scheduling Computational Graphs of Deep Neural Networks toward Their Domain-Specific Accelerators",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7781,
    "paper_ids": [
      4603
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xiaoqiang Dan",
    "display_name": "Xiaoqiang Dan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Effectively Scheduling Computational Graphs of Deep Neural Networks toward Their Domain-Specific Accelerators",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7782,
    "paper_ids": [
      4603
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fei Liu",
    "display_name": "Fei Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "EUROSYS": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Effectively Scheduling Computational Graphs of Deep Neural Networks toward Their Domain-Specific Accelerators",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "exploring performance and cost optimization with asicbased cxl memory",
        "conference": "EUROSYS",
        "year": 2024
      }
    ],
    "author_id": 7783,
    "paper_ids": [
      4603
    ],
    "papers_without_artifact_ids": [
      3519
    ]
  },
  {
    "name": "Chengke Wang",
    "display_name": "Chengke Wang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Effectively Scheduling Computational Graphs of Deep Neural Networks toward Their Domain-Specific Accelerators",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "smuff towards line rate wifi direct transport with orchestrated ondevice buffer management",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 7784,
    "paper_ids": [
      4603
    ],
    "papers_without_artifact_ids": [
      4701
    ]
  },
  {
    "name": "Sheng Yuan",
    "display_name": "Sheng Yuan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Effectively Scheduling Computational Graphs of Deep Neural Networks toward Their Domain-Specific Accelerators",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7785,
    "paper_ids": [
      4603
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wenyuan Lv",
    "display_name": "Wenyuan Lv",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Effectively Scheduling Computational Graphs of Deep Neural Networks toward Their Domain-Specific Accelerators",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7786,
    "paper_ids": [
      4603
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Qikai Xie",
    "display_name": "Qikai Xie",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Effectively Scheduling Computational Graphs of Deep Neural Networks toward Their Domain-Specific Accelerators",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7787,
    "paper_ids": [
      4603
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yugesh Kothari",
    "display_name": "Yugesh Kothari",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ship your Critical Section, Not Your Data: Enabling Transparent Delegation with TCLOCKS",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7788,
    "paper_ids": [
      530
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Si Liu",
    "display_name": "Si Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Detecting Transactional Bugs in Database Engines via Graph-Based Oracle Construction",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7789,
    "paper_ids": [
      1030
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jiahao Chen",
    "display_name": "Jiahao Chen",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "ATC": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Security and Performance in the Delegated User-level Virtualization",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cpc flexible secure and efficient cvm maintenance with confidential procedure calls",
        "conference": "ATC",
        "year": 2024
      }
    ],
    "author_id": 7790,
    "paper_ids": [
      45
    ],
    "papers_without_artifact_ids": [
      52
    ]
  },
  {
    "name": "Dingji Li",
    "display_name": "Dingji Li",
    "affiliation": "Shanghai Jiao Tong University",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 2,
      "EUROSYS": 0,
      "ATC": 1,
      "USENIXSEC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "SOSP": {
        "2021": 1,
        "2024": 1
      },
      "EUROSYS": {},
      "ATC": {
        "2023": 1
      },
      "USENIXSEC": {
        "2020": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Security and Performance in the Delegated User-level Virtualization",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vpri efficient io page fault handling via softwarehardware codesign for iaas clouds",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "bifrost analysis and optimization of network io tax in confidential virtual machines",
        "conference": "ATC",
        "year": 2023
      },
      {
        "title": "twinvisor hardwareisolated confidential virtual machines for arm",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "mostly exitless vm protection from untrusted hypervisor through disaggregated nested virtualization",
        "conference": "USENIXSEC",
        "year": 2020
      }
    ],
    "author_id": 7791,
    "paper_ids": [
      45
    ],
    "papers_without_artifact_ids": [
      4609,
      61,
      73,
      74
    ]
  },
  {
    "name": "Yuxuan Liu 0019",
    "display_name": "Yuxuan Liu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1
      },
      "SC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2023
    ],
    "year_range": "2023-2023",
    "recent_count": 1,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Security and Performance in the Delegated User-level Virtualization",
        "conference": "OSDI",
        "year": 2023,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7792,
    "paper_ids": [
      45
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yien Xu",
    "display_name": "Yien Xu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "From WiscKey to Bourbon: A Learned Index for Log-Structured Merge Trees",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7793,
    "paper_ids": [
      1640
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Eric Feng",
    "display_name": "Eric Feng",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DORY: An Encrypted Search System with Distributed Trust",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7794,
    "paper_ids": [
      471
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ellen Luo",
    "display_name": "Ellen Luo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "DORY: An Encrypted Search System with Distributed Trust",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7795,
    "paper_ids": [
      471
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jialin Li 0001",
    "display_name": "Jialin Li",
    "affiliation": "National University of Singapore",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "EUROSYS": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "NSDI": {
        "2023": 1,
        "2015": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pegasus: Tolerating Skewed Workloads in Distributed Storage with In-Network Coherence Directories",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hydra serializationfree network ordering for strongly consistent distributed applications",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "designing distributed systems using approximate synchrony in data center networks",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 7796,
    "paper_ids": [
      998
    ],
    "papers_without_artifact_ids": [
      4605,
      1944
    ]
  },
  {
    "name": "Jacob Nelson 0001",
    "display_name": "Jacob Nelson",
    "affiliation": "Manipal Academy of Higher Education",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 3,
      "ATC": 0,
      "NSDI": 5
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {
        "2021": 3
      },
      "ATC": {},
      "NSDI": {
        "2021": 1,
        "2017": 1,
        "2023": 1,
        "2022": 2
      }
    },
    "artifact_rate": 11.1,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pegasus: Tolerating Skewed Workloads in Distributed Storage with In-Network Coherence Directories",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "taccl guiding collective algorithm synthesis using communication sketches",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "unlocking the power of inline floatingpoint operations on programmable switches",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "swish distributed shared state abstractions for programmable switches",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "scaling distributed machine learning with innetwork aggregation",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "the demikernel datapath os architecture for microsecondscale datacenter systems",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "xenic smartnicaccelerated distributed transactions",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "prism rethinking the rdma interface for distributed systems",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "evaluating the power of flexible packet processing for network resource allocation",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 7797,
    "paper_ids": [
      998
    ],
    "papers_without_artifact_ids": [
      2687,
      1651,
      3814,
      1653,
      3509,
      4682,
      3490,
      1372
    ]
  },
  {
    "name": "Ellis Michael",
    "display_name": "Ellis Michael",
    "affiliation": "University of Washington",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "EUROSYS": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Pegasus: Tolerating Skewed Workloads in Distributed Storage with In-Network Coherence Directories",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "hydra serializationfree network ordering for strongly consistent distributed applications",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 7798,
    "paper_ids": [
      998
    ],
    "papers_without_artifact_ids": [
      4605
    ]
  },
  {
    "name": "Yuanqi Li",
    "display_name": "Yuanqi Li",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Semeru: A Memory-Disaggregated Managed Runtime",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7799,
    "paper_ids": [
      2611
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Khanh Nguyen 0001",
    "display_name": "Khanh Nguyen",
    "affiliation": "Texas A&M University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Semeru: A Memory-Disaggregated Managed Runtime",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7800,
    "paper_ids": [
      2611
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Partho Sarthi",
    "display_name": "Partho Sarthi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Generalized Sub-Query Fusion for Eliminating Redundant I/O from Big-Data Queries",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7801,
    "paper_ids": [
      3548
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Akash Lal",
    "display_name": "Akash Lal",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "EUROSYS": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "FAST": {
        "2016": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Generalized Sub-Query Fusion for Eliminating Redundant I/O from Big-Data Queries",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "uncovering bugs in distributed storage systems during testing not in production",
        "conference": "FAST",
        "year": 2016
      }
    ],
    "author_id": 7802,
    "paper_ids": [
      3548
    ],
    "papers_without_artifact_ids": [
      4676
    ]
  },
  {
    "name": "Abhishek Modi",
    "display_name": "Abhishek Modi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Generalized Sub-Query Fusion for Eliminating Redundant I/O from Big-Data Queries",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7803,
    "paper_ids": [
      3548
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Prakhar Jain",
    "display_name": "Prakhar Jain",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Generalized Sub-Query Fusion for Eliminating Redundant I/O from Big-Data Queries",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7804,
    "paper_ids": [
      3548
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Mo Liu 0003",
    "display_name": "Mo Liu",
    "affiliation": "Microsoft",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Generalized Sub-Query Fusion for Eliminating Redundant I/O from Big-Data Queries",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7805,
    "paper_ids": [
      3548
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ashit Gosalia",
    "display_name": "Ashit Gosalia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Generalized Sub-Query Fusion for Eliminating Redundant I/O from Big-Data Queries",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7806,
    "paper_ids": [
      3548
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Saurabh Kalikar",
    "display_name": "Saurabh Kalikar",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 0,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Generalized Sub-Query Fusion for Eliminating Redundant I/O from Big-Data Queries",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7807,
    "paper_ids": [
      3548
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Marco Spaziani Brunella",
    "display_name": "Marco Spaziani Brunella",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "hXDP: Efficient Software Packet Processing on FPGA NICs",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "faster software packet processing on fpga nics with ebpf program warping",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "flowblaze stateful packet processing in hardware",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 7808,
    "paper_ids": [
      5882
    ],
    "papers_without_artifact_ids": [
      5883,
      4855
    ]
  },
  {
    "name": "Giacomo Belocchi",
    "display_name": "Giacomo Belocchi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "ATC": {
        "2022": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "hXDP: Efficient Software Packet Processing on FPGA NICs",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "faster software packet processing on fpga nics with ebpf program warping",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 7809,
    "paper_ids": [
      5882
    ],
    "papers_without_artifact_ids": [
      5883
    ]
  },
  {
    "name": "Marco Bonola",
    "display_name": "Marco Bonola",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "hXDP: Efficient Software Packet Processing on FPGA NICs",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "faster software packet processing on fpga nics with ebpf program warping",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "flowblaze stateful packet processing in hardware",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 7810,
    "paper_ids": [
      5882
    ],
    "papers_without_artifact_ids": [
      5883,
      4855
    ]
  },
  {
    "name": "Salvatore Pontarelli",
    "display_name": "Salvatore Pontarelli",
    "affiliation": "Sapienza University of Rome",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "hXDP: Efficient Software Packet Processing on FPGA NICs",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "flowblaze stateful packet processing in hardware",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 7811,
    "paper_ids": [
      5882
    ],
    "papers_without_artifact_ids": [
      4855
    ]
  },
  {
    "name": "Giuseppe Siracusano",
    "display_name": "Giuseppe Siracusano",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "ATC": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2019": 1,
        "2022": 1
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "hXDP: Efficient Software Packet Processing on FPGA NICs",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "faster software packet processing on fpga nics with ebpf program warping",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "syslrn learning what to monitor for efficient anomaly detection",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "rearchitecting traffic analysis with neural network interface cards",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "flowblaze stateful packet processing in hardware",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 7812,
    "paper_ids": [
      5882
    ],
    "papers_without_artifact_ids": [
      5883,
      4854,
      3320,
      4855
    ]
  },
  {
    "name": "Giuseppe Bianchi 0001",
    "display_name": "Giuseppe Bianchi",
    "affiliation": "IIIT Bangalore",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0,
      "ATC": 1,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {},
      "ATC": {
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "hXDP: Efficient Software Packet Processing on FPGA NICs",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "faster software packet processing on fpga nics with ebpf program warping",
        "conference": "ATC",
        "year": 2022
      }
    ],
    "author_id": 7813,
    "paper_ids": [
      5882
    ],
    "papers_without_artifact_ids": [
      5883
    ]
  },
  {
    "name": "Aniello Cammarano",
    "display_name": "Aniello Cammarano",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "hXDP: Efficient Software Packet Processing on FPGA NICs",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7814,
    "paper_ids": [
      5882
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Alessandro Palumbo",
    "display_name": "Alessandro Palumbo",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "hXDP: Efficient Software Packet Processing on FPGA NICs",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7815,
    "paper_ids": [
      5882
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Luca Petrucci",
    "display_name": "Luca Petrucci",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "hXDP: Efficient Software Packet Processing on FPGA NICs",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7816,
    "paper_ids": [
      5882
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Roberto Bifulco",
    "display_name": "Roberto Bifulco",
    "affiliation": "NEC Laboratories Europe, Heidelberg, Germany",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "ATC": 1,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "ATC": {
        "2022": 1
      },
      "NSDI": {
        "2014": 1,
        "2019": 1,
        "2022": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "hXDP: Efficient Software Packet Processing on FPGA NICs",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "faster software packet processing on fpga nics with ebpf program warping",
        "conference": "ATC",
        "year": 2022
      },
      {
        "title": "syslrn learning what to monitor for efficient anomaly detection",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "rearchitecting traffic analysis with neural network interface cards",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "flowblaze stateful packet processing in hardware",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "clickos and the art of network function virtualization",
        "conference": "NSDI",
        "year": 2014
      }
    ],
    "author_id": 7817,
    "paper_ids": [
      5882
    ],
    "papers_without_artifact_ids": [
      5883,
      4854,
      3320,
      4855,
      3693
    ]
  },
  {
    "name": "Henry N. Schuh",
    "display_name": "Henry N. Schuh",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Assise: Performance and Availability via Client-local NVM in a Distributed File System",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "xenic smartnicaccelerated distributed transactions",
        "conference": "SOSP",
        "year": 2021
      }
    ],
    "author_id": 7818,
    "paper_ids": [
      352
    ],
    "papers_without_artifact_ids": [
      4682
    ]
  },
  {
    "name": "João Loff",
    "display_name": "João Loff",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building Scalable and Flexible Cluster Managers Using Declarative Programming",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 8164,
    "paper_ids": [
      3445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Faria Kalim",
    "display_name": "Faria Kalim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building Scalable and Flexible Cluster Managers Using Declarative Programming",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7820,
    "paper_ids": [
      3445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Sangeetha Abdu Jyothi",
    "display_name": "Sangeetha Abdu Jyothi",
    "affiliation": "Univ. of California - Irvine",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SC": {},
      "NSDI": {
        "2019": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building Scalable and Flexible Cluster Managers Using Declarative Programming",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "cisp a speedoflight internet service provider",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "is advance knowledge of flow sizes a plausible assumption",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 7821,
    "paper_ids": [
      3445
    ],
    "papers_without_artifact_ids": [
      5884,
      5885
    ]
  },
  {
    "name": "Nina Narodytska",
    "display_name": "Nina Narodytska",
    "affiliation": "VMware Research, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building Scalable and Flexible Cluster Managers Using Declarative Programming",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7822,
    "paper_ids": [
      3445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Leonid Ryzhyk",
    "display_name": "Leonid Ryzhyk",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "EUROSYS": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "NSDI": {
        "2017": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building Scalable and Flexible Cluster Managers Using Declarative Programming",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "correct by construction networks using stepwise refinement",
        "conference": "NSDI",
        "year": 2017
      }
    ],
    "author_id": 7823,
    "paper_ids": [
      3445
    ],
    "papers_without_artifact_ids": [
      1654
    ]
  },
  {
    "name": "Sahan Gamage",
    "display_name": "Sahan Gamage",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SC": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building Scalable and Flexible Cluster Managers Using Declarative Programming",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7824,
    "paper_ids": [
      3445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Brian Oki",
    "display_name": "Brian Oki",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building Scalable and Flexible Cluster Managers Using Declarative Programming",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7825,
    "paper_ids": [
      3445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Pranshu Jain",
    "display_name": "Pranshu Jain",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Building Scalable and Flexible Cluster Managers Using Declarative Programming",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7826,
    "paper_ids": [
      3445
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Supun Nakandala",
    "display_name": "Supun Nakandala",
    "affiliation": "University of California, San Diego",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Tensor Compiler for Unified Machine Learning Prediction Serving",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7827,
    "paper_ids": [
      5886
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Karla Saur",
    "display_name": "Karla Saur",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Tensor Compiler for Unified Machine Learning Prediction Serving",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7828,
    "paper_ids": [
      5886
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Gyeong-In Yu",
    "display_name": "Gyeong-In Yu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2020": 1
      },
      "EUROSYS": {},
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Tensor Compiler for Unified Machine Learning Prediction Serving",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "orca a distributed serving system for transformerbased generative models",
        "conference": "OSDI",
        "year": 2022
      },
      {
        "title": "janus fast and flexible deep learning via symbolic graph execution of imperative programs",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 7829,
    "paper_ids": [
      5886
    ],
    "papers_without_artifact_ids": [
      4994,
      4995
    ]
  },
  {
    "name": "Konstantinos Karanasos",
    "display_name": "Konstantinos Karanasos",
    "affiliation": "Meta, USA",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 2
      },
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Tensor Compiler for Unified Machine Learning Prediction Serving",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unearthing interjob dependencies for better cluster scheduling",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "hydra a federated resource manager for datacenter scale analytics",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 7830,
    "paper_ids": [
      5886
    ],
    "papers_without_artifact_ids": [
      1331,
      5887
    ]
  },
  {
    "name": "Carlo Curino",
    "display_name": "Carlo Curino",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 2,
      "ATC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 2
      },
      "ATC": {},
      "NSDI": {
        "2019": 1,
        "2015": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Tensor Compiler for Unified Machine Learning Prediction Serving",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "unearthing interjob dependencies for better cluster scheduling",
        "conference": "OSDI",
        "year": 2020
      },
      {
        "title": "hydra a federated resource manager for datacenter scale analytics",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "global analytics in the face of bandwidth and regulatory constraints",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 7831,
    "paper_ids": [
      5886
    ],
    "papers_without_artifact_ids": [
      1331,
      5887,
      5888
    ]
  },
  {
    "name": "Markus Weimer",
    "display_name": "Markus Weimer",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Tensor Compiler for Unified Machine Learning Prediction Serving",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7832,
    "paper_ids": [
      5886
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Matteo Interlandi",
    "display_name": "Matteo Interlandi",
    "affiliation": "Microsoft, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Tensor Compiler for Unified Machine Learning Prediction Serving",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7833,
    "paper_ids": [
      5886
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Kevin Boos",
    "display_name": "Kevin Boos",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {
        "2023": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Theseus: an Experiment in Operating System Structure and State Management",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "leveraging rust for lightweight os correctness",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 7834,
    "paper_ids": [
      3520
    ],
    "papers_without_artifact_ids": [
      3522
    ]
  },
  {
    "name": "Namitha Liyanage",
    "display_name": "Namitha Liyanage",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Theseus: an Experiment in Operating System Structure and State Management",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7835,
    "paper_ids": [
      3520
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ramla Ijaz",
    "display_name": "Ramla Ijaz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Theseus: an Experiment in Operating System Structure and State Management",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "leveraging rust for lightweight os correctness",
        "conference": "SOSP",
        "year": 2023
      }
    ],
    "author_id": 7836,
    "paper_ids": [
      3520
    ],
    "papers_without_artifact_ids": [
      3522
    ]
  },
  {
    "name": "Chengfan Jia",
    "display_name": "Chengfan Jia",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ansor: Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7837,
    "paper_ids": [
      472
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Minmin Sun",
    "display_name": "Minmin Sun",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ansor: Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7838,
    "paper_ids": [
      472
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhao Wu",
    "display_name": "Zhao Wu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ansor: Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7839,
    "paper_ids": [
      472
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ameer Haj-Ali",
    "display_name": "Ameer Haj-Ali",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ansor: Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7840,
    "paper_ids": [
      472
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jun Yang",
    "display_name": "Jun Yang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {},
      "ATC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Ansor: Generating High-Performance Tensor Programs for Deep Learning",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7841,
    "paper_ids": [
      472
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Luke Nelson",
    "display_name": "Luke Nelson",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Specification and verification in the field: Applying formal methods to BPF just-in-time compilers in the Linux kernel",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7842,
    "paper_ids": [
      5889
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jacob Van Geffen",
    "display_name": "Jacob Van Geffen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {
        "2021": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Specification and verification in the field: Applying formal methods to BPF just-in-time compilers in the Linux kernel",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "using lightweight formal methods to validate a keyvalue storage node in amazon s3",
        "conference": "SOSP",
        "year": 2021
      }
    ],
    "author_id": 7843,
    "paper_ids": [
      5889
    ],
    "papers_without_artifact_ids": [
      5878
    ]
  },
  {
    "name": "Emina Torlak",
    "display_name": "Emina Torlak",
    "affiliation": "Amazon Web Services, USA",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Specification and verification in the field: Applying formal methods to BPF just-in-time compilers in the Linux kernel",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7844,
    "paper_ids": [
      5889
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Xi Wang 0005",
    "display_name": "Xi Wang",
    "affiliation": "University of Delaware",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "EUROSYS": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {},
      "EUROSYS": {},
      "NSDI": {
        "2020": 1,
        "2008": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Specification and verification in the field: Applying formal methods to BPF just-in-time compilers in the Linux kernel",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automated verification of customizable middlebox properties with gravel",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "d3s debugging deployed distributed systems",
        "conference": "NSDI",
        "year": 2008
      }
    ],
    "author_id": 7845,
    "paper_ids": [
      5889
    ],
    "papers_without_artifact_ids": [
      2121,
      1297
    ]
  },
  {
    "name": "Mohammed Alfatafta",
    "display_name": "Mohammed Alfatafta",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Toward a Generic Fault Tolerance Technique for Partial Network Partitioning",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7846,
    "paper_ids": [
      5890
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Basil Alkhatib",
    "display_name": "Basil Alkhatib",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Toward a Generic Fault Tolerance Technique for Partial Network Partitioning",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7847,
    "paper_ids": [
      5890
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ahmed Alquraan",
    "display_name": "Ahmed Alquraan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2023": 1
      },
      "NSDI": {
        "2024": 1,
        "2020": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Toward a Generic Fault Tolerance Technique for Partial Network Partitioning",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lolkv the logless linearizable rdmabased keyvalue storage system",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "a study of orchestration approaches for scientific workflows in serverless computing",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "flair accelerating reads with consistencyaware network routing",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 7848,
    "paper_ids": [
      5890
    ],
    "papers_without_artifact_ids": [
      5891,
      5892,
      5893
    ]
  },
  {
    "name": "Samer Al-Kiswany",
    "display_name": "Samer Al-Kiswany",
    "affiliation": "University of Waterloo",
    "artifact_count": 1,
    "total_papers": 6,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "EUROSYS": 2,
      "FAST": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2023": 1,
        "2024": 1
      },
      "FAST": {
        "2025": 1
      },
      "NSDI": {
        "2024": 1,
        "2020": 1
      }
    },
    "artifact_rate": 16.7,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Toward a Generic Fault Tolerance Technique for Partial Network Partitioning",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "vectorcdc accelerating data deduplication with vector instructions",
        "conference": "FAST",
        "year": 2025
      },
      {
        "title": "draconis networkaccelerated scheduling for microsecondscale workloads",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "lolkv the logless linearizable rdmabased keyvalue storage system",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "a study of orchestration approaches for scientific workflows in serverless computing",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "flair accelerating reads with consistencyaware network routing",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 1250,
    "paper_ids": [
      5890
    ],
    "papers_without_artifact_ids": [
      5894,
      4669,
      5891,
      5892,
      5893
    ]
  },
  {
    "name": "Hang Zhu",
    "display_name": "Hang Zhu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 2,
      "NDSS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "NSDI": {
        "2025": 1,
        "2022": 1
      },
      "NDSS": {}
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RackSched: A Microsecond-Scale Scheduler for Rack-Scale Computers",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "minder faulty machine detection for largescale distributed model training",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "netvrm virtual register memory for programmable networks",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 7849,
    "paper_ids": [
      473
    ],
    "papers_without_artifact_ids": [
      3668,
      1010
    ]
  },
  {
    "name": "Kostis Kaffes",
    "display_name": "Kostis Kaffes",
    "affiliation": "Columbia University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {
        "2021": 1
      },
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RackSched: A Microsecond-Scale Scheduler for Rack-Scale Computers",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "syrup userdefined scheduling across the stack",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "shinjuku preemptive scheduling for μsecondscale tail latency",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 7850,
    "paper_ids": [
      473
    ],
    "papers_without_artifact_ids": [
      4612,
      2642
    ]
  },
  {
    "name": "Zixu Chen",
    "display_name": "Zixu Chen",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RackSched: A Microsecond-Scale Scheduler for Rack-Scale Computers",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7851,
    "paper_ids": [
      473
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Zhenming Liu",
    "display_name": "Zhenming Liu",
    "affiliation": "College of William and Mary",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 0,
      "FAST": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "ATC": {},
      "FAST": {
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RackSched: A Microsecond-Scale Scheduler for Rack-Scale Computers",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "distcache provable load balancing for largescale storage systems with distributed caching",
        "conference": "FAST",
        "year": 2019
      }
    ],
    "author_id": 7852,
    "paper_ids": [
      473
    ],
    "papers_without_artifact_ids": [
      495
    ]
  },
  {
    "name": "Christos Kozyrakis",
    "display_name": "Christos Kozyrakis",
    "affiliation": "Stanford University",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "OSDI": 3,
      "SOSP": 3,
      "SC": 0,
      "EUROSYS": 2,
      "ATC": 0,
      "USENIXSEC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2023": 1,
        "2020": 1
      },
      "SOSP": {
        "2021": 2,
        "2024": 1
      },
      "SC": {},
      "EUROSYS": {
        "2021": 2
      },
      "ATC": {},
      "USENIXSEC": {},
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 11.1,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "RackSched: A Microsecond-Scale Scheduler for Rack-Scale Computers",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "highthroughput and flexible host networking for accelerated computing",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "recycle resilient training of large dnns using pipeline adaptation",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "honeycomb secure and efficient gpu executions via static validation",
        "conference": "OSDI",
        "year": 2023
      },
      {
        "title": "interferenceaware scheduling for inference serving",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "smartharvest harvesting idle cpus safely and efficiently in the cloud",
        "conference": "EUROSYS",
        "year": 2021
      },
      {
        "title": "syrup userdefined scheduling across the stack",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "ghost fast flexible userspace delegation of linux scheduling",
        "conference": "SOSP",
        "year": 2021
      },
      {
        "title": "shinjuku preemptive scheduling for μsecondscale tail latency",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 7853,
    "paper_ids": [
      473
    ],
    "papers_without_artifact_ids": [
      2754,
      5895,
      4011,
      4812,
      2128,
      4612,
      5594,
      2642
    ]
  },
  {
    "name": "Francisco Maturana",
    "display_name": "Francisco Maturana",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2020": 1
      },
      "SOSP": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PACEMAKER: Avoiding HeART attacks in storage clusters with disk-adaptive redundancy",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "morph efficient filelifetime redundancy management for cluster file systems",
        "conference": "SOSP",
        "year": 2024
      },
      {
        "title": "tiger diskadaptive redundancy without placement restrictions",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 7854,
    "paper_ids": [
      1324
    ],
    "papers_without_artifact_ids": [
      1327,
      1329
    ]
  },
  {
    "name": "Jiaxin Lin",
    "display_name": "Jiaxin Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "NSDI": {
        "2025": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PANIC: A High-Performance Programmable NIC for Multi-tenant Networks",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enabling portable and highperformance smartnic programs with alkali",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "ringleader efficiently offloading intraserver orchestration to nics",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 7855,
    "paper_ids": [
      2891
    ],
    "papers_without_artifact_ids": [
      2893,
      2895
    ]
  },
  {
    "name": "Kiran Patel",
    "display_name": "Kiran Patel",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PANIC: A High-Performance Programmable NIC for Multi-tenant Networks",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7856,
    "paper_ids": [
      2891
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Brent E. Stephens",
    "display_name": "Brent E. Stephens",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 7,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 1,
      "ATC": 0,
      "NSDI": 5
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {
        "2023": 1
      },
      "ATC": {},
      "NSDI": {
        "2019": 1,
        "2025": 1,
        "2023": 1,
        "2022": 2
      }
    },
    "artifact_rate": 14.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "PANIC: A High-Performance Programmable NIC for Multi-tenant Networks",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "mtp transport for innetwork computing",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "ringleader efficiently offloading intraserver orchestration to nics",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "a cloudscale characterization of remote procedure calls",
        "conference": "SOSP",
        "year": 2023
      },
      {
        "title": "backdraft a lossless virtual switch that prevents the slow receiver problem",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "justitia software multitenancy in hardware kernelbypass networks",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "loom flexible and efficient nic packet scheduling",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 7857,
    "paper_ids": [
      2891
    ],
    "papers_without_artifact_ids": [
      2892,
      2895,
      5352,
      5896,
      1953,
      2903
    ]
  },
  {
    "name": "Arpan Gujarati",
    "display_name": "Arpan Gujarati",
    "affiliation": "University of British Columbia",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Serving DNNs like Clockwork: Performance Predictability from the Bottom Up",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7858,
    "paper_ids": [
      1969
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Reza Karimi",
    "display_name": "Reza Karimi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Serving DNNs like Clockwork: Performance Predictability from the Bottom Up",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7859,
    "paper_ids": [
      1969
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Safya Alzayat",
    "display_name": "Safya Alzayat",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Serving DNNs like Clockwork: Performance Predictability from the Bottom Up",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7860,
    "paper_ids": [
      1969
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Wei Hao",
    "display_name": "Wei Hao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Serving DNNs like Clockwork: Performance Predictability from the Bottom Up",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7861,
    "paper_ids": [
      1969
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ymir Vigfusson",
    "display_name": "Ymir Vigfusson",
    "affiliation": "Emory University",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2024": 1,
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Serving DNNs like Clockwork: Performance Predictability from the Bottom Up",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "sieve is simpler than lru an efficient turnkey eviction algorithm for web caches",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "the benefit of hindsight tracing edgecases in distributed systems",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 7862,
    "paper_ids": [
      1969
    ],
    "papers_without_artifact_ids": [
      1960,
      1971
    ]
  },
  {
    "name": "Konstantinos Fertakis",
    "display_name": "Konstantinos Fertakis",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "KungFu: Making Training in Distributed Machine Learning Adaptive",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7863,
    "paper_ids": [
      1390
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrei-Octavian Brabete",
    "display_name": "Andrei-Octavian Brabete",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "KungFu: Making Training in Distributed Machine Learning Adaptive",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "serverlessllm lowlatency serverless inference for large language models",
        "conference": "OSDI",
        "year": 2024
      }
    ],
    "author_id": 7864,
    "paper_ids": [
      1390
    ],
    "papers_without_artifact_ids": [
      3559
    ]
  },
  {
    "name": "Haonan Lu",
    "display_name": "Haonan Lu",
    "affiliation": "University at Buffalo",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1,
        "2020": 1
      },
      "SOSP": {},
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Performance-Optimal Read-Only Transactions",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "accelerating skewed workloads with performance multipliers in the turbodb distributed database",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "ncc natural concurrency control for strictly serializable datastores by avoiding the timestampinversion pitfall",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 7865,
    "paper_ids": [
      2126
    ],
    "papers_without_artifact_ids": [
      2743,
      2127
    ]
  },
  {
    "name": "Yimin Jiang",
    "display_name": "Yimin Jiang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {},
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Unified Architecture for Accelerating Distributed DNN Training in Heterogeneous GPU/CPU Clusters",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "accelerating distributed moe training and inference with lina",
        "conference": "ATC",
        "year": 2023
      }
    ],
    "author_id": 7866,
    "paper_ids": [
      2830
    ],
    "papers_without_artifact_ids": [
      2527
    ]
  },
  {
    "name": "Chang Lan",
    "display_name": "Chang Lan",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "NSDI": 4,
      "PETS": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {},
      "NSDI": {
        "2016": 1,
        "2018": 2,
        "2015": 1
      },
      "PETS": {}
    },
    "artifact_rate": 20.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Unified Architecture for Accelerating Distributed DNN Training in Heterogeneous GPU/CPU Clusters",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "resq enabling slos in network function virtualization",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "safebricks shielding network functions in the cloud",
        "conference": "NSDI",
        "year": 2018
      },
      {
        "title": "embark securely outsourcing middleboxes to the cloud",
        "conference": "NSDI",
        "year": 2016
      },
      {
        "title": "explicit path control in commodity data centers design and applications",
        "conference": "NSDI",
        "year": 2015
      }
    ],
    "author_id": 7867,
    "paper_ids": [
      2830
    ],
    "papers_without_artifact_ids": [
      2864,
      681,
      682,
      3864
    ]
  },
  {
    "name": "Bairen Yi",
    "display_name": "Bairen Yi",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {},
      "NSDI": {
        "2018": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Unified Architecture for Accelerating Distributed DNN Training in Heterogeneous GPU/CPU Clusters",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "powerman an outofband management network for datacenters using power line communication",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 7868,
    "paper_ids": [
      2830
    ],
    "papers_without_artifact_ids": [
      2715
    ]
  },
  {
    "name": "Yong Cui 0001",
    "display_name": "Yong Cui",
    "affiliation": "Tsinghua University",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "ATC": {},
      "NSDI": {
        "2016": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Unified Architecture for Accelerating Distributed DNN Training in Heterogeneous GPU/CPU Clusters",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "diamond nesting the data center network with wireless rings in 3d space",
        "conference": "NSDI",
        "year": 2016
      }
    ],
    "author_id": 7869,
    "paper_ids": [
      2830
    ],
    "papers_without_artifact_ids": [
      5897
    ]
  },
  {
    "name": "Naama Ben-David",
    "display_name": "Naama Ben-David",
    "affiliation": "Technion",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "ATC": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Microsecond Consensus for Microsecond Applications",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lockfree locks",
        "conference": "ATC",
        "year": 2023
      }
    ],
    "author_id": 7871,
    "paper_ids": [
      1383
    ],
    "papers_without_artifact_ids": [
      5898
    ]
  },
  {
    "name": "Virendra J. Marathe",
    "display_name": "Virendra J. Marathe",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 0,
      "ATC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {},
      "ATC": {},
      "NSDI": {
        "2024": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Microsecond Consensus for Microsecond Applications",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "lolkv the logless linearizable rdmabased keyvalue storage system",
        "conference": "NSDI",
        "year": 2024
      }
    ],
    "author_id": 7872,
    "paper_ids": [
      1383
    ],
    "papers_without_artifact_ids": [
      5891
    ]
  },
  {
    "name": "Dario Korolija",
    "display_name": "Dario Korolija",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 0,
      "EUROSYS": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2020": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Do OS abstractions make sense on FPGAs?",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "accl an fpgabased collective engine for distributed applications",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "serverless fpga workinprogress",
        "conference": "EUROSYS",
        "year": 2023
      }
    ],
    "author_id": 7873,
    "paper_ids": [
      3606
    ],
    "papers_without_artifact_ids": [
      3838,
      3839
    ]
  },
  {
    "name": "Solal Pirelli",
    "display_name": "Solal Pirelli",
    "affiliation": "EPFL",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {},
      "NSDI": {
        "2019": 1,
        "2022": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "A Simpler and Faster NIC Driver Model for Network Functions",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "automated verification of network function binaries",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "performance contracts for software network functions",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 7874,
    "paper_ids": [
      1595
    ],
    "papers_without_artifact_ids": [
      1597,
      1599
    ]
  },
  {
    "name": "Subho S. Banerjee",
    "display_name": "Subho S. Banerjee",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SC": {},
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "FIRM: An Intelligent Fine-grained Resource Management Framework for SLO-Oriented Microservices",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "caudit continuous auditing of ssh servers to mitigate bruteforce attacks",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 7875,
    "paper_ids": [
      2941
    ],
    "papers_without_artifact_ids": [
      2942
    ]
  },
  {
    "name": "Zhiqiang Xie",
    "display_name": "Zhiqiang Xie",
    "affiliation": "Max Planck Institute for Software Systems",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 2,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2020": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rammer: Enabling Holistic Deep Learning Compiler Optimizations with rTasks",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "highthroughput and flexible host networking for accelerated computing",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "the benefit of hindsight tracing edgecases in distributed systems",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 7876,
    "paper_ids": [
      156
    ],
    "papers_without_artifact_ids": [
      2754,
      1971
    ]
  },
  {
    "name": "Wenxiang Hu",
    "display_name": "Wenxiang Hu",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rammer: Enabling Holistic Deep Learning Compiler Optimizations with rTasks",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7877,
    "paper_ids": [
      156
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Lintao Zhang",
    "display_name": "Lintao Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 2,
      "SOSP": 0,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2024": 1,
        "2020": 1
      },
      "SOSP": {},
      "EUROSYS": {
        "2023": 1
      },
      "NSDI": {
        "2009": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Rammer: Enabling Holistic Deep Learning Compiler Optimizations with rTasks",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "nnscaler constraintguided parallelization plan generation for deep learning training",
        "conference": "OSDI",
        "year": 2024
      },
      {
        "title": "silod a codesign of caching and scheduling for deep learning clusters",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "modist transparent model checking of unmodified distributed systems",
        "conference": "NSDI",
        "year": 2009
      }
    ],
    "author_id": 7878,
    "paper_ids": [
      156
    ],
    "papers_without_artifact_ids": [
      158,
      160,
      294
    ]
  },
  {
    "name": "Changgeng Zhao",
    "display_name": "Changgeng Zhao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Cobra: Making Transactional Key-Value Stores Verifiably Serializable",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7879,
    "paper_ids": [
      2849
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yuge Zhang",
    "display_name": "Yuge Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Retiarii: A Deep Learning Exploratory-Training Framework",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7880,
    "paper_ids": [
      157
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Jonathan Behrens",
    "display_name": "Jonathan Behrens",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2022": 1
      },
      "NSDI": {
        "2019": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "performance evolution of mitigating transient execution attacks",
        "conference": "EUROSYS",
        "year": 2022
      },
      {
        "title": "shenango achieving high cpu efficiency for latencysensitive datacenter workloads",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 7881,
    "paper_ids": [
      985
    ],
    "papers_without_artifact_ids": [
      1294,
      2643
    ]
  },
  {
    "name": "Anton Cao",
    "display_name": "Anton Cao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7882,
    "paper_ids": [
      985
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Cel Skeggs",
    "display_name": "Cel Skeggs",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7883,
    "paper_ids": [
      985
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Adney Cardoza",
    "display_name": "Adney Cardoza",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "NSDI": {
        "2023": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Fault-tolerant and transactional stateful serverless workflows",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ringleader efficiently offloading intraserver orchestration to nics",
        "conference": "NSDI",
        "year": 2023
      }
    ],
    "author_id": 7884,
    "paper_ids": [
      1080
    ],
    "papers_without_artifact_ids": [
      2895
    ]
  },
  {
    "name": "Peter Baile Chen",
    "display_name": "Peter Baile Chen",
    "affiliation": "University of Michigan",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Fault-tolerant and transactional stateful serverless workflows",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7885,
    "paper_ids": [
      1080
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ben Reeves",
    "display_name": "Ben Reeves",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "AGAMOTTO: How Persistent is your Persistent Memory Application?",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7886,
    "paper_ids": [
      353
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ben Stoler",
    "display_name": "Ben Stoler",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "AGAMOTTO: How Persistent is your Persistent Memory Application?",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7887,
    "paper_ids": [
      353
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Andrew Quinn 0001",
    "display_name": "Andrew Quinn",
    "affiliation": "Univ. of California - Santa Cruz",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 2,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2022": 1,
        "2020": 1
      },
      "EUROSYS": {
        "2023": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "AGAMOTTO: How Persistent is your Persistent Memory Application?",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "what goes wrong in serverless runtimes a survey of bugs in knative serving",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "lethe secure deletion by addition",
        "conference": "EUROSYS",
        "year": 2023
      },
      {
        "title": "debugging the omnitable way",
        "conference": "OSDI",
        "year": 2022
      }
    ],
    "author_id": 7888,
    "paper_ids": [
      353
    ],
    "papers_without_artifact_ids": [
      5899,
      5900,
      1629
    ]
  },
  {
    "name": "Mingzhe Hao",
    "display_name": "Mingzhe Hao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 5,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "FAST": 4
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {},
      "FAST": {
        "2016": 1,
        "2017": 1,
        "2018": 2
      }
    },
    "artifact_rate": 20.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LinnOS: Predictability on Unpredictable Flash Storage with a Light Neural Network",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "the case of femu cheap accurate scalable and extensible flash emulator",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "failslow at scale evidence of hardware performance faults in large production systems",
        "conference": "FAST",
        "year": 2018
      },
      {
        "title": "tinytail flash nearperfect elimination of garbage collection tail latencies in nand ssds",
        "conference": "FAST",
        "year": 2017
      },
      {
        "title": "the tail at store a revelation from millions of hours of disk and ssd deployments",
        "conference": "FAST",
        "year": 2016
      }
    ],
    "author_id": 7889,
    "paper_ids": [
      3631
    ],
    "papers_without_artifact_ids": [
      3632,
      3633,
      3634,
      3635
    ]
  },
  {
    "name": "Levent Toksoz",
    "display_name": "Levent Toksoz",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LinnOS: Predictability on Unpredictable Flash Storage with a Light Neural Network",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7890,
    "paper_ids": [
      3631
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Edward Edberg Halim",
    "display_name": "Edward Edberg Halim",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 0.0,
    "functional_rate": 0.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 0,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "LinnOS: Predictability on Unpredictable Flash Storage with a Light Neural Network",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7891,
    "paper_ids": [
      3631
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Ahmed Saeed 0001",
    "display_name": "Ahmed Saeed",
    "affiliation": "Georgia Institute of Technology",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "NSDI": {
        "2024": 1,
        "2019": 1,
        "2023": 1
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Overload Control for µs-scale RPCs with Breakwater",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "ldb an efficient latency profiling tool for multithreaded applications",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "protego overload control for applications with unpredictable lock contention",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "eiffel efficient and flexible software packet scheduling",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 8165,
    "paper_ids": [
      2634
    ],
    "papers_without_artifact_ids": [
      2637,
      2640,
      5901
    ]
  },
  {
    "name": "Seo Jin Park",
    "display_name": "Seo Jin Park",
    "affiliation": "University of Southern California",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "ATC": 0,
      "NSDI": 8
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {},
      "ATC": {},
      "NSDI": {
        "2021": 2,
        "2024": 1,
        "2019": 1,
        "2025": 1,
        "2023": 2,
        "2022": 1
      }
    },
    "artifact_rate": 11.1,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Overload Control for µs-scale RPCs with Breakwater",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "quicksand harnessing stranded datacenter resources with granular computing",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "ldb an efficient latency profiling tool for multithreaded applications",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "nu achieving microsecondscale resource fungibility with logical processes",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "protego overload control for applications with unpredictable lock contention",
        "conference": "NSDI",
        "year": 2023
      },
      {
        "title": "dispersedledger highthroughput byzantine consensus on variable bandwidth networks",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "epaxos revisited",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "millisort and milliquery largescale dataintensive computing in milliseconds",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "exploiting commutativity for practical fast replication",
        "conference": "NSDI",
        "year": 2019
      }
    ],
    "author_id": 8166,
    "paper_ids": [
      2634
    ],
    "papers_without_artifact_ids": [
      2635,
      2637,
      2639,
      2640,
      3758,
      5902,
      5903,
      5904
    ]
  },
  {
    "name": "Hengchu Zhang",
    "display_name": "Hengchu Zhang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Orchard: Differentially Private Analytics at Scale",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7892,
    "paper_ids": [
      2727
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Benjamin C. Pierce",
    "display_name": "Benjamin C. Pierce",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0,
      "USENIXSEC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {},
      "USENIXSEC": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Orchard: Differentially Private Analytics at Scale",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7893,
    "paper_ids": [
      2727
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Fabian Ruffy",
    "display_name": "Fabian Ruffy",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Gauntlet: Finding Bugs in Compilers for Programmable Packet Processing",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7894,
    "paper_ids": [
      4620
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tao Wang 0088",
    "display_name": "Tao Wang",
    "affiliation": "New York University",
    "artifact_count": 1,
    "total_papers": 4,
    "total_papers_by_conf": {
      "OSDI": 1,
      "ATC": 0,
      "NSDI": 3
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "ATC": {},
      "NSDI": {
        "2025": 1,
        "2022": 2
      }
    },
    "artifact_rate": 25.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Gauntlet: Finding Bugs in Compilers for Programmable Packet Processing",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "statecompute replication parallelizing highspeed stateful packet processing",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "netvrm virtual register memory for programmable networks",
        "conference": "NSDI",
        "year": 2022
      },
      {
        "title": "isolation mechanisms for highspeed packetprocessing pipelines",
        "conference": "NSDI",
        "year": 2022
      }
    ],
    "author_id": 7895,
    "paper_ids": [
      4620
    ],
    "papers_without_artifact_ids": [
      4621,
      1010,
      2862
    ]
  },
  {
    "name": "Nofel Yaseen",
    "display_name": "Nofel Yaseen",
    "affiliation": "University of Pennsylvania",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "NSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 50.0,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aragog: Scalable Runtime Verification of Shardable Networked Systems",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "tpprof a network traffic pattern profiler",
        "conference": "NSDI",
        "year": 2020
      }
    ],
    "author_id": 7896,
    "paper_ids": [
      1939
    ],
    "papers_without_artifact_ids": [
      1943
    ]
  },
  {
    "name": "Behnaz Arzani",
    "display_name": "Behnaz Arzani",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 9,
    "total_papers_by_conf": {
      "OSDI": 1,
      "NSDI": 8
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "NSDI": {
        "2021": 1,
        "2024": 2,
        "2019": 1,
        "2025": 2,
        "2020": 1,
        "2018": 1
      }
    },
    "artifact_rate": 11.1,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aragog: Scalable Runtime Verification of Shardable Networked Systems",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "enhancing network failure mitigation with performanceaware ranking",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "everything matters in programmable packet scheduling",
        "conference": "NSDI",
        "year": 2025
      },
      {
        "title": "solving maxmin fair resource allocations quickly on large graphs",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "finding adversarial inputs for heuristics using multilevel optimization",
        "conference": "NSDI",
        "year": 2024
      },
      {
        "title": "contracting widearea network topologies to solve flow problems quickly",
        "conference": "NSDI",
        "year": 2021
      },
      {
        "title": "privateeye scalable and privacypreserving compromise detection in the cloud",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "dshark a general easy to program and scalable framework for analyzing innetwork packet traces",
        "conference": "NSDI",
        "year": 2019
      },
      {
        "title": "007 democratically finding the cause of packet drops",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 7897,
    "paper_ids": [
      1939
    ],
    "papers_without_artifact_ids": [
      2697,
      5905,
      4689,
      3542,
      2657,
      4637,
      4798,
      2833
    ]
  },
  {
    "name": "Selim Ciraci",
    "display_name": "Selim Ciraci",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SC": 0,
      "NSDI": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SC": {},
      "NSDI": {
        "2020": 1,
        "2018": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Aragog: Scalable Runtime Verification of Shardable Networked Systems",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "privateeye scalable and privacypreserving compromise detection in the cloud",
        "conference": "NSDI",
        "year": 2020
      },
      {
        "title": "007 democratically finding the cause of packet drops",
        "conference": "NSDI",
        "year": 2018
      }
    ],
    "author_id": 7898,
    "paper_ids": [
      1939
    ],
    "papers_without_artifact_ids": [
      4637,
      2833
    ]
  },
  {
    "name": "Keshav Santhanam",
    "display_name": "Keshav Santhanam",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 3,
    "total_papers_by_conf": {
      "OSDI": 1,
      "EUROSYS": 2
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "EUROSYS": {
        "2024": 1,
        "2021": 1
      }
    },
    "artifact_rate": 33.3,
    "repro_rate": 0.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 0,
    "papers": [
      {
        "title": "Heterogeneity-Aware Cluster Scheduling Policies for Deep Learning Workloads",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "alto an efficient network orchestrator for compound ai systems",
        "conference": "EUROSYS",
        "year": 2024
      },
      {
        "title": "distir an intermediate representation for optimizing distributed neural networks",
        "conference": "EUROSYS",
        "year": 2021
      }
    ],
    "author_id": 7899,
    "paper_ids": [
      2654
    ],
    "papers_without_artifact_ids": [
      2655,
      5906
    ]
  },
  {
    "name": "Yun-Sheng Chang",
    "display_name": "Yun-Sheng Chang",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 2,
    "total_papers_by_conf": {
      "OSDI": 2,
      "ATC": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2023": 1,
        "2020": 1
      },
      "ATC": {}
    },
    "artifact_rate": 50.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Determinizing Crash Behavior with a Verified Snapshot-Consistent Flash Translation Layer",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [
      {
        "title": "verifying vmvcc a highperformance transaction library using multiversion concurrency control",
        "conference": "OSDI",
        "year": 2023
      }
    ],
    "author_id": 7900,
    "paper_ids": [
      4616
    ],
    "papers_without_artifact_ids": [
      986
    ]
  },
  {
    "name": "Yao Hsiao",
    "display_name": "Yao Hsiao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Determinizing Crash Behavior with a Verified Snapshot-Consistent Flash Translation Layer",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7901,
    "paper_ids": [
      4616
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Tzu-Chi Lin",
    "display_name": "Tzu-Chi Lin",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Determinizing Crash Behavior with a Verified Snapshot-Consistent Flash Translation Layer",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7902,
    "paper_ids": [
      4616
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Che-Wei Tsao",
    "display_name": "Che-Wei Tsao",
    "affiliation": "",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Determinizing Crash Behavior with a Verified Snapshot-Consistent Flash Translation Layer",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7903,
    "paper_ids": [
      4616
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Chun-Feng Wu",
    "display_name": "Chun-Feng Wu",
    "affiliation": "National Chiao Tung University",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1,
      "SOSP": 0
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      },
      "SOSP": {}
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Determinizing Crash Behavior with a Verified Snapshot-Consistent Flash Translation Layer",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7904,
    "paper_ids": [
      4616
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Hsiang-Shang Ko",
    "display_name": "Hsiang-Shang Ko",
    "affiliation": "Academia Sinica, Taiwan",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Determinizing Crash Behavior with a Verified Snapshot-Consistent Flash Translation Layer",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7905,
    "paper_ids": [
      4616
    ],
    "papers_without_artifact_ids": []
  },
  {
    "name": "Yu-Fang Chen 0001",
    "display_name": "Yu-Fang Chen",
    "affiliation": "IISc Bangalore",
    "artifact_count": 1,
    "total_papers": 1,
    "total_papers_by_conf": {
      "OSDI": 1
    },
    "total_papers_by_conf_year": {
      "OSDI": {
        "2020": 1
      }
    },
    "artifact_rate": 100.0,
    "repro_rate": 100.0,
    "functional_rate": 100.0,
    "category": "systems",
    "conferences": [
      "OSDI"
    ],
    "years": [
      2020
    ],
    "year_range": "2020-2020",
    "recent_count": 0,
    "artifact_citations": 0,
    "badges_available": 1,
    "badges_functional": 1,
    "badges_reproducible": 1,
    "papers": [
      {
        "title": "Determinizing Crash Behavior with a Verified Snapshot-Consistent Flash Translation Layer",
        "conference": "OSDI",
        "year": 2020,
        "badges": [
          "available",
          "functional",
          "reproduced"
        ],
        "category": "systems",
        "artifact_citations": 0
      }
    ],
    "papers_without_artifacts": [],
    "author_id": 7906,
    "paper_ids": [
      4616
    ],
    "papers_without_artifact_ids": []
  }
]